P. Comesaña, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05, 2005.
DOI : 10.1007/11558859_12

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, p.53, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack. EI'2000: Security and Watermarking of Multimedia Content II, pp.23-28, 2000.
DOI : 10.1117/12.384991

T. Furon, A Constructive and Unifying Framework for Zero-Bit Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, 2007.
DOI : 10.1109/TIFS.2007.897272

URL : https://hal.archives-ouvertes.fr/inria-00078445

T. Kalker, A security risk for publicly available watermark detectors, Proc. Benelux Inform. Theory Symp, 1998.

P. Comesaña, L. P. Freire, and F. Pérez-gonzález, Blind newton sensitivity attack, IEE Proceedings on Information Security, pp.115-125, 2006.

M. L. Miller, G. J. Doërr, and I. J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.791-807, 2004.
DOI : 10.1109/TIP.2003.821551

M. H. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, p.439, 1983.
DOI : 10.1109/TIT.1983.1056659

A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication, 1995.

P. Bas and G. Doërr, Practical security analysis of dirty paper trellis watermarking Information Hiding: 9th international workshop, LNCS, 2007.

J. Macqueen, Some methods for classification and analysis of multivariate observations, Proc. of the 5th Berkeley Symp. on Mathematics Statistics and Probability, 1967.

C. Wang, G. Doërr, and I. J. Cox, Toward a better understanding of dirty paper trellis codes, IEEE Proc. Int. Conf. Acoust, Speech, Signal Processing, pp.233-236, 2006.

C. Wang, G. Doërr, and I. J. Cox, Trellis coded modulation to improve dirty paper trellis watermarking, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
DOI : 10.1117/12.704379

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9161