References
1. P. Amat, W. Puech, S. Druon, and J.P. Pedeboy. Lossless 3D Steganography Based on MST
and Connectivity Modification. Signal processing. Image communication, 25(6):400–412,
2010.
2. C.K. Chan and LM Cheng. Hiding Data in Images by Simple LSB Substitution. Pattern
Recognition, 37(3):469–474, 2004.
3. S. Cheng, Q. Wu, and K.R. Castleman. Non-Ubiquitous Digital Watermarking for Record
Indexing and Integrity Protection of Medical Images. In Image Processing, 2005. ICIP 2005.
IEEE International Conference on, volume 2. IEEE, 2005.
4. P. Cignoni, C. Rocchini, and R. Scopigno. Metro: measuring error on simplified surfaces. In
Computer Graphics Forum, volume 17, pages 167–174. Wiley Online Library, 1998.
5. G. Coatrieux, L. Lecornu, B. Sankur, and C. Roux. A Review of Image Watermarking Ap-
plications in Healthcare. In Proc. of the 28th International Conference IEEE Engineering in
Medicine and Biology Society, 2006.
6. A. Kerckhoffs. La Cryptographie Militaire. Journal des sciences militaires, 9(5-38):161–191,
1883.
7. D. Koller, B. Frischer, and G. Humphreys. Research Challenges for Digital Archives of 3D
Cultural Heritage Models. Journal on Computing and Cultural Heritage (JOCCH), 2(3):1–
17, 2009.
8. W. E. Lorensen and H. E. Cline. Marching Cubes: A High Resolution 3D Surface Construc-
tion Algorithm. In Proceedings of the 14th annual conference on Computer graphics and
interactive techniques, page 169. ACM, 1987.
9. X. Mao, M. Shiba, and A. Imamiya. Watermarking 3D Geometric Models Through Triangle
Subdivision. In Proc. SPIE, volume 4314, pages 253–260, 2001.
10. R. Ohbuchi, H. Masuda, and M. Aono. Watermaking Three-Dimensional Polygonal Models.
In Proceedings of the Fifth ACM International Conference on Multimedia, pages 261–272.
ACM New York, NY, USA, 1997.
11. B. Planitz and A. Maeder. Medical Image Watermarking: A Study on Image Degradation.
In Proceedings of the Workshop on Digital Image Computing: Technqiues and Applications,
pages 3–8, 2005.
12. W. Puech and J. M. Rodrigues. A New Crypto-Watermarking Method for Medical Images
Safe Transfer. In Proc. of the 12th European Signal Processing Conference, pages 1481–
1484, 2004.
13. N. Tournier, W. Puech, G. Subsol, and J-P. Pedeboy. Sensitivity Analysis of Euclidean Min-
imum Spanning Tree. In SPIE’10: 3D Image Processing (3DIP) and Applications, San Jose,
USA (CA), 2010.
14. A. Wakatani. Digital Watermarking for ROI Medical Images by Using Compressed Sig-
nature Image. In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii
International Conference on, pages 2043–2048. IEEE, 2002.
51