Encrypted Medical Images for Secure Transfer, ICDIA 2002, pp.250-255, 2002. ,
A Survey of Homomorphic Encryption for Nonspecialists, EURASIP Journal on Information Security, vol.15, issue.2, pp.1-15, 2007. ,
DOI : 10.1016/j.ipl.2005.09.016
URL : https://hal.archives-ouvertes.fr/inria-00504233
A Public-Key Cryptosystem and a Signature Scheme Based on Discrete logarithms, IEEE Transactions on Information Theory, pp.469-472, 1985. ,
Fingerprinting protocol for images based on additive homomorphic property, IEEE Transactions on Image Processing, vol.14, issue.12, pp.2129-2139, 2005. ,
DOI : 10.1109/TIP.2005.859383
Public-Key Cryptosystems Based on Composite Degree Residousity Classes, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-x_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035
An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images, International Journal of Computer Vision, vol.1, issue.2, pp.132-137, 2006. ,
A New Crypto-Watermarking Method for Medical Images Safe Transfer, Proc. 12 th European Signal Processing Conference, pp.1481-1484, 2004. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00108801
Homomorphic Cryptosystems and their Applications, Cryptology ePrint Archive, 2006. ,
Applied cryptography, 1995. ,
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, 2005. ,