M. Barbier and C. Rosenberger, Tatouage d'images avec des données biométriques révocables pour la preuve de propriété, Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SAR SSI), 2014.

P. Blythe and J. Fridrich, Secure digital camera, Proceedings of Digital Forensic Research Workshop (DFRWS), pp.17-19, 2004.

N. Fazio, On Cryptographic Techniques for Digital Rights Management, 2006.

N. Komninos and T. Dimitriou, Protecting Biometric Templates with Image Watermarking Techniques, Advances in Biometrics, pp.114-123, 2007.
DOI : 10.1007/978-3-540-74549-5_13

URL : http://openaccess.city.ac.uk/2505/1/Protecting%20Biometric%20Templates%20with%20Image.pdf

P. Lacharme, E. Cherrier, and C. Rosenberger, Reconstruction attack on biohashing, International Conference on Security and Cryptography (SECRYPT), pp.8-2013

B. S. Manjunath and W. Y. Ma, Texture features for browsing and retrieval of image data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.18, issue.8, pp.37-42, 1996.
DOI : 10.1109/34.531803

P. Saraju and . Mohanty, A secure digital camera architecture for integrated real-time digital rights management, Journal of Systems Architecture, vol.55, pp.10-12468, 2009.

A. B. Teoh, D. Ngo, and A. Goh, Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, 2004.

M. Vatsa, R. Singh, A. Noore, M. Houck, and K. , Robust biometric image watermarking for fingerprint and face template protection, IEICE Electronics Express, vol.3, issue.2, 2006.
DOI : 10.1587/elex.3.23

Z. Wenyin and F. Y. Shih, Semi-fragile spatial watermarking based on local binary pattern operators, Optics Communications, vol.284, issue.16-17, pp.3904-3912, 2011.
DOI : 10.1016/j.optcom.2011.04.004