G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of watermarking in medical imaging," in Proceedings of 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine, Arlington, VA, 2000, pp. 250-255.
J. H. Wu, R. F. Chang, C. J. Chen, C. L. Wang, T. H. Kuo, W. K. Moon, and D. R. Chen, "Tamper detection and recovery for medical images using near-lossless information hiding technique," Journal of Digital Imaging, vol. 21, no. 1, pp. 59-76, 2008.
G. Coatrieux, J. Montagner, H. Huang, and C. Roux, "Mixed reversible and RONI watermarking for medical image reliability protection," in Proceedings of 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS2007), Lyon, France, 2007, pp. 5653-5656.
B. Macq and F. Dewey, "Trusted headers for medical images," in Proceedings of DFG VIII-D II Watermarking Workshop, Erlangen, Germany, 1999.
D. Anan and U. C. Niranjan, "Watermarking medical images with patient information," in Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, 1998, pp. 703-706.
X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784-791, 2001.
M. Li, R. Poovendran, and S. Narayanan, "Protecting patient privacy against unauthorized release of medical images in a group communication environment," Computerized Medical Imaging and Graphics, vol. 29, no. 5, pp. 367-383, 2005.
M. Naor and A. Shamir, "Visual cryptography," in Advances in Cryptology: EUROCRYPT'94. Heidelberg: Springer, 1995, pp. 1-12.
R. J. Hwang, "A digital image copyright protection scheme based on visual cryptography," Tamkang Journal of Science and Engineering, vol. 3, no. 2, pp. 97-106, 2000.
C. C. Wang, S. C. Tai, and C. S. Yu, "Repeating image watermarking technique by the visual cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 83, no. 8, pp. 1589-1598, 2000.
B. Surekha and G. N. Swamy, "Sensitive digital image watermarking for copyright protection," International Journal of Network Security, vol. 15, no. 2, pp. 113-121, 2013.
M. Benyoussef, S. Mabtoul, M. El Marraki, and D. Aboutajdine, "Blind invisible watermarking technique in DT-CWT domain using visual cryptography," in Image Analysis and Processing: ICIAP 2013. Heidelberg: Springer, 2013, pp. 813-822.
A. Sleit and A. Abusitta, "A visual cryptography based watermark technology for individual and group images," Systemics, Cybernetics and Informatics, vol. 5, no. 2, pp. 24-32, 2008.
S. Radharani and M. L. Valarmathi, "Multiple watermarking scheme for image authentication and copyright protection using wavelet based texture properties and visual cryptography," International Journal of Computer Applications, vol. 23, no. 3, pp. 29-36, 2011.
H. Douzi, D. Mammass, and F. Nouboud, "Faber-Schauder wavelet transformation application to edge detection and image characterization," Journal of Mathematical Imaging and Vision, vol. 14, no. 2, pp. 91-102, 2001.
D. N. Ponraj, M. E. Jenifer, P. Poongodi, and J. S. Manoharan, "A survey on the preprocessing techniques of mammogram for the detection of breast cancer," Journal of Emerging Trends in Computing and Information Sciences, vol. 2, no. 12, pp. 656-664, 2011.
W. R. Silva and D. Menotti, "Classification of mammograms by the breast composition," in Proceedings of International Conference on Image Processing, Computer Vision, and Pattern Recognition, Las Vegas, NV, 2012, pp. 1-6.
H. Douzi and R. Harba, "Watermarking based on the density coefficients of Faber-Schauder wavelets," in Image and Signal Processing. Heidelberg: Springer, 2008, pp. 455-462.
H. Sarukhanyan, S. Agaian, K. Egiazarian, and J. Astola, "Reversible Hadamard transforms," FactaUniversitatis - Series: Electronics and Energetics, vol. 20, no. 3, pp. 309-330, 2007.