J. Bernarding, A. Thiel, and A. Grzesik, A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption, International Journal of Medical Informatics, vol.64, issue.2-3, pp.429-438, 2001.
DOI : 10.1016/S1386-5056(01)00213-1

R. Norcen, M. Podesser, A. Pommer, H. Schmidt, and A. Uhl, Confidential storage and transmission of medical image data, Computers in Biology and Medicine, vol.33, issue.3, pp.277-292, 2003.
DOI : 10.1016/S0010-4825(02)00094-X

A. Uhl and A. Pommer, Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, 2005.

K. Chung and L. Chang, Large encrypting binary images with higher security, Pattern Recognition Letters, vol.19, issue.5-6, pp.461-468, 1998.
DOI : 10.1016/S0167-8655(98)00017-8

C. Chang, M. Hwang, and T. Chen, A new encryption algorithm for image cryptosystems, The Journal of Systems and Software 58, pp.83-91, 2001.
DOI : 10.1016/S0164-1212(01)00029-2

A. Sinha and K. Singh, A technique for image encryption using digital signature, Optics Communications, vol.218, issue.4-6, pp.229-234, 2003.
DOI : 10.1016/S0030-4018(03)01261-6

A. Eskicioglu and E. Delp, An overview of multimedia content protection in consumer electronics devices, Signal Processing, pp.681-699, 2001.
DOI : 10.1016/S0923-5965(00)00050-3

F. Y. Shih and S. Y. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol.36, issue.4, pp.969-975, 2003.
DOI : 10.1016/S0031-3203(02)00122-X

X. Xu, S. Dexter, and A. Eskicioglu, A Hybrid Scheme for Encryption and Watermarking Electronic Imaging, Security and Watermarking of Multimedia Contents, Proc. of SPIE, pp.725-736, 2004.

A. Lemma, S. Katzenbeisser, M. Celik, and M. Van-der-veen, Secure Watermark Embedding Through Partial Encryption, International Workshop on Digital Watermarking, pp.433-445, 2006.
DOI : 10.1007/11922841_35

S. Lian, Z. Liu, R. Zhen, and H. Weng, Commutative watermarking and encryption for media data, Optical Engineering, vol.45, issue.8, pp.80510-80511, 2006.
DOI : 10.1117/1.2333510

A. Sinha and K. Singh, A technique for image encryption using digital signature, Optics Communications, vol.218, issue.4-6, pp.229-234, 2003.
DOI : 10.1016/S0030-4018(03)01261-6

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires 9, pp.5-38, 1883.

W. Puech and J. Rodrigues, A New Crypto-Watermarking Method for Medical Images Safe Transfer, EUSIPCO'04, pp.1481-1484, 2004.
URL : https://hal.archives-ouvertes.fr/lirmm-00108801

Z. Ni, Y. Shi, N. Ansari, and W. Su, Reversible Data Hiding, IEEE Trans. on Circuits and Systems for Video Technology, vol.16, pp.354-362, 2006.

D. Coltuc and J. Chassery, High Capacity Reversible Watermarking, 2006 International Conference on Image Processing, 2006.
DOI : 10.1109/ICIP.2006.312983

URL : https://hal.archives-ouvertes.fr/hal-00085953

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

D. Stinson, Cryptography -Theory and Practice, 1995.

B. Schneier, Applied cryptography, 1995.

J. Daemen and V. Rijmen, AES Proposal: The Rijndael Block Cipher, tech. rep., Proton World Int.l, 2002.

D. R. Stinson, Cryptography: Theory and Practice, Discrete Mathematics and Its Applications), 2005.