I. Draft, Recommendation and Final Draft International Standard of 803 Joint Video Specification (ITU-T Rec, 804 document JVT-G050, Joint Video Team (JVT), p.805, 2003.

M. Abomhara, O. Zakaria, O. Khalifa, A. Zaiden, and B. Zaiden, En-806 hancing selective encryption for H.264/AVC using advanced encryption 807 standard, Int. J. Comput. Electric. Eng, vol.2, issue.808, pp.223-229

M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, Format-810 preserving encryption, Proc. 16th Annu. Int. Workshop Selected 811 Areas Cryptography, pp.295-312, 2009.
DOI : 10.1007/978-3-642-05445-7_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Bjontegaard and K. Lillevold, Context-Adaptive VLC Coding of 813 Coefficients, document JVT-C028, Joint Video Team, p.815, 2002.

P. Carrillo, H. Kalva, and S. Magliveras, Compression independent 816 reversible encryption for privacy in video surveillance, p.4

H. Cheng and X. Li, Partial encryption of compressed images and videos, IEEE Transactions on Signal Processing, vol.48, issue.8, pp.2439-2445
DOI : 10.1109/78.852023

J. Daemen and V. Rijmen, AES proposal: The Rijndael clock cipher, Proton World Int, p.823

M. V. Droogenbroeck and R. Benedett, Techniques for a selective 825 encryption of uncompressed and compressed images, Proc. ACIVS, p.826

F. Dufaux and T. Ebrahimi, Scrambling for Privacy Protection in Video Surveillance Systems, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, issue.8, pp.1168-1174, 2008.
DOI : 10.1109/TCSVT.2008.928225

M. M. Fisch, H. Stgner, and A. Uhl, Layered encryption techniques 831 for DCT-coded visual data, Proc. 12th EUSIPCO, pp.832-821, 2004.

M. Grangetto, E. Magli, and G. Olmo, Multimedia selective encryption 834 by means of randomized arithmetic coding, IEEE Trans. Multimedia, vol.835, issue.8 5, pp.905-917, 2006.

G. Jakimoski and K. Subbalakshmi, Cryptanalysis of some multimedia 837 encryption schemes, IEEE Trans. Multimedia, vol.10, issue.3, pp.838-330, 2008.

W. Jiangtao, K. Hyungjin, and J. Villasenor, Binary arithmetic coding with key-based interval splitting, Proc. PCM, pp.69-72, 2006.
DOI : 10.1109/LSP.2005.861589

]. S. Lian, Z. Liu, Z. Ren, and Z. Wang, Selective video encryption based 845 on advanced video coding, Proc. PCM, pp.281-290, 2005.
DOI : 10.1007/11582267_25

]. S. Lian, Z. Liu, Z. Ren, and H. Wang, Commutative encryption and 847 watermarking in video compression, IEEE Trans. Circuits Syst, vol.846, issue.848

]. E. Technol, A. Lin, R. Eskicioglu, E. Lagendijk, and . Delp, Advances in digital 850 video content protection Selective encryption for consumer 853 applications Bit-level based secret sharing for image 856 encryption Context-based adaptive binary 858 arithmetic coding in the H, Proc. IEEEAVC video compression standard, pp.774-778, 2004.

C. Trans, ]. K. Syst, R. Martin, K. Lukac, and . Plataniotis, Efficient encryption of wavelet- 862 based coded color images, Video Technol. Patt. Recog, vol.13, issue.38 7, pp.620-636, 2003.

]. I. Moccagatta, K. Ratakonda, S. Ou, H. Chung, and W. Sung, A Performance Comparison of CABAC 865 and VCL-Based Entropy Coders for SD and HD Sequences, document 866 JVT-E079r2 Improving the compression and 868 encryption of images using FPGA-based cryptosystems, 2005.

]. W. Tools-applicat24, J. Puech, and . Rodrigues, A new crypto-watermarking method for 871 medical images safe transfer A selective encryption for 874 heterogenous color JPEG images based on VLC and AES stream cipher, Proc. 12th EUSIPCO 875 in Proc. Eur. Conf. CGIV, pp.5-22, 2004.

J. Rodrigues, W. Puech, and A. Bors, Selective encryption of human 877 skin in JPEG images, Proc. IEEE Int. Conf. Image Process, pp.1981-1984, 2006.

Z. Shahid, M. Chaumont, and W. Puech, Applied Cryptography Fast protection of H.264/AVC 883 by selective encryption, Proc. SinFra IPAL Symp, pp.881-882, 1995.

]. Z. Shahid, M. Chaumont, and W. Puech, Fast protection of H.264/AVC 886 by selective encryption of CABAC for I&P frames, Proc. 17th 887 EUSIPCO, pp.885-2201, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00416013

D. R. Stinson, Cryptography: Theory and Practice (Discrete Mathemat- 889 ics and Its Applications), p.890

. Nov, Methods for encrypting and decrypting MPEG video data 892 efficiently, Proc. ACM Multimedia, pp.891-219, 1996.

]. Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, Image quality 894 assessment: From error visibility to structural similarity, IEEE Trans, vol.893
DOI : 10.1109/tip.2003.819861

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

]. J. Wen, M. Severa, W. Zeng, M. Luttrell, W. T. Jin et al., A format- 897 compliant configurable encryption framework for access control of 898 video, Image Process. IEEE Trans. Circuits Syst. Video Technol. IEEE Trans. Circuits Syst, vol.1335, issue.12 6, pp.600-612, 2002.

]. Wu and C. Kuo, Design of integrated multimedia compression 904 and encryption systems A new concept of security 907 camera monitoring with privacy protection by masking moving objects, 908 in Proc. Adv. Multimedia Inform. Process, pp.560-576, 0903.

S. Zeng and . Lei, Efficient frequency domain selective scrambling 911 of digital video Method and system for fast 914 context based adaptive binary arithmetic coding, IEEE Trans. Multimedia, vol.5, issue.1, pp.910-118, 2003.

C. Clara, where he was involved in the research and development in the do-928 main of video processing. His current research interests include compression, 929 watermarking, and encryption of scalable video, p.930

. France, He received the Engineering Diploma degree 932 from the National Institute of Applied Sciences 933 (INSA), 1999, and the Ph.D. 934 degree from the IRISA Rennes, p.935

H. D. Ph, thesis was about video objects rep-938 resentations, with dynamic coding and scalability 939 functionalities, in the video compression area. He 940 has carried on research activities for one year at the 941

F. Bayonne, as a Visiting Assistant Professor During this last year, he 943 focused on face tracking using a deformable 3-D face model, p.945, 2005.

. N??mesn??mes and F. N??mesn??mes, His current research interests include watermarking, 947 steganography, video compression, and to a lesser extent segmentation and 948 tracking in videos, p.949