H. M. Chao, C. M. Hsu and S. G. Miaou, “A Data-Hiding Technique with Authentication, Integration, and Confiden- tiallity for Electronic Patient Records,” IEEE Transactions on Information Technology in Biomedicine, Vol. 6, No. 1, March 2002, pp. 46-53. doi:10.1109/4233.992161
 U. R. Acharya, D. Anand P. S. Bhat and U. C. Niranjan, “Compact Storage of Medical Images with Patient Information,” IEEE Transactions on Information Technology in Biomedicine, Vol. 5, No. 4, December 2001, pp. 320-323. doi:10.1109/4233.966107
 G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland and R. Collorec, “Relevance of Watermarking in Medical Imaging,” Proceedings of the 3rd Conference on Information Technology Applications in Biomedicine, Arlington, 2000, pp. 250-255.
 B. Planitz and A. Maeder, “Medical Image Watermarking: A Study on Image Degradation,” Proceedings of the Australian Pattern Recognition Society (APRS) Workshop on Digital Image Computing, Brisbane, February, 2005, CD- ROM pp. 3-8.
 R. C Raul, F. U. Claudia and T. B. Gershom, “Data Hiding Scheme for Medical Images,” 17th International Con-ference on Electronics, Communications and Computers, Cho-lula, 26-28 February 2007, pp. 32-32.
 G. C. Langelaar, I. Setyawan and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of- the-Art Overview,” IEEE Signal Processing Magazine, Vol. 17, No. 5, September 2000, pp. 20-46. doi:10.1109/79.879337
 A. H. Paquet and R. K. Ward, “Wave-let-Based Digital Watermarking for Authentication,” Proceed-ings of the IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg, Vol. 2, 2002, pp. 879-884.
 A. Giakoumaki, S. Pavlopoulos and D. Kout-souris, “Secure and Efficient Health Data Management through Multiple Watermarking on Medical Images,” Medical Biological Engineering & Computing, Vol. 44, 2006, pp. 619-631. doi:10.1007/s11517-006-0081-x
 A. Giakoumaki, S. Pav-lopoulos and D. Koutsouris, “Multiple Image Watermarking Applied to Health Information Management,” IEEE Transac-tions on Information Technology in Biomedicine, 2006, pp. 722-732.
 A. Giakoumaki, S. Pavlopoulos and D. Kout-souris, “A Medical Image Watermarking Scheme Based on Wavelet Transform,” Proceedings 25th Annual International Con- ference of IEEE-EMBS, Cancun, 2003, pp. 856-859.
 S. Dandapat, J. Xu, O. Chutatape and S. M. Krishnan, “Wavelet Transform Domain Data Embedding in a Medical Image,” Proceedings 26th Annual International Confe- rence of IEEE-EMBS, San Francisco, September 2004, pp. 1541-1544.
 S. Lee, C. D. Chang and T. Kalker, “Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform,” IEEE Transaction on Information Forensics and Security, Vol. 2, No. 3, September 2007, pp. 321-330. doi:10.1109/TIFS.2007.905146
 F. Cayre, C. Fontaine and T. Furon, “Watermarking Se- curity: Theory and Practice,” IEEE Transactions on Signal Processing, Vol. 53, No. 10, October 2005, pp. 3976- 3987. doi:10.1109/TSP.2005.855418
 G. Xuan, C. Yang, Y. Zheng, Y. Q. Shi and Z. Ni, “Re- versible Data Hiding Based on Wavelet Spread Spectrum,” IEEE International Workshop on Multimedia Signal Processing, Siena, 2004. doi:10.1109/MMSP.2004.1436530
 F. Ergun, J. Kilian and R. Kumar, “A Note on the Limits of Collusion-Resistant Watermarks,” EUROCRYPT'99 Proceedings of the 17th International Confe-rence on Theory and Application of Cryptographic Techniques, Vol. 1592, 1999, pp. 140-149.