“…For this reason, previous work in the HCI and security communities studied obfuscation methods in terms of both: their effectiveness in concealing identities and their impact on perceived visual aesthetics of photos. Obfuscation methods that have been studied extensively include blurring [1,16,27,28], pixelating [5,23,28,39], masking [23,28,42], replacement with avatar [28,33], cartooning [13,33] and inpainting [8,28,31,41].…”