W. Trappe and L. C. Washington, Introduction to cryptography with coding theory

Z. Erkin, A. Piva, S. Katzenbeisser, R. L. Lagendijk, J. Shokrollahi et al., Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing, EURASIP Journal on Information Security, p.17, 2007.

S. B. Wicker, Error control systems for digital communication and storage, vol.1, 1995.

X. Hu, W. Zhang, H. Hu, and N. Yu, Non-local denoising in encrypted images, International Conference on Internet of Vehicles, pp.386-395, 2014.

S. M. Saghaiannejadesfahani, Y. Luo, and S. S. Cheung, Privacy protected image denoising with secret shares, 19th IEEE International Conference on, pp.253-256, 2012.

A. Pedrouzo-ulloa, J. R. Troncoso-pastoriza, and F. Pérez-gonzález, Image denoising in the encrypted domain, Information Forensics and Security (WIFS), pp.1-6, 2016.

W. Puech, M. Chaumont, and O. Strauss, A reversible data hiding method for encrypted images, Electronic Imaging 2008. International Society for Optics and Photonics, pp.68-191, 2008.
URL : https://hal.archives-ouvertes.fr/lirmm-00293090

N. Islam, Z. Shahid, and W. Puech, Denoising and error correction in noisy AESencrypted images using statistical measures, Signal Processing:Image Commun, vol.41, issue.C, pp.15-27, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01348365

Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan et al., Local Shannon entropy measure with statistical tests for image randomness, Information Sciences, vol.222, pp.323-342, 2013.

C. E. Shannon, A mathematical theory of communication, The Bell System Technical Journal, vol.27, pp.379-423, 1948.