A. Uhl and A. Pommer, Image and Video Encryption. From digital Rights Management to Secured Personal Communication, 2005.

K. Martin, R. Lukac, and K. N. Plataniotis, Efficient encryption of wavelet-based coded color images, Pattern Recognition, vol.38, issue.7, pp.1111-1115, 2005.
DOI : 10.1016/j.patcog.2005.01.002

J. Rodrigues, W. Puech, and A. G. Bors, Selective Encryption of Human Skin in JPEG Images, 2006 International Conference on Image Processing, pp.1981-1984, 2006.
DOI : 10.1109/ICIP.2006.312886

URL : https://hal.archives-ouvertes.fr/lirmm-00129520

W. Zeng and S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia, vol.5, issue.1, pp.118-129, 2003.
DOI : 10.1109/TMM.2003.808817

F. Dufaux and T. Ebrahimi, Scrambling for Privacy Protection in Video Surveillance Systems, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, issue.8, pp.1168-1174, 2008.
DOI : 10.1109/TCSVT.2008.928225

S. Lian, Z. Liu, Z. Ren, and H. Wang, Commutative Encryption and Watermarking in Video Compression, IEEE Transactions on Circuits and Systems for Video Technology, vol.17, issue.6, pp.774-778, 2007.
DOI : 10.1109/TCSVT.2007.896635

Z. Shahid, M. Chaumont, and W. Puech, Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames, IEEE Transactions on Circuits and Systems for Video Technology, vol.21, issue.5, pp.565-576, 2011.
DOI : 10.1109/TCSVT.2011.2129090

URL : https://hal.archives-ouvertes.fr/lirmm-00416013

S. K. Au-yeung, S. Zhu, and B. Zeng, Perceptual Video Encryption using multiple 8x8 transforms in H, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp.2436-2439, 2011.

A. Said, Measuring the Strength of Partial Encryption Scheme, IEEE Int. Conf. on Image Processing, pp.1126-1129, 2005.

L. Dubois, W. Puech, and J. Blanc-talon, Smart selective encryption of CAVLC for H.264/AVC video, 2011 IEEE International Workshop on Information Forensics and Security, 2011.
DOI : 10.1109/WIFS.2011.6123130

A. W. Senior and S. Pankanti, Privacy Protection and Face Recognition, Handbook of Face Recognition, pp.671-691, 2011.
DOI : 10.1007/978-0-85729-932-1_27

W. Lu, A. L. Varna, and M. Wu, Secure video processing: Problems and challenges, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5856-5859, 2011.
DOI : 10.1109/ICASSP.2011.5947693

S. Avidan and M. Butman, Efficient methods for privacy preserving face detection, Advances in Neural Information Processing Systems, pp.57-64, 2007.

Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. L. Lagendijk et al., Privacy-Preserving Face Recognition, Privacy Enhancing Technologies Symposium, pp.235-253, 2009.
DOI : 10.1007/978-3-642-03168-7_14

A. Sadeghi, T. Schneider, and I. Wehrenberg, Efficient Privacy-Preserving Face Recognition, Int. Conf. on Information security and cryptology, pp.229-244, 2010.
DOI : 10.1007/978-3-642-14423-3_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.7646

M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, Efficient privacy preserving video surveillance, 2009 IEEE 12th International Conference on Computer Vision, pp.1639-1646, 2009.
DOI : 10.1109/ICCV.2009.5459370

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3901

]. H. Sohn, K. N. Plataniotis, and Y. M. Ro, Privacy-preserving watch list screening in video surveillance system, " in Pacific Rim conference on Advances in multimedia information processing: Part I, pp.622-632, 2010.

M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, pp.239-254, 2010.
DOI : 10.1109/SP.2010.39

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology, EUROCRYPT, pp.233-238, 1999.
DOI : 10.1007/3-540-48910-X_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035

I. Damgård and M. Jurik, A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, International Workshop on Practice and Theory in Public Key Cryptosystems, pp.119-136, 2001.
DOI : 10.7146/brics.v7i45.20212

M. Barni, T. Bianchi, D. Catalano, M. Di-raimondo, R. Donida-labati et al., Privacy-preserving fingercode authentication, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp.231-240, 2010.
DOI : 10.1145/1854229.1854270

URL : http://hdl.handle.net/2434/148696

J. Bringer, H. Chabanne, M. Izabachene, D. Pointcheval, Q. Tang et al., An application of the goldwassermicali cryptosystem to biometric authentication, Australasian Conf. on Information Security and Privacy, pp.96-106, 2007.

M. Barbosa, T. Brouard, S. Cauchie, and S. De-sousa, Secure Biometric Authentication with Improved Accuracy, Australasian Conf. on Information Security and Privacy, pp.21-36, 2008.
DOI : 10.1007/978-3-540-70500-0_3

URL : https://hal.archives-ouvertes.fr/hal-01026386

M. Blanton and P. Gasti, Secure and Efficient Protocols for Iris and Fingerprint Identification, European Symposium on Research in Computer Security, 2011.
DOI : 10.1007/978-3-642-23822-2_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.4076

C. Castelluccia, A. Chan, E. Mykletun, and G. Tsudik, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks, vol.5, issue.3, pp.1-2036, 2009.
DOI : 10.1145/1525856.1525858

Z. Erkin, M. Beye, T. Veugen, and R. ?. Lagendijk, Efficiently computing private recommendations, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5864-5867, 2011.
DOI : 10.1109/ICASSP.2011.5947695

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.398.4330

M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, Privacy-preserving ECG classification with branching programs and neural networks Information Forensics and Security, IEEE Trans. on, vol.6, issue.2, pp.452-468, 2011.
DOI : 10.1109/tifs.2011.2108650

C. Orlandi, A. Piva, and M. Barni, Oblivious neural network computing via homomorphic encryption, EURASIP Journal on Information Security, vol.207, pp.1-11, 2007.

T. Sadeghi and . Schneider, Secure evaluation of private linear branching programs with medical applications, European Symposium on Research in Computer Security, 2009.