K. He, C. Bidan, G. L. Guelvouit, and C. Feron, Robust and secure image encryption schemes during JPEG compression process, Electronic Imaging, vol.2016, issue.11, pp.1-7, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01344471

G. K. Wallace, The JPEG still picture compression standard, IEEE Transactions on Consumer Electronics, vol.38, issue.1, 1992.

A. Unterweger and A. Uhl, Length-preserving Bit-stream-based JPEG Encryption, Proceedings of the on Multimedia and security, pp.85-90, 2012.

K. Minemura, Z. Moayed, K. Wong, X. Qi, and K. Tanaka, JPEG image scrambling without expansion in bitstream size, IEEE International Conference on Image Processing (ICIP), pp.261-264, 2012.

W. Puech, A. Bors, and J. Rodrigues, Protection of colour images by selective encryption, Advanced Color Image Processing and Analysis, pp.397-421, 2013.

X. Niu, C. Zhou, J. Ding, and B. Yang, JPEG encryption with file size preservation, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.308-311, 2008.

S. Ong, K. Wong, X. Qi, and K. Tanaka, Beyond format-compliant encryption for JPEG image, Signal Processing: Image Communication, vol.31, pp.47-60, 2015.

A. Said, Measuring the strength of partial encryption schemes, IEEE International Conference on Image Processing (ICIP), vol.2, pp.1126-1129, 2005.

M. Pinto, W. Puech, and G. Subsol, Protection of JPEG compressed e-comics by selective encryption, IEEE International Conference on Image Processing (ICIP), pp.4588-4592, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-01379600

W. Li and Y. Yuan, A leak and its remedy in JPEG image encryption, International Journal of Computer Mathematics, vol.84, issue.9, pp.1367-1378, 2007.

K. Minemura, K. Wong, R. C. Phan, and K. Tanaka, A novel sketch attack for H. 264/AVC format-compliant encrypted video, IEEE Transactions on Circuits and Systems for Video Technology, vol.27, pp.2309-2321, 2017.

D. Schonberg, S. Draper, and K. Ramchandran, On compression of encrypted images, IEEE International Conference on Image Processing (ICIP), pp.269-272, 2006.

R. Lazzeretti and M. Barni, Lossless compression of encrypted grey-level and color images, IEEE European Signal Processing Conference (EUSIPCO), pp.1-5, 2008.

G. Zhang, S. Liu, F. Jiang, D. Zhao, and W. Gao, An improved image compression scheme with an adaptive parameters set in encrypted domain, Visual Communications and Image Processing, pp.1-6, 2013.

S. Chan, Recompression of still images, 1992.

H. H. Bauschke, C. H. Hamilton, M. S. Macklem, J. S. Mcmichael, and N. R. Swart, Recompression of JPEG images by requantization, IEEE Transactions on Image Processing, vol.12, issue.7, pp.843-849, 2003.

M. Carnein, P. Schöttle, and R. Böhme, Telltale watermarks for counting JPEG compressions, Electronic Imaging, vol.2016, issue.8, pp.1-10, 2016.

A. Lewis and M. G. Kuhn, Exact JPEG recompression, Visual Information Processing and Communication, vol.7543, 2010.

E. Hamilton, JPEG file interchange format, 2004.

W. Trappe and L. C. Washington, Introduction to cryptography with coding theory, 2006.

K. Usman, H. Juzoji, I. Nakajima, S. Soegidjoko, M. Ramdhani et al., Medical image encryption based on pixel arrangement and random permutation for transmission security, International Conference on e-Health Networking, pp.244-247, 2007.

P. Premaratne and M. Premaratne, Key-based scrambling for secure image communication, International Conference on Intelligent Computing, 2012.

C. V. Wright, W. Feng, and F. Liu, Thumbnail-preserving encryption for JPEG, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp.141-146, 2015.

G. Chen, Y. Mao, and C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, vol.21, issue.3, pp.749-761, 2004.

Y. Mao, G. Chen, and S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps, International Journal of Bifurcation and chaos, vol.14, issue.10, pp.3613-3624, 2004.

Z. Guan, F. Huang, and W. Guan, Chaos-based image encryption algorithm, Physics Letters A, vol.346, issue.1, pp.153-157, 2005.

T. Xiang, K. Wong, and X. Liao, Selective image encryption using a spatiotemporal chaotic system, Chaos: An Interdisciplinary Journal of Nonlinear Science, vol.17, issue.2, p.23115, 2007.

Z. Zhu, W. Zhang, K. Wong, and H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences, vol.181, issue.6, pp.1171-1186, 2011.

