T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

A. Kerckhoffs, La cryptographie militaire, Journal des Sciences militaires IX, 1883.

. Fig, BER vs WCNR for NW, CW and ? 2 W. For NW, CW and ? 2 W, we have W CR = ?18dB. For HNW, HCW and H? 2 W, we obtain respectively W CR = - 20.76dB, -19, pp.11-21

P. Comesaña, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, 2005.
DOI : 10.1007/11558859_12

M. Kutter, S. Voloshynovskiy, and A. Herrigel, The watermark copy attack, Security and Watermarking of Multimedia Content II, 2000.

F. Cayre, T. Furon, and C. Fontaine, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

F. Cayre and P. Bas, Kerckhoffs based embedding security classes, IEEE Trans. Inf. Forensics Security, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00325091

B. Mathon, P. Bas, and F. Cayre, Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, 2007.
DOI : 10.1145/1288869.1288903

URL : https://hal.archives-ouvertes.fr/hal-00166726

P. Sallee, Model-Based Steganography, International Workshop on Digital Watermarking (IWDW), pp.154-167, 2003.
DOI : 10.1007/978-3-540-24624-4_12

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

H. S. Malvar and D. Flôrencio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003.
DOI : 10.1109/TSP.2003.809385

P. Moulin and A. Briassouli, A stochastic qim algorithm for robust, undetectable image watermarking, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.1173-1176, 2004.
DOI : 10.1109/ICIP.2004.1419513

H. W. Kuhn, The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955.
DOI : 10.1002/nav.3800020109

I. D. Hill and M. C. Pike, Algorithm 299, ACM TOMS, p.185, 1985.

D. Ibbetson, Algorithm 209, Collected Algorithms of the CACM, p.616, 1963.