Image quality assessment: from error visibility to structural similarity, IEEE transactions on image processing, vol.13, issue.4, pp.600-612, 2004. ,
Image information and visual quality, IEEE Transactions on Image Processing, vol.15, issue.2, pp.430-444, 2006. ,
Visual security assessment for cipher-images based on neighborhood similarity, Informatica, vol.33, issue.1, 2009. ,
Visual security evaluation for video encryption, Proceedings of the 18th ACM international conference on Multimedia, pp.835-838, 2010. ,
An objective visual security assessment for cipher-images based on local entropy, Multimedia Tools and Applications, vol.53, pp.75-95, 2011. ,
Identifying deficits of visual security metrics for images, Signal Processing: Image Communication, vol.46, pp.60-75, 2016. ,
The JPEG still picture compression standard, IEEE transactions on consumer electronics, vol.38, issue.1, pp.xviii-xxxiv, 1992. ,
Measuring the strength of partial encryption schemes, IEEE International Conference on Image Processing, vol.2, p.1126, 2005. ,
Selective encryption of human skin in JPEG images, 2006 International Conference on Image Processing, pp.1981-1984, 2006. ,
Protection of JPEG compressed e-comics by selective encryption, 2013 IEEE International Conference on Image Processing, pp.4588-4592, 2013. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01379600
Reversible data hiding in encrypted JPEG bitstream, IEEE Transactions on Multimedia, vol.16, issue.5, pp.1486-1491, 2014. ,
JPEG encryption with file size preservation, Intelligent Information Hiding and Multimedia Signal Processing, pp.308-311, 2008. ,
Lengthpreserving bit-stream-based JPEG encryption, Proceedings of the on Multimedia and security, pp.85-90, 2012. ,
JPEG image scrambling without expansion in bitstream size, 2012 19th IEEE International Conference on Image Processing, pp.261-264, 2012. ,
Beyond format-compliant encryption for JPEG image, Signal Processing: Image Communication, vol.31, pp.47-60, 2015. ,
A leak and its remedy in JPEG image encryption, International Journal of Computer Mathematics, vol.84, issue.9, pp.1367-1378, 2007. ,
, Advanced Color Image Processing and Analysis, 2013.
Contour detection and hierarchical image segmentation, IEEE Trans. Pattern Anal. Mach. Intell, vol.33, issue.5, pp.898-916, 2011. ,
Security evaluation for communication-friendly encryption of multimedia, Image Processing, 2004. ICIP'04. 2004 International Conference on. IEEE, vol.1, pp.569-572, 2004. ,
A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, vol.21, issue.3, pp.749-761, 2004. ,
A novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and Chaos, vol.14, issue.10, pp.3613-3624, 2004. ,
Image utility estimation using difference-of-gaussian scale space, Image Processing (ICIP), pp.101-105, 2016. ,
A model of saliency-based visual attention for rapid scene analysis, IEEE Transactions, vol.20, issue.11, pp.1254-1259, 1998. ,
An isotropic 3× 3 image gradient operator, Machine Vision for three-demensional Sciences, 1990. ,