Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
La cryptographie militaire, Journal des Sciences militaires IX, 1883. ,
BER vs WCNR for NW, CW and ? 2 W. For NW, CW and ? 2 W, we have W CR = ?18dB. For HNW, HCW and H? 2 W, we obtain respectively W CR = - 20.76dB, -19, pp.11-21 ,
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, 2005. ,
DOI : 10.1007/11558859_12
The watermark copy attack, Security and Watermarking of Multimedia Content II, 2000. ,
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Kerckhoffs based embedding security classes, IEEE Trans. Inf. Forensics Security, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00325091
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, 2007. ,
DOI : 10.1145/1288869.1288903
URL : https://hal.archives-ouvertes.fr/hal-00166726
Model-Based Steganography, International Workshop on Digital Watermarking (IWDW), pp.154-167, 2003. ,
DOI : 10.1007/978-3-540-24624-4_12
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003. ,
DOI : 10.1109/TSP.2003.809385
A stochastic qim algorithm for robust, undetectable image watermarking, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.1173-1176, 2004. ,
DOI : 10.1109/ICIP.2004.1419513
The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955. ,
DOI : 10.1002/nav.3800020109
Algorithm 299, ACM TOMS, p.185, 1985. ,
Algorithm 209, Collected Algorithms of the CACM, p.616, 1963. ,