M. Barni, T. Kalker, and S. Katzenbeisser, Inspiring new research in the field of signal processing in the encrypted domain, IEEE Signal Processing Magazine, vol.30, issue.2, 2013.

P. Bianchi, M. Debbah, M. Maida, and J. Najim, Performance of statistical tests for single-source detection using random matrix theory. Information Theory, IEEE Transactions on, vol.57, issue.4, pp.2400-2419, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00421980

P. Boufounos and S. Rane, Secure binary embeddings for privacy preserving nearest neighbors, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011.
DOI : 10.1109/WIFS.2011.6123149

M. S. Charikar, Similarity estimation techniques from rounding algorithms, Proceedings of the thiry-fourth annual ACM symposium on Theory of computing , STOC '02, pp.380-388, 2002.
DOI : 10.1145/509907.509965

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.1930

M. Datar, N. Immorlica, P. Indyk, and V. Mirrokni, Locality-sensitive hashing scheme based on p-stable distributions, Proceedings of the twentieth annual symposium on Computational geometry , SCG '04, pp.253-262, 2004.
DOI : 10.1145/997817.997857

W. Dong, M. Charikar, and K. Li, Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces, Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR '08, pp.123-130, 2008.
DOI : 10.1145/1390334.1390358

G. Fanti, M. Finiasz, and K. Ramchandran, One-Way Private Media Search on Public Databases: The Role of Signal Processing, IEEE Signal Processing Magazine, vol.30, issue.2, pp.53-61, 2013.
DOI : 10.1109/MSP.2012.2229783

P. Indyk and R. Motwani, Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.604-613, 1998.
DOI : 10.1145/276698.276876

H. Jégou, M. Douze, and C. Schmid, Product Quantization for Nearest Neighbor Search, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.33, issue.1, pp.117-128, 2011.
DOI : 10.1109/TPAMI.2010.57

B. Mathon, T. Furon, L. Amsaleg, and J. Bringer, Secure and efficient approximate nearest neighbors search, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, pp.175-180, 2013.
DOI : 10.1145/2482513.2482539

URL : https://hal.archives-ouvertes.fr/hal-00817336

J. Troncoso-pastoriza, D. Gonzalez-jimenez, and F. Perez-gonzalez, Fully private noninteractive face verification. Information Forensics and Security, IEEE Transactions on, vol.8, issue.7, pp.1101-1114, 2013.

P. Vallet, P. Loubaton, and X. Mestre, Improved Subspace Estimation for Multivariate Observations of High Dimension: The Deterministic Signals Case, IEEE Transactions on Information Theory, vol.58, issue.2, pp.1043-1068, 2012.
DOI : 10.1109/TIT.2011.2173718

URL : https://hal.archives-ouvertes.fr/hal-00692662