Z. Wang, A. C. Bovik, R. Hamid, . Sheikh, and . Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE transactions on image processing, vol.13, issue.4, pp.600-612, 2004.

R. Hamid, A. C. Sheikh, and . Bovik, Image information and visual quality, IEEE Transactions on Image Processing, vol.15, issue.2, pp.430-444, 2006.

Y. Yao, Z. Xu, and J. Sun, Visual security assessment for cipher-images based on neighborhood similarity, Informatica, vol.33, issue.1, 2009.

L. Tong, F. Dai, Y. Zhang, and J. Li, Visual security evaluation for video encryption, Proceedings of the 18th ACM international conference on Multimedia, pp.835-838, 2010.

J. Sun, Z. Xu, J. Liu, and Y. Yao, An objective visual security assessment for cipher-images based on local entropy, Multimedia Tools and Applications, vol.53, pp.75-95, 2011.

H. Hofbauer and A. Uhl, Identifying deficits of visual security metrics for images, Signal Processing: Image Communication, vol.46, pp.60-75, 2016.

. Gregory-k-wallace, The JPEG still picture compression standard, IEEE transactions on consumer electronics, vol.38, issue.1, pp.xviii-xxxiv, 1992.

A. Said, Measuring the strength of partial encryption schemes, IEEE International Conference on Image Processing, vol.2, p.1126, 2005.

W. José-m-rodrigues, A. G. Puech, and . Bors, Selective encryption of human skin in JPEG images, 2006 International Conference on Image Processing, pp.1981-1984, 2006.

M. Pinto, W. Puech, and G. Subsol, Protection of JPEG compressed e-comics by selective encryption, 2013 IEEE International Conference on Image Processing, pp.4588-4592, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-01379600

Z. Qian, X. Zhang, and S. Wang, Reversible data hiding in encrypted JPEG bitstream, IEEE Transactions on Multimedia, vol.16, issue.5, pp.1486-1491, 2014.

X. Niu, C. Zhou, J. Ding, and B. Yang, JPEG encryption with file size preservation, Intelligent Information Hiding and Multimedia Signal Processing, pp.308-311, 2008.

A. Unterweger and A. Uhl, Lengthpreserving bit-stream-based JPEG encryption, Proceedings of the on Multimedia and security, pp.85-90, 2012.

K. Minemura, Z. Moayed, K. Wong, X. Qi, and K. Tanaka, JPEG image scrambling without expansion in bitstream size, 2012 19th IEEE International Conference on Image Processing, pp.261-264, 2012.

S. Ong, K. Wong, X. Qi, and K. Tanaka, Beyond format-compliant encryption for JPEG image, Signal Processing: Image Communication, vol.31, pp.47-60, 2015.

W. Li and Y. Yuan, A leak and its remedy in JPEG image encryption, International Journal of Computer Mathematics, vol.84, issue.9, pp.1367-1378, 2007.

A. G. Bors, W. Puech, and J. Rodrigues, Advanced Color Image Processing and Analysis, 2013.

P. Arbelaez, M. Maire, C. Fowlkes, and J. Malik, Contour detection and hierarchical image segmentation, IEEE Trans. Pattern Anal. Mach. Intell, vol.33, issue.5, pp.898-916, 2011.

Y. Mao and M. Wu, Security evaluation for communication-friendly encryption of multimedia, Image Processing, 2004. ICIP'04. 2004 International Conference on. IEEE, vol.1, pp.569-572, 2004.

G. Chen, Y. Mao, and C. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, vol.21, issue.3, pp.749-761, 2004.

Y. Mao, G. Chen, and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and Chaos, vol.14, issue.10, pp.3613-3624, 2004.

T. Edward, S. S. Scott, and . Hemami, Image utility estimation using difference-of-gaussian scale space, Image Processing (ICIP), pp.101-105, 2016.

L. Itti, C. Koch, and E. Niebur, A model of saliency-based visual attention for rapid scene analysis, IEEE Transactions, vol.20, issue.11, pp.1254-1259, 1998.

I. Sobel, An isotropic 3× 3 image gradient operator, Machine Vision for three-demensional Sciences, 1990.