G. H. Ball and D. J. Hall, ISODATA, a Novel Method of Data Analysis and Pattern Classification, Proc. of the International Communication Conference, 1966.

S. Battiato, F. Rundo, and F. Stanco, Self Organizing Motor Maps for Color-Mapped Image Re-Indexing, IEEE Transactions on Image Processing, vol.16, issue.12, pp.2905-2915, 2007.
DOI : 10.1109/TIP.2007.909415

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.7384

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems Journal, vol.35, issue.3.4, pp.3-4, 1996.
DOI : 10.1147/sj.353.0313

J. Bernarding, A. Thiel, and A. Grzesik, A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption, International Journal of Medical Informatics, vol.64, issue.2-3, pp.429-438, 2001.
DOI : 10.1016/S1386-5056(01)00213-1

P. Campisi, D. Kundur, D. Hatzinakos, and A. Neri, Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.2, pp.152-163, 2002.
DOI : 10.1155/S1110865702000550

URL : http://doi.org/10.1155/s1110865702000550

V. Cappellini and A. Piva, Opportunities and Issues of Image Processing for Cultural Heritage Applications, Proc. 14th European Signal Processing Conference, 2006.

R. Castagno and A. Sodomaco, Estimation of image feature reliability for an interactive video segmentation scheme, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.938-942, 1998.
DOI : 10.1109/ICIP.1998.723674

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

C. Chang, M. Hwang, and T. Chen, A new encryption algorithm for image cryptosystems, Journal of Systems and Software, vol.58, issue.2, pp.83-91, 2001.
DOI : 10.1016/S0164-1212(01)00029-2

M. Chaumont and W. Puech, A Color Image Hidden in a Grey-Level Image, Proc. 3rd European Conference on Colour in Graphics, Imaging and Vision (CGIV06), pp.226-231, 2006.
URL : https://hal.archives-ouvertes.fr/lirmm-00123583

M. Chaumont and W. Puech, A fast and efficient method to protect color images, Visual Communications and Image Processing 2007, 2007.
DOI : 10.1117/12.702741

URL : https://hal.archives-ouvertes.fr/lirmm-00130160

M. Chaumont and W. Puech, Attack by colorization of a grey-level image hiding its color palette, 2008 IEEE International Conference on Multimedia and Expo, 2008.
DOI : 10.1109/ICME.2008.4607740

URL : https://hal.archives-ouvertes.fr/lirmm-00293115

K. Chung and L. Chang, Large encrypting binary images with higher security, Pattern Recognition Letters, vol.19, issue.5-6, pp.461-468, 1998.
DOI : 10.1016/S0167-8655(98)00017-8

J. C. Dunn, A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters, Journal of Cybernetics, vol.3, issue.3, pp.32-57, 1974.
DOI : 10.1080/01969727308546046

A. Eskicioglu and E. Delp, An overview of multimedia content protection in consumer electronics devices, Signal Processing: Image Communication, vol.16, issue.7, pp.681-699, 2001.
DOI : 10.1016/S0923-5965(00)00050-3

J. Fridrich, A New Steganographic Method for Palette Images, In: IS&T PICS, pp.285-289, 1999.

J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 1st Edition, 2009.
DOI : 10.1017/CBO9781139192903

J. Fridrich and M. Goljan, Practical Steganalysis: State-of-the-Art, Proc. of SPIE Photonics West, pp.1-13, 2002.

M. Gervautz and W. Purgathofer, A Simple Method for Color Quantization: Octree Quantization, Graphics Gems, A.S. Glassner, pp.287-293, 1990.

T. Horiuchi, F. Noharaa, and S. Tominaga, Accurate Reversible Colorto-Gray Mapping Algorithm Without Distortion Conditions, Pattern Recognition Letters, issue.15, p.31, 2010.
DOI : 10.1016/j.patrec.2010.07.014

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol.9, pp.5-38, 1883.

K. Ko, O. Kwon, C. Son, Y. Ha, and . Feb, Color Embedding and Recovery Based on Wavelet Packet Transform, Journal of Imaging Science and Technology, vol.52, issue.1, 2008.
DOI : 10.2352/J.ImagingSci.Technol.(2008)52:1(010501)

J. Kodovsk´ykodovsk´y and J. Fridrich, Steganalysis of JPEG images using rich models, Media Watermarking, Security, and Forensics III, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, 2012.

