J. C. Borie, W. Puech, and M. Dumas, Encrypted Medical Images for Secure Transfer, ICDIA 2002, pp.250-255, 2002.

C. Fontaine and F. Galand, A Survey of Homomorphic Encryption for Nonspecialists, EURASIP Journal on Information Security, vol.15, issue.2, pp.1-15, 2007.
DOI : 10.1016/j.ipl.2005.09.016

URL : https://hal.archives-ouvertes.fr/inria-00504233

E. Gamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete logarithms, IEEE Transactions on Information Theory, pp.469-472, 1985.

M. Kuribayashi and H. Tanaka, Fingerprinting protocol for images based on additive homomorphic property, IEEE Transactions on Image Processing, vol.14, issue.12, pp.2129-2139, 2005.
DOI : 10.1109/TIP.2005.859383

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residousity Classes, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-x_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035

S. R. Prasanna, Y. V. Subba-rao, and A. Mitra, An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images, International Journal of Computer Vision, vol.1, issue.2, pp.132-137, 2006.

W. Puech and J. M. Rodrigues, A New Crypto-Watermarking Method for Medical Images Safe Transfer, Proc. 12 th European Signal Processing Conference, pp.1481-1484, 2004.
URL : https://hal.archives-ouvertes.fr/lirmm-00108801

D. K. Rappe, Homomorphic Cryptosystems and their Applications, Cryptology ePrint Archive, 2006.

B. Schneier, Applied cryptography, 1995.

A. Uhl and A. Pommer, Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, 2005.