J. Herrera-joancomartí, S. Katzenbeisser, D. Megías, J. Minguillón, A. Pommer et al., ECRYPT European Network of Excellence in Cryptology , first summary report on hybrid systems, D.WVL, vol.5, 2005.

S. Lian, Multimedia Content Encryption, 2009.

S. Lian, Quasi-commutative watermarking and encryption for secure media content distribution, Multimedia Tools and Applications, vol.8, issue.11, pp.91-107, 2009.
DOI : 10.1007/s11042-008-0258-4

S. Lian, Z. Liu, R. Zhen, and H. Wang, Commutative watermarking and encryption for media data, Optical Engineering, vol.45, issue.8, 2006.
DOI : 10.1117/1.2333510

F. Battisti, M. Cancellaro, G. Boato, M. Carli, and A. Neri, Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain, EURASIP Journal on Advances in Signal Processing, vol.106, issue.3, 2009.
DOI : 10.1023/A:1020385811959

G. Boato, V. Conotter, F. G. Denatale, and C. Fontanari, A joint asymmetric watermarking and image encryption scheme, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, p.68191, 2008.
DOI : 10.1117/12.765344

Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, Reversible data hiding, IEEE Trans. Circuits and Systems for Video Technology, vol.16, issue.3, pp.354-361, 2006.

D. Coltuc and P. Bolon, Robust watermarking by histogram specification, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), pp.236-239, 1999.
DOI : 10.1109/ICIP.1999.822891

G. Chareyron, D. Coltuc, and A. Trémeau, Watermarking and Authentication of Color Images Based on Segmentation of the xyZ Color Space, Journal of Imaging Science and Technology, vol.50, issue.5, pp.411-423, 2006.
DOI : 10.2352/J.ImagingSci.Technol.(2006)50:5(411)

S. Roy and E. C. Chang, Watermarking color histograms, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.2191-2194, 2004.
DOI : 10.1109/ICIP.2004.1421531

C. H. Lin, D. Y. Chan, H. Su, and W. S. Hsieh, Histogram-oriented watermarking algorithm: colour image watermarking scheme robust against geometric attacks and signal processing, IEE Proc. Vision, Image and Signal Processing, pp.483-492, 2006.
DOI : 10.1049/ip-vis:20050107

E. Chrysochos, V. Fotopoulos, A. N. Skodras, and M. Xenos, Reversible image watermarking based on histogram modification, Proc. 11th Panhellenic Conf. Informatics, pp.93-104, 2007.

C. Chen, J. Ni, and J. Huang, Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, Proc. 8th Int. Workshop Digital Watermarking, pp.81-95, 2009.
DOI : 10.1109/TMM.2007.906580

M. Gaubatz, MeTriX MuX visual quality assessment package

J. Slater, Scrambler: TV signal encryption, Electronics Today Int. (ETI), vol.19, pp.16-20, 1990.

W. Zeng and S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia, vol.5, issue.1, pp.118-129, 2003.
DOI : 10.1109/TMM.2003.808817

S. Li, C. Li, G. Chen, N. G. Bourbakis, and K. T. Lo, A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Processing: Image Communication, vol.23, issue.3, pp.212-223, 2008.
DOI : 10.1016/j.image.2008.01.003

D. Knuth, The Art of Computer Programming Sorting and Searching, 1998.

J. Fridrich, Symmetric Ciphers Based on Two-Dimensional Chaotic Maps, International Journal of Bifurcation and Chaos, vol.31, issue.4, pp.1259-1284, 1998.
DOI : 10.1080/0161-118991863934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.5132

G. Chen, Y. Mao, and C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, vol.21, issue.3, pp.749-761, 2004.
DOI : 10.1016/j.chaos.2003.12.022

E. Hadjidemetriou, M. D. Grossberg, and S. K. Nayar, Histogram preserving image transformations, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662), pp.5-23, 2001.
DOI : 10.1109/CVPR.2000.855848

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.4242

X. Zhang, Lossy Compression and Iterative Reconstruction for Encrypted Image, IEEE Transactions on Information Forensics and Security, vol.6, issue.1
DOI : 10.1109/TIFS.2010.2099114

F. J. Dyson and H. Falk, Period of a Discrete Cat Mapping, The American Mathematical Monthly, vol.99, issue.7, pp.603-614, 1992.
DOI : 10.2307/2324989

K. W. Wong, Image Encryption Using Chaotic Maps, Intelligent Computing Based on Chaos, pp.333-354, 2009.
DOI : 10.1007/978-3-540-95972-4_16