S. Jenisch and A. Uhl, A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images, EURASIP Journal on Information Security, vol.2014, issue.1, 2014.
DOI : 10.1109/TIP.2003.819861

A. Yeung, S. K. Zhu, S. Zeng, and B. , Quality assessment for a perceptual video encryption system, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp.102-106, 2010.
DOI : 10.1109/WCINS.2010.5541898

M. I. Khan, V. Jeoti, and A. S. Malik, On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images, of Communications in Computer and Information Science, pp.212-223, 2010.
DOI : 10.1007/11961635_22

M. V. Droogenbroeck and R. Benedett, Techniques for a selective encryption of uncompressed and compressed images, Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), pp.90-97, 2002.

S. K. Yeung, S. Zhu, and B. Zeng, Partial Video Encryption Based on Alternating Transforms, IEEE Signal Processing Letters, vol.16, issue.10, pp.893-896, 2009.
DOI : 10.1109/LSP.2009.2026109

L. Tong, F. Dai, Y. Zhang, and J. Li, Visual security evaluation for video encryption, Proceedings of the international conference on Multimedia, MM '10
DOI : 10.1145/1873951.1874091

Y. Mao and M. Wu, Security evaluation for communication-friendly encryption of multimedia, Proceedings of the IEEE International Conference on Image Processing, 2004.

J. Sun, Z. Xu, J. Liu, and Y. Yao, An objective visual security assessment for cipher-images based on local entropy, Multimedia Tools and Applications, vol.52, issue.4, pp.75-95, 2011.
DOI : 10.1007/s11042-010-0491-5

Y. Yao, Z. Xu, and J. Sun, Visual security assessment for cipher-images based on neighborhood similarity, Informatica, vol.33, pp.69-76, 2009.

D. G. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, pp.91-110, 2004.
DOI : 10.1023/B:VISI.0000029664.99615.94

T. Y. Chen, C. H. Huang, T. H. Chen, and C. C. Liu, Authentication of lossy compressed video data by semi-fragile watermarking, Proceedings of the IEEE International Conference on Image Processing, pp.2159-2162, 2004.

L. Huang, W. Zhou, R. Jiang, and A. Li, Data quality inspection of watermarked GIS vector map, 2010 18th International Conference on Geoinformatics, 2010.
DOI : 10.1109/GEOINFORMATICS.2010.5567694

H. Sohn, W. De-neve, and Y. M. Ro, Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR, IEEE Transactions on Circuits and Systems for Video Technology, vol.21, issue.2, pp.170-177, 2011.
DOI : 10.1109/TCSVT.2011.2106250

L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, Proceedings of the fourth ACM international conference on Multimedia , MULTIMEDIA '96, pp.219-229, 1996.
DOI : 10.1145/244130.244209

H. Sohn, W. Deneeve, and Y. Ro, Region-of-interest scrambling for scalable surveillance video using JPEG XR, Proceedings of the seventeen ACM international conference on Multimedia, MM '09, pp.861-864, 2009.
DOI : 10.1145/1631272.1631433