R. Anderson, M. Bond, J. Clulow, and S. Skorobogatov, Cryptographic Processors-A Survey, Proceedings of the IEEE, vol.94, issue.2, pp.357-369, 2006.
DOI : 10.1109/JPROC.2005.862423

M. Andriluka, S. Roth, and B. Schiele, Pictorial structures revisited: People detection and articulated pose estimation, 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp.1014-1021, 2009.
DOI : 10.1109/CVPR.2009.5206754

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.395.158

B. Becker, G. Müller, and I. Polian, Digital Tarnkappe: Stealth Technology for the Internet of Things, 2012.
DOI : 10.5771/9783845238098-139

R. Benenson, M. Mathias, R. Timofte, and L. V. Gool, Pedestrian detection at 100 frames per second, 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp.2903-2910, 2012.
DOI : 10.1109/CVPR.2012.6248017

P. Carrillo, H. Kalva, and S. Magliveras, Compression independent reversible encryption for privacy in video surveillance, EURASIP J. Inf. Secur, vol.5, pp.1-5, 2009.

S. C. Cheung, M. Venkatesh, J. Paruchuri, J. Zhao, and T. Nguyen, Protecting and Managing Privacy Information in Video Surveillance Systems, pp.11-33978, 2009.
DOI : 10.1007/978-1-84882-301-3_2

J. Cichowski, A. Czy?-zewski, and B. Kostek, Visual Data Encryption for Privacy Enhancement in Surveillance Systems, pp.13-24, 2013.
DOI : 10.1007/978-3-319-02895-8_2

R. Cucchiara, A. Prati, and R. Vezzani, A system for automatic face obscuration for privacy purposes, Vision for Crime Detection and Prevention, pp.1809-1815, 2006.
DOI : 10.1016/j.patrec.2006.02.018

N. Dalal and B. Triggs, Histograms of Oriented Gradients for Human Detection, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), pp.886-893, 2005.
DOI : 10.1109/CVPR.2005.177

URL : https://hal.archives-ouvertes.fr/inria-00548512

F. Dufaux and T. Ebrahimi, Scrambling for Video Surveillance with Privacy, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), pp.160-160, 2006.
DOI : 10.1109/CVPRW.2006.184

E. Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) Procedure: An Anatomy of Values, COD, vol.0010, 1970.

J. Grin and A. Grunwald, Vision assessment: shaping technology in 21st century society towards a repertoire for technology assessment, 2000.

M. Huber, J. Müller-quade, T. Nilges, and C. Thal, A provably privacy preserving video surveillance architecture for an assisted living community, 44. Jahrestagung der Gesellschaft für Informatik, pp.22-26, 2014.

A. Leykin and R. Hammoud, Real-time estimation of human attention field in LWIR and color surveillance videos, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.1-6, 2008.
DOI : 10.1109/CVPRW.2008.4563059

X. Liu, N. Krahnstoever, T. Yu, and P. Tu, What are customers looking at, Proceedings of Advanced Video and Signal based Surveillance (AVSS), pp.405-410, 2007.

J. R. Padilla-lopez, A. A. Chaaraoui, and F. Florez-revuelta, Visual privacy protection methods: A survey, Expert Systems with Applications, vol.42, issue.9, pp.4177-4195, 2015.
DOI : 10.1016/j.eswa.2015.01.041

D. D. Pegarkov, National Security Issues, 2006.

T. Petermann, Technikfolgen-Abschätzung ? Konstituierung und Ausdifferenzierung eines Leitbilds, Edition Sigma, pp.17-49, 1999.

U. Ruhrmair, S. Devadas, and F. Koushanfar, Security based on physical unclonability and disorder Introduction to Hardware Security and Trust, pp.65-102, 2011.

J. Schiff, M. Meingast, D. K. Mulligan, S. Sastry, and K. Goldberg, Respectful cameras: detecting visual markers in real-time to address privacy concerns, Proceedings of Intelligent Robots and Systems, pp.971-978, 2007.

A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y. L. Tian et al., Enabling Video Privacy through Computer Vision, IEEE Security and Privacy Magazine, vol.3, issue.3, pp.50-57, 2005.
DOI : 10.1109/MSP.2005.65

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.2208

Z. Shi, C. Ma, J. Cote, and B. Wang, Hardware Implementation of Hash Functions, Introduction to Hardware Security and Trust, pp.27-50, 2011.
DOI : 10.1007/978-1-4419-8080-9_2

I. Trojanow and J. Zeh, Angriff auf die Freiheit: Sicherheitswahn, ¨ Uberwachungsstaat und der Abbau bürgerlicher Rechte, 2009.

S. Walk, K. Schindler, and B. Schiele, Disparity Statistics for Pedestrian Detection: Combining Appearance, Motion and Stereo, Proceedings of European Conference on Computer Vision (ECCV), pp.182-195, 2010.
DOI : 10.1007/978-3-642-15567-3_14