Figure 6From: Overview on Selective Encryption of Image and Video: Challenges and Perspectives Postcompression approach. Back to article page