G. Chen and T. Ueta, Yet another chaotic attractor, International Journal of Bifurcation and chaos, vol.9, issue.07, pp.1465-1466, 1999.

C. Shi and B. Bhargava, A fast MPEG video encryption algorithm, Proceedings of the Sixth ACM International Conference on Multimedia, ser. MULTIMEDIA '98, pp.81-88, 1998.

M. Van-droogenbroeck and R. Benedett, Techniques for a selective encryption of uncompressed and compressed images, Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), pp.90-97, 2002.

W. Puech and J. M. Rodrigues, Crypto-compression of medical images by selective encryption of DCT, IEEE European Signal Processing Conference (EUSIPCO), pp.1-4, 2005.
URL : https://hal.archives-ouvertes.fr/lirmm-00106485

Z. Shahid, M. Chaumont, and W. Puech, Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames, IEEE Transactions on Circuits and Systems for Video Technology, vol.21, issue.5, pp.565-576, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00416013

W. Hamidouche, M. Farajallah, N. Sidaty, S. E. Assad, and O. Deforges, Real-time selective video encryption based on the chaos system in scalable HEVC extension, Signal Processing: Image Communication, vol.58, pp.73-86, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01547038

F. Dufaux and T. Ebrahimi, Scrambling for privacy protection in video surveillance systems, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, pp.1168-1174, 2008.

K. Kurihara, S. Imaizumi, S. Shiota, and H. Kiya, An encryption-then-compression system for lossless image compression standards, IEICE TRANSACTIONS on Information and Systems, vol.100, issue.1, pp.52-56, 2017.

T. Chuman, K. Kurihara, and H. Kiya, On the security of block scrambling-based ETC systems against jigsaw puzzle solver attacks, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2157-2161, 2017.

K. Kurihara, S. Shiota, and H. Kiya, An encryption-then-compression system for JPEG standard, Picture Coding Symposium (PCS), pp.119-123, 2015.

O. Watanabe, A. Uchida, T. Fukuhara, and H. Kiya, An encryption-then-compression system for JPEG 2000 standard, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1226-1230, 2015.

J. Zhou, X. Liu, O. C. Au, and Y. Y. Tang, Designing an efficient image encryption-thencompression system via prediction error clustering and random permutation, IEEE Transactions of Information Forensics and Security, vol.9, issue.1, pp.39-50, 2014.

D. Engel, T. Stütz, and A. Uhl, A survey on JPEG2000 encryption, Multimedia systems, vol.15, issue.4, pp.243-270, 2009.

F. Dufaux, S. Wee, J. Apostolopoulos, and T. Ebrahimi, JPSEC for Secure Imaging in JPEG 2000, SPIE Proc. Applications of Digital Image Processing XXVII, 2004.

R. Norcen and A. Uhl, Encryption of wavelet-coded imagery using random permutations, IEEE International Conference on Image Processing (ICIP), vol.5, pp.3431-3434, 2004.

S. Lian, J. Sun, and Z. Wang, Perceptual cryptography on JPEG2000 compressed images or videos, International Conference on Computer and Information Technology, pp.78-83, 2004.

M. Grangetto, E. Magli, and G. Olmo, Multimedia selective encryption by means of randomized arithmetic coding, IEEE Transactions on Multimedia, vol.8, issue.5, pp.905-917, 2006.

G. Schaefer and M. Stich, UCID-an uncompressed color image database, Proceedings of SPIE in Storage and Retrieval Methods Applications for Multimedia, vol.5307, pp.472-480, 2004.

M. Van-droogenbroeck, Partial encryption of images for real-time applications, Fourth IEEE Signal Processing Symposium, pp.11-15, 2004.

S. Lian, J. Sun, and Z. Wang, A novel image encryption scheme based-on JPEG encoding, IEEE International Conference on Information Visualisation, pp.217-220, 2004.

, He was teaching assistant at the University of Montpellier, France in 2016. He did one year Post-Doctoral at the IMT Lille Douai. Currently, he is a Post-Doctoral Researcher at the University of Montpellier, 2012 and the Ph.D. degree in Computer Science from the University of, 2015.

, She is currently pursuing a Ph.D. degree with the Laboratory of Informatics, Pauline Puteaux received the M.S. degree in Computer Science and Applied Mathematics, with specialization in Cybersecurity, 2017.

, France (1991) and a Ph.D. Degree in Signal-Image-Speech from the Polytechnic National Institute of Grenoble, France (1997) with research activities in image processing and computer vision, he has been an Associate Professor at the Univ, 1997.