. Internetlivestats, , 2018.

. Trafficland, , 2018.

S. Kamijo, Y. Matsushita, K. Ikeuchi, and M. Sakauchi, Traffic monitoring and accident detection at intersections, IEEE Transactions on Intelligent Transportation Systems, vol.1, issue.2, pp.108-118, 2000.

Q. Sun, B. Schiele, and M. Fritz, A domain based approach to social relation recognition, The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.

A. G. Reece and C. M. Danforth, Instagram photos reveal predictive markers of depression, EPJ Data Science, vol.6, issue.1, p.15, 2017.

J. Yu, B. Zhang, Z. Kuang, D. Lin, and J. Fan, iprivacy: Image privacy protection by identifying sensitive objects via deep multi-task learning, IEEE Transactions on Information Forensics and Security, vol.12, issue.5, pp.1005-1016, 2017.

M. R. Ra, R. Govindan, and A. Ortega, P3: Toward privacy-preserving photo sharing, Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pp.515-528, 2013.

J. He, B. Liu, D. Kong, X. Bao, N. Wang et al., Puppies: Transformation-supported personalized privacy preserving partial image sharing, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN, pp.359-370, 2016.

L. Zhang, T. Jung, C. Liu, X. Ding, X. Y. Li et al., Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices, 2015 IEEE 35th International Conference on Distributed Computing Systems, pp.308-317, 2015.

Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun et al., A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, IEEE Transactions on Information Forensics and Security, vol.11, issue.11, pp.2594-2608, 2016.

S. Wang, M. Nassar, M. Atallah, and Q. Malluhi, In: Secure and Private Outsourcing of Shape-Based Feature Extraction, pp.90-99, 2013.

Q. Wang, S. Hu, K. Ren, J. Wang, Z. Wang et al., Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp.1-9, 2016.

S. Hill, Z. Zhou, L. Saul, and H. Shacham, On the (in) effectiveness of mosaicing and blurring as tools for document redaction, Proceedings on Privacy Enhancing Technologies, pp.403-417, 2016.

R. Mcpherson, R. Shokri, and V. Shmatikov, Defeating image obfuscation with deep learning, 2016.

C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, In: Calibrating Noise to Sensitivity in Private Data Analysis, pp.265-284, 2006.

A. C. Squicciarini, C. Caragea, and R. Balakavi, Analyzing images' privacy for the modern web, Proceedings of the 25th ACM Conference on Hypertext and Social Media. HT '14, pp.136-147, 2014.

E. Spyromitros-xioufis, S. Papadopoulos, A. Popescu, and Y. Kompatsiaris, Personalized privacy-aware image classification, Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval. ICMR '16, pp.71-78, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01813721

R. Stevens and I. Pudney, Blur select faces with the updated blur faces tool, 2017.

C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum, Differential privacy under continual observation, Proceedings of the forty-second ACM symposium on Theory of computing, pp.715-724, 2010.
DOI : 10.1145/1806689.1806787

URL : http://www.wisdom.weizmann.ac.il/%7Enaor/PAPERS/continual_observation.pdf

J. C. Duchi, M. I. Jordan, and M. J. Wainwright, Local privacy and statistical minimax rates, IEEE 54th Annual Symposium on Foundations of Computer Science, pp.429-438, 2013.
DOI : 10.1109/allerton.2013.6736718

URL : http://www.cs.berkeley.edu/~jduchi/projects/DuchiJoWa13_focs.pdf

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geoindistinguishability: Differential privacy for location-based systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. CCS '13, pp.901-914, 2013.

S. Jana, A. Narayanan, and V. Shmatikov, A scanner darkly: Protecting user privacy from perceptual applications, 2013 IEEE Symposium on Security and Privacy, pp.349-363, 2013.
DOI : 10.1109/sp.2013.31

URL : http://www.cs.utexas.edu/~shmat/shmat_oak13darkly.pdf

F. S. Samaria and A. C. Harter, Parameterisation of a stochastic model for human face identification, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision, pp.138-142, 1994.
DOI : 10.1109/acv.1994.341300

URL : http://www.uk.research.att.com/pub/docs/att/paper.95.2.ps.Z

M. F. Peterson and M. P. Eckstein, Looking just below the eyes is optimal across face recognition tasks, Proceedings of the National Academy of Sciences, vol.109, issue.48, pp.3314-3323, 2012.
DOI : 10.1073/pnas.1214269109

URL : http://www.pnas.org/content/109/48/E3314.full.pdf

L. Leal-taixé, A. Milan, I. Reid, S. Roth, and K. Schindler, Motchallenge 2015: Towards a benchmark for multi-target tracking, 2015.

Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, Gradient-based learning applied to document recognition, Proceedings of the IEEE, vol.86, issue.11, pp.2278-2324, 1998.
DOI : 10.1109/5.726791

URL : http://www.cs.berkeley.edu/~daf/appsem/Handwriting/papers/00726791.pdf

Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004.
DOI : 10.1109/tip.2003.819861

URL : http://www.cns.nyu.edu/~zwang/files/papers/ssim.pdf

L. Fan and . Pets, , vol.768

. Venice, AT&T (92 x, vol.112, 1080.

, First row lists sample images in each dataset and second row is the corresponding differentially private pixelization, under the default parameter setting. Note that when obfuscation is applied to faces in AT&T, vol.4