Figure 5From: Overview on Selective Encryption of Image and Video: Challenges and Perspectives Incompression approach. Back to article page