“…In this section, a review of commonly used protection methods to protect visual privacy is presented. Wagstaff ( Continued on next page Spanos & Maples (1995), Macq & Quisquater (1995), Agi & Gong (1996), Tang (1996), Qiao et al (1997), Zeng & Lei (2003), Yang et al (2004), Boult (2005), Yabuta et al (2005), Yabuta et al (2006), , , Chattopadhyay & Boult (2007), Baaziz et al (2007), Raju et al (2008), Dufaux & Ebrahimi (2008a), Dufaux & Ebrahimi (2008b), Xiangdong et al (2008), Carrillo et al (2010), Dufaux & Ebrahimi (2010), Tong et al (2010), Tong et al (2011), Dufaux (2011), Sohn et al (2011), Pande & Zambreno (2013, Li et al (2013), Ra et al (2013) Redaction: K-same family 7 Newton et al (2005), Gross et al (2006a), Gross et al (2006b), Bitouk et al (2008), Gross et al (2009), De la Hunty et al (2010, Lin et al (2012) Redaction: Object / people removal 22 Kokaram et al (1995), Igehy & Pereira (1997), Masnou & Morel (1998), Morse & Schwartzwald (1998), Efros & Leung (1999)…”