[1] Stutz T, Uhl A. A survey of H.264 AVC/SVC encryption [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(3): 325-339.[2] Newton E M, Sweeney L, Malin B. Preserving privacy by de-identifying face images [J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(2): 232-243.[3] Qi M B, Chen X R, Jiang J G, et al. Face protection of H. 264 video based on detecting and tracking [C]//Proceedings of 8th International Conference on Electronic Measurement and Instruments. Xi’an,China: IEEE, 2007: 2172-2177.[4] Kim Y Y, Jin S H, Bae T M, et al. A selective video encryption for the region of interest in scalable video coding [C]//Proceedings of IEEE TENCON 2007. Taipei, China: IEEE, 2007: 1-4.[5] Dufaux F, Ebrahimi T. Scrambling for privacy protection in video surveillance systems [J]. IEEE Transactions on Circuits and Systems for Video Technology,2008, 18(8): 1168-1174.[6] Zhao Y D, Zhuo L, Mao N S, et al. An object-based unequal encryption method for H.264 compressed surveillance videos [C]//Proceedings of 2012 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC2012). Hong Kong,China: IEEE, 2012: 419-424.[7] Peng F, Zhu X W, Long M. An ROI privacy protection scheme for H.264 video based on FMO and chaos [J]. IEEE Transactions on Information Forensics and Security, 2013, 8(10): 1688-1699.[8] Wang C X, Li Z Y. Face detection based on skin Gaussian model and KL transform [C]//Proceedings of 9th ACIS International Conference on Software Engineering,Artificial Intelligence, Networking, and Parallel/Distribute Computing. Phuket, Thailand: IEEE,2008: 522-525. |