B. Amos, B. Ludwiczuk, and M. Satyanarayanan, OpenFace: A General-Purpose Face Recognition Library with Mobile Applications, 2016.

A. Basu, T. Nakamura, S. Hidano, and S. Kiyomoto, k-anonymity: Risks and the Reality, IEEE Trustcom/BigDataSE/ISPA, vol.1, pp.983-989, 2015.

D. Bitouk, N. Kumar, S. Dhillon, P. Belhumeur, and S. K. Nayar, Face Swapping: Automatically Replacing Faces in Photographs, ACM Trans. Graph, vol.27, issue.3, pp.1-39, 2008.

A. Brand and J. A. Lal, European Best Practice for Quality Assurance, Provision and Use of Genome-based Information and Technologies, Drug Metabol Drug Interact, vol.27, pp.177-82, 2012.

A. Cavailaro, Privacy in Video Surveillance

, IEEE Signal Processing Magazine, vol.24, issue.2, pp.168-166, 2007.

,

K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi, Broadening the Scope of Differential Privacy Using Metrics, Privacy Enhancing Technologies, pp.82-102, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00767210

H. Chi and Y. H. Hu, Face De-Identification Using Facial Identity Preserving Features, 2015 IEEE Global Conference on Signal and Information Processing, pp.586-590, 2015.

T. F. Cootes, G. J. Edwards, and C. J. Taylor, Active Appearance Models, IEEE Trans. Pattern Anal. Mach. Intell, vol.23, issue.6, pp.681-685, 2001.

A. Dosovitskiy, J. T. Springenberg, M. Tatarchenko, and T. Brox, Learning to Generate Chairs, Tables and Cars with Convolutional Networks, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.39, issue.4, pp.692-705, 2017.

L. Du, M. Yi, E. Blasch, and H. Ling, GARP-Face: Balancing Privacy Protection and Utility Preservation in Face De-Identification, IEEE International Joint Conference on Biometrics, pp.1-8, 2014.

C. Dwork, Proceedings of the 33rd International Conference on Automata, Languages and Programming -Volume Part II, pp.1-12, 2006.

C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, Found. Trends Theor. Comput. Sci, vol.9, issue.3&#8211, pp.211-407, 2014.

,

L. Fan, Image Pixelization with Differential Privacy, Data and Applications Security and Privacy XXXII, pp.148-162, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01954420

M. Flynn, Generating Faces with Deconvolution Networks, 2016.

A. Frome, G. Cheung, A. Abdulkader, M. Zennaro, B. Wu et al., Large-Scale Privacy Protection in Google Street View, 2009 IEEE 12th International Conference on Computer Vision, pp.2373-2380, 2009.

S. R. Ganta, S. P. Kasiviswanathan, and A. Smith, Composition Attacks and Auxiliary Information in Data Privacy, Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.265-273, 2008.

, Google: Google Maps, pp.2019-2021

R. Gross, L. Sweeney, F. De-la-torre, and S. Baker, Model-Based Face De-Identification, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06), pp.161-161, 2006.

,

R. Gross, E. Airoldi, B. Malin, and L. Sweeney, Integrating Utility into Face De-identification, Privacy Enhancing Technologies, pp.227-242, 2006.

L. Harmon, The Recognition of Faces, Scientific American, vol.229, issue.5, pp.71-82, 1973.

L. Harmon and B. Julesz, Masking in Visual Recognition: Effects of Two-Dimensional Filtered Noise, Science, vol.180, issue.4091, pp.1194-1197, 1973.

,

X. Hu, D. Hu, S. Zheng, W. Li, F. Chen et al., How People Share Digital Images in Social Networks: A Questionnaire-Based Study of Privacy Decisions and Access Control, Multimedia Tools and Applications, vol.77, issue.14, pp.18163-18185, 2018.

P. Korshunov and T. Ebrahimi, Using Face Morphing to Protect Privacy, 10th IEEE International Conference on Advanced Video and Signal Based Surveillance, pp.208-213, 2013.

P. Korshunov and T. Ebrahimi, Using Warping for Privacy Protection in Video Surveillance, 2013 18th International Conference on Digital Signal Processing (DSP), pp.1-6, 2013.

O. Langner, R. Dotsch, G. Bijlstra, D. Wigboldus, S. Hawk et al., Presentation and Validation of the Radboud Faces Database, Cognition and Emotion, vol.24, issue.8, pp.1377-1388, 2010.

G. Letournel, A. Bugeau, V. .. Ta, and J. Domenger, Face De-Identification with Expressions Preservation, 2015 IEEE International Conference on Image Processing (ICIP), pp.4366-4370, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02489831

G. Levi and T. Hassner, Age and Gender Classification Using Convolutional Neural Networks, IEEE Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW), pp.34-42, 2015.

Y. Li, N. Vishwamitra, B. P. Knijnenburg, H. Hu, and K. Caine, Effectiveness and Users' Experience of Obfuscation As a Privacy-Enhancing Technology for Sharing Photos, Proc. ACM Hum.-Comput. Interact, vol.1, pp.1-24, 2017.

X. Liu, N. Krahnstoever, T. Yu, and P. Tu, What Are Customers Looking at?, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, pp.405-410, 2007.

D. Lundqvist, A. Flykt, and A. Öhman, The Karolinska Directed Emotional Faces -KDEF, 1998.

K. Martin and K. Shilton, Putting Mobile Application Privacy in Context: An Empirical Study of User Privacy Expectations for Mobile Devices, The Information Society, vol.32, issue.3, pp.200-216, 2016.

B. Meden, Z. Emersic, V. Struc, and P. Peer, k-Same-Net: Neural-Network-Based Face Deidentification, 2017 International Conference and Workshop on Bioinspired Intelligence (IWOBI), pp.1-7, 2017.

,

E. M. Newton, L. Sweeney, and B. Malin, Preserving Privacy by De-Identifying Face Images, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.2, pp.232-243, 2005.

J. R. Padilla-lópez, A. A. Chaaraoui, and F. Flórez-revuelta, Visual Privacy Protection Methods, Expert Syst. Appl, vol.42, issue.9, pp.4177-4195, 2015.

,

O. M. Parkhi, A. Vedaldi, and A. Zisserman, Deep Face Recognition, British Machine Vision Conference, 2015.

P. Samarati and L. Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression, 1998.

M. B. Stegmann, The AAM-API, 2003.

U. , Department of Health & Human Services: Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule, pp.2018-2020, 2015.

P. L. Venetianer, Z. Zhang, A. Scanlon, Y. Hu, and A. J. Lipton, Video Verification of Point of Sale Transactions, 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, pp.411-416, 2007.

,

T. Winkler and B. Rinner, Security and Privacy Protection in Visual Sensor Networks: A Survey, ACM Comput. Surv, vol.47, issue.1, pp.1-42, 2014.