Cryptographic Processors-A Survey, Proceedings of the IEEE, vol.94, issue.2, pp.357-369, 2006. ,
DOI : 10.1109/JPROC.2005.862423
Pictorial structures revisited: People detection and articulated pose estimation, 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp.1014-1021, 2009. ,
DOI : 10.1109/CVPR.2009.5206754
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.395.158
Digital Tarnkappe: Stealth Technology for the Internet of Things, 2012. ,
DOI : 10.5771/9783845238098-139
Pedestrian detection at 100 frames per second, 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp.2903-2910, 2012. ,
DOI : 10.1109/CVPR.2012.6248017
Compression independent reversible encryption for privacy in video surveillance, EURASIP J. Inf. Secur, vol.5, pp.1-5, 2009. ,
Protecting and Managing Privacy Information in Video Surveillance Systems, pp.11-33978, 2009. ,
DOI : 10.1007/978-1-84882-301-3_2
Visual Data Encryption for Privacy Enhancement in Surveillance Systems, pp.13-24, 2013. ,
DOI : 10.1007/978-3-319-02895-8_2
A system for automatic face obscuration for privacy purposes, Vision for Crime Detection and Prevention, pp.1809-1815, 2006. ,
DOI : 10.1016/j.patrec.2006.02.018
Histograms of Oriented Gradients for Human Detection, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), pp.886-893, 2005. ,
DOI : 10.1109/CVPR.2005.177
URL : https://hal.archives-ouvertes.fr/inria-00548512
Scrambling for Video Surveillance with Privacy, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), pp.160-160, 2006. ,
DOI : 10.1109/CVPRW.2006.184
Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) Procedure: An Anatomy of Values, COD, vol.0010, 1970. ,
Vision assessment: shaping technology in 21st century society towards a repertoire for technology assessment, 2000. ,
A provably privacy preserving video surveillance architecture for an assisted living community, 44. Jahrestagung der Gesellschaft für Informatik, pp.22-26, 2014. ,
Real-time estimation of human attention field in LWIR and color surveillance videos, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.1-6, 2008. ,
DOI : 10.1109/CVPRW.2008.4563059
What are customers looking at, Proceedings of Advanced Video and Signal based Surveillance (AVSS), pp.405-410, 2007. ,
Visual privacy protection methods: A survey, Expert Systems with Applications, vol.42, issue.9, pp.4177-4195, 2015. ,
DOI : 10.1016/j.eswa.2015.01.041
National Security Issues, 2006. ,
Technikfolgen-Abschätzung ? Konstituierung und Ausdifferenzierung eines Leitbilds, Edition Sigma, pp.17-49, 1999. ,
Security based on physical unclonability and disorder Introduction to Hardware Security and Trust, pp.65-102, 2011. ,
Respectful cameras: detecting visual markers in real-time to address privacy concerns, Proceedings of Intelligent Robots and Systems, pp.971-978, 2007. ,
Enabling Video Privacy through Computer Vision, IEEE Security and Privacy Magazine, vol.3, issue.3, pp.50-57, 2005. ,
DOI : 10.1109/MSP.2005.65
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.2208
Hardware Implementation of Hash Functions, Introduction to Hardware Security and Trust, pp.27-50, 2011. ,
DOI : 10.1007/978-1-4419-8080-9_2
Angriff auf die Freiheit: Sicherheitswahn, ¨ Uberwachungsstaat und der Abbau bürgerlicher Rechte, 2009. ,
Disparity Statistics for Pedestrian Detection: Combining Appearance, Motion and Stereo, Proceedings of European Conference on Computer Vision (ECCV), pp.182-195, 2010. ,
DOI : 10.1007/978-3-642-15567-3_14