1Huang, C.T. et al. : Survey on securing data storage in the cloud. APSIPA Trans. Signal Inf. Process., 3 (e7) (2014).
2Lagendijk, R.; Erkin, Z.; Barni, M.: Encrypted signal processing for privacy protection: conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal. Process. Mag., 30 (1) (2013), 82–105.
3Zhou, J.; Liu, X.; Au, O.C.; Tang, Y.Y.: Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Security, 9 (1) (2014), 39–50.
4Ra, M.-R.; Govindan, R.; Ortega, A.: P3: toward privacy-preserving photo sharing, in Proc. of the 10th USENIX Conf. on Networked Systems Design and Implementation, 2013, 515–528.
5Zeng, W.; Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia, 5 (1) (2003), 118–129.
6Ito, I.; Kiya, H.: A new class of image registration for guaranteeing secure data management, in IEEE Int. Conf. on Image Processing (ICIP), 2008, 269–272.
7Kiya, H.; Ito, I.: Image matching between scrambled images for secure data management, in 16th European Signal Processing Conf. (EUSIPCO), 2008, 1–5.
8Ito, I.; Kiya, H.: One-time key based phase scrambling for phaseonly correlation between visually protected images. EURASIP J. Inf. Security, 2009 (841045) (2010), 1–11.
9Tang, Z.; Zhang, X.; Lan, W.: Efficient image encryption with block shuffling and chaotic map. Multimedia Tools Appl., 74 (15) (2015), 5429–5448.
10Li, C.; Lin, D.; Lü, J.: Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Trans. Multimedia, 24 (3) (2017), 64–71.
11Zhang, Y.; Xu, B.; Zhou, N.: A novel image compression-encryption hybrid algorithm based on the analysis sparse representation. Optical Commun., 392 (2017), 223–233.
12Erkin, Z. et al. : Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Security, 2007 (78943) (2007), 1–20.
13Nimbokar, K.G.; Sarode, M.V.; Ghonge, M.M.: A survey based on designing an efficient image encryption-then-compression system, in IJCA Proc. on National Level Technical Conf. X-PLORE 2014, vol, XPLORE2014, 2014, 6–8.
14Liu, T.Y.; Lin, K.J.; Wu, H.C.: Ecg data encryption then compression using singular value decomposition. IEEE J. Biomed. Health Inform., 22 (3) (2018), 707–713.
15Watanabe, O.; Uchida, A.; Fukuhara, T.; Kiya, H.: An encryption-then-compression system for jpeg 2000 standard, in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2015, 1226–1230.
16Kurihara, K.; Shiota, S.; Kiya, H.: An encryption-then-compression system for jpeg standard, in Picture Coding Symp. (PCS), 2015, 119–123.
17Kurihara, K.; Kikuchi, M.; Imaizumi, S.; Shiota, S.; Kiya, H.: An encryption-then-compression system for jpeg/motion jpeg standard. IEICE Trans. Fund. Electron. Comm. Comput. Sci., 98 (11) (2015), 2238–2245.
18Kurihara, K.; Watanabe, O.; Kiya, H.: An encryption-then-compression system for jpeg xr standard, in IEEE Int. Symp. Broadband Multimedia Systems and Broadcast (BMSB), 2016, 1–5.
19Kurihara, K.; Imaizumi, S.; Shiota, S.; Kiya, H.: An encryption-then-compression system for lossless image compression standards. IEICE Trans. Inf. Syst., E100-D (1) (2017), 52–56.
20Sirichotedumrong, W.; Chuman, T.; Imaizumi, S.; Kiya, H.: Grayscale-based block scrambling image encryption for social network services, in IEEE Int. Conf. on Multimedia and Expo (ICME), 2018, 1–6.
21Chuman, T.; Sirichotedumrong, W.; Kiya, H.: Encryption-then-compression systems using grayscale-based image encryption for jpeg images, IEEE Trans. Inf. Forensics Security, https://doi.org/10.1109/TIFS.2018.2881677.
22Liu, W.; Zeng, W.; Dong, L.; Yao, Q.: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process., 19 (4) (2010), 1097–1102.
23Hu, R.; Li, X.; Yang, B.: A new lossy compression scheme for encrypted gray-scale images, in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2014, 7387–7390.
24Johnson, M.; Ishwar, P.; Prabhakaran, V.; Schonberg, D.; Ramchandran, K.: On compressing encrypted data. IEEE Trans. Signal Process., 52 (10) (2004), 2992–3006.
25Gaata, M.T.; Hantoosh, F.F.: An efficient image encryption technique using chaotic logistic map and rc4 stream cipher. Int. J. Mod. Trends Eng. Res., 3 (9) (2016), 213–218.
26Wu, Y.; Noonan, J.P.; Yang, G.; Jin, H.: Image encryption using the two-dimensional logistic chaotic map. J. Electron. Imaging., 21 (1) (2012), 013014.
27Chuman, T.; Kurihara, K.; Kiya, H.: On the security of block scrambling-based etc systems against jigsaw puzzle solver attacks, in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), 2017, 2157–2161.
28Chuman, T.; Kurihara, K.; Kiya, H.: Security evaluation for block scrambling-based etc systems against extended jigsaw puzzle solver attacks, in IEEE Int. Conf. on Multimedia and Expo (ICME), 2017, 229–234.
29Chuman, T.; Kurihara, K.; Kiya, H.: On the security of block scrambling-based etc systems against extended jigsaw puzzle solver attacks. IEICE Trans. Inf. Syst., E101-D (1) (2018), 37–44.
30Chuman, T.; Kiya, H.: On the security of block scrambling-based image encryption including jpeg distorsion against jigsaw puzzle solver attacks, in IEEE Int. Workshop on Signal Design and its Applications in Communications (IWSDA), 2017, 64–68.
31Information technology - digital compression and coding of continuous-tone still images: JPEG file interchange format (JFIF), Recommendation ITU-T T.871, 2012.
33Yang, E.H.; Wang, L.: Joint optimization of run-length coding, huffman coding, and quantization table with complete baseline jpeg decoder compatibility. IEEE Trans. Image Process., 18 (1) (2009), 63–74.
34Schaefer, G.; Stich, M.: UCID: An uncompressed color image database, in Storage and Retrieval Methods and Applications for Multimedia 2004, 2004, 472–480.
35Chuman, T.; Iida, K.; Kiya, H.: Image manipulation on social media for encryption-then-compression systems, in 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conf. (APSIPA ASC), 2017, 858–863.
36Larson, E.C.; Chandler, D.M.: Most apparent distortion: full reference image quality assessment and the role of strategy. J. Electron. Imaging., 19 (2010), 011006-1–011006-21.
37Gallagher, A.: Jigsaw puzzles with pieces of unknown orientation, in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2012, 382–389.
38Cho, T.; Avidan, S.; Freeman, W.: A probabilistic image jigsaw puzzle solver, in IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), 2010, 183–190.
39Nemoto, H.; Hanhart, P.; Korshunov, P.; Ebrahimi, T.: Ultra-eye: Uhd and hd images eye tracking dataset, in Sixth Int. Workshop on Quality of Multimedia Experience (QoMEX), 2014, 39–40.