A. Lemma, S. Katzenbeisser, M. Celik, and M. Van-der-veen, Secure Watermark Embedding Through Partial Encryption, International Workshop on Digital Watermarking Lecture Notes in Computer Science, pp.433-445, 2006.
DOI : 10.1007/11922841_35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.3168

S. Lian, Z. Liu, R. Zhen, and H. Weng, Commutative watermarking and encryption for media data, Optical Engineering, vol.45, issue.8, pp.80510-80511, 2006.
DOI : 10.1117/1.2333510

N. Memon and A. Venkateswaran, On ordering color maps for lossless predictive coding, IEEE Transactions on Image Processing, vol.5, issue.11, pp.1522-1527, 1996.
DOI : 10.1109/83.541422

N. Nikolaidis and I. Pitas, Robust image watermarking in the spatial domain, Signal Processing, vol.66, issue.3, pp.385-403, 1998.
DOI : 10.1016/S0165-1684(98)00017-6

R. Norcen, M. Podesser, A. Pommer, H. Schmidt, and A. Uhl, Confidential storage and transmission of medical image data, Computers in Biology and Medicine, vol.33, issue.3, pp.277-292, 2003.
DOI : 10.1016/S0010-4825(02)00094-X

T. Pevny, T. Filler, and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Information Hiding. Lecture Notes in Computer Science, vol.43, issue.6, pp.161-177, 2010.
DOI : 10.1049/el:20070248

URL : https://hal.archives-ouvertes.fr/hal-00541353

A. Pinho and A. Neves, A Survey on Palette Reordering Methods for Improving the Compression of Color-Indexed Images, IEEE Transactions on Image Processing, vol.13, issue.11, pp.1411-1418, 2004.
DOI : 10.1109/TIP.2004.836168

W. Puech, M. Chaumont, and O. Strauss, A Reversible Data Hiding Method for Encrypted Images, Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp.68191-68192, 2008.
URL : https://hal.archives-ouvertes.fr/lirmm-00293090

T. Quach and . Feb, Locatability of modified pixels in steganographic images, Media Watermarking, Security, and Forensics 2012, 2012.
DOI : 10.1117/12.905599

D. Queiroz and . Mar, Reversible color-to-gray mapping using subband domain texturization, 20th SIBGRAPI: Advances in Image Processing and Computer Vision, pp.269-276, 2010.
DOI : 10.1016/j.patrec.2008.11.010

D. Queiroz and K. Braun, Color to gray and back: color embedding into textured gray images, IEEE Transactions on Image Processing, vol.15, issue.6, pp.1464-1470, 2006.
DOI : 10.1109/TIP.2006.871181

B. Schneier, Applied cryptography, 1995.

F. Y. Shih and S. Y. Wu, Combinational image watermarking in the spatial and frequency domains, Pattern Recognition, vol.36, issue.4, pp.969-975, 2003.
DOI : 10.1016/S0031-3203(02)00122-X

A. Sinha and K. Singh, A technique for image encryption using digital signature, Optics Communications, vol.218, issue.4-6, pp.4-6, 2003.
DOI : 10.1016/S0030-4018(03)01261-6

C. Tzeng, Z. Yang, and W. Tsai, Adaptive Data Hiding in Palette Images by Color Ordering and Mapping With Security Protection, IEEE Transactions on Communications, vol.52, issue.5, pp.791-800, 2004.
DOI : 10.1109/TCOMM.2004.826379

A. Uhl and A. Pommer, Image and Video Encryption: From Digital Rights Management to Secured Personal Communication, 2005.

M. Wu, Y. Ho, and J. Lee, An iterative method of palette-based image steganography, Pattern Recognition Letters, vol.25, issue.3, pp.301-309, 2003.
DOI : 10.1016/j.patrec.2003.10.013

X. Xu, S. Dexter, and A. Eskicioglu, A hybrid scheme for encryption and watermarking, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.725-736, 2004.
DOI : 10.1117/12.527514

Y. Zhao, P. Campisi, and D. Kundur, Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images, IEEE Transactions on Image Processing, vol.13, issue.3, pp.430-448, 2004.
DOI : 10.1109/TIP.2003.821552