Image and Video Encryption. From digital Rights Management to Secured Personal Communication, 2005. ,
Efficient encryption of wavelet-based coded color images, Pattern Recognition, vol.38, issue.7, pp.1111-1115, 2005. ,
DOI : 10.1016/j.patcog.2005.01.002
Selective Encryption of Human Skin in JPEG Images, 2006 International Conference on Image Processing, pp.1981-1984, 2006. ,
DOI : 10.1109/ICIP.2006.312886
URL : https://hal.archives-ouvertes.fr/lirmm-00129520
Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia, vol.5, issue.1, pp.118-129, 2003. ,
DOI : 10.1109/TMM.2003.808817
Scrambling for Privacy Protection in Video Surveillance Systems, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, issue.8, pp.1168-1174, 2008. ,
DOI : 10.1109/TCSVT.2008.928225
Commutative Encryption and Watermarking in Video Compression, IEEE Transactions on Circuits and Systems for Video Technology, vol.17, issue.6, pp.774-778, 2007. ,
DOI : 10.1109/TCSVT.2007.896635
Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames, IEEE Transactions on Circuits and Systems for Video Technology, vol.21, issue.5, pp.565-576, 2011. ,
DOI : 10.1109/TCSVT.2011.2129090
URL : https://hal.archives-ouvertes.fr/lirmm-00416013
Perceptual Video Encryption using multiple 8x8 transforms in H, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp.2436-2439, 2011. ,
Measuring the Strength of Partial Encryption Scheme, IEEE Int. Conf. on Image Processing, pp.1126-1129, 2005. ,
Smart selective encryption of CAVLC for H.264/AVC video, 2011 IEEE International Workshop on Information Forensics and Security, 2011. ,
DOI : 10.1109/WIFS.2011.6123130
Privacy Protection and Face Recognition, Handbook of Face Recognition, pp.671-691, 2011. ,
DOI : 10.1007/978-0-85729-932-1_27
Secure video processing: Problems and challenges, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5856-5859, 2011. ,
DOI : 10.1109/ICASSP.2011.5947693
Efficient methods for privacy preserving face detection, Advances in Neural Information Processing Systems, pp.57-64, 2007. ,
Privacy-Preserving Face Recognition, Privacy Enhancing Technologies Symposium, pp.235-253, 2009. ,
DOI : 10.1007/978-3-642-03168-7_14
Efficient Privacy-Preserving Face Recognition, Int. Conf. on Information security and cryptology, pp.229-244, 2010. ,
DOI : 10.1007/978-3-642-14423-3_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.7646
Efficient privacy preserving video surveillance, 2009 IEEE 12th International Conference on Computer Vision, pp.1639-1646, 2009. ,
DOI : 10.1109/ICCV.2009.5459370
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3901
Privacy-preserving watch list screening in video surveillance system, " in Pacific Rim conference on Advances in multimedia information processing: Part I, pp.622-632, 2010. ,
SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, pp.239-254, 2010. ,
DOI : 10.1109/SP.2010.39
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology, EUROCRYPT, pp.233-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035
A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, International Workshop on Practice and Theory in Public Key Cryptosystems, pp.119-136, 2001. ,
DOI : 10.7146/brics.v7i45.20212
Privacy-preserving fingercode authentication, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, pp.231-240, 2010. ,
DOI : 10.1145/1854229.1854270
URL : http://hdl.handle.net/2434/148696
An application of the goldwassermicali cryptosystem to biometric authentication, Australasian Conf. on Information Security and Privacy, pp.96-106, 2007. ,
Secure Biometric Authentication with Improved Accuracy, Australasian Conf. on Information Security and Privacy, pp.21-36, 2008. ,
DOI : 10.1007/978-3-540-70500-0_3
URL : https://hal.archives-ouvertes.fr/hal-01026386
Secure and Efficient Protocols for Iris and Fingerprint Identification, European Symposium on Research in Computer Security, 2011. ,
DOI : 10.1007/978-3-642-23822-2_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.4076
Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks, vol.5, issue.3, pp.1-2036, 2009. ,
DOI : 10.1145/1525856.1525858
Efficiently computing private recommendations, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5864-5867, 2011. ,
DOI : 10.1109/ICASSP.2011.5947695
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.398.4330
Privacy-preserving ECG classification with branching programs and neural networks Information Forensics and Security, IEEE Trans. on, vol.6, issue.2, pp.452-468, 2011. ,
DOI : 10.1109/tifs.2011.2108650
Oblivious neural network computing via homomorphic encryption, EURASIP Journal on Information Security, vol.207, pp.1-11, 2007. ,
Secure evaluation of private linear branching programs with medical applications, European Symposium on Research in Computer Security, 2009. ,