1. Langheinrich, M. (2002). Privacy invasions in ubiquitous computing. In Proc. workshop on socially-informed design of privacy enhancing solutions in ubiquitous computing.
2. Westin, A. (1967). Privacy and freedom. New York: Atheneum.
3. Chang, Y., Yan, R., Chen, D., & Yang, J. (2006). People identification with limited labels in privacy-protected video. In Proc. IEEE int. conf. multimedia and expo (pp. 1005–1008).
4. Tansuriyavong, S., & Hanaki, S. I. (2001). Privacy protection by concealing persons in circumstantial video image. In Proc. perceptive user interfaces (pp. 1–4).
5. Venkatesh, B. R., & Makur, A. (2006). Object-based surveillance video compression using foreground motion compensation. In IEEE control, automation robotics and vision (pp. 1–6).