Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008. ,
DOI : 10.1109/TIT.2007.911210
Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, pp.283-296, 2003. ,
DOI : 10.1016/S0923-5965(02)00145-5
Computing the Probability of False Watermark Detection, Proceedings of the 3rd International Workshop on Information Hiding (IH '99), A. Pfitzmann, pp.146-158, 1999. ,
DOI : 10.1007/10719724_11
Mask building for perceptually hiding frequency embedded watermarks, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.450-454, 1998. ,
DOI : 10.1109/ICIP.1998.723523
Informed embedding: exploiting image and detector information during watermark insertion, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.1-4, 2000. ,
DOI : 10.1109/ICIP.2000.899260
Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks, Security, Forensics, Steganography, and Watermarking of Multimedia Contents of Proceedings of SPIE, pp.1-12, 2008. ,
Danger of low-dimensional watermarking subspaces, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.93-96, 2004. ,
DOI : 10.1109/ICASSP.2004.1326489
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Practical Security Analysis of Dirty Paper Trellis Watermarking, Proceedings of the 9th International Workshop on Information Hiding, pp.174-188, 2007. ,
DOI : 10.1080/01621459.1963.10500845
URL : https://hal.archives-ouvertes.fr/hal-00166690
Information-theoretic analysis of interscale and intrascale dependencies between image wavelet coefficients, IEEE Transactions on Image Processing, vol.10, issue.11, pp.1647-1658, 2001. ,
Fisher-tippett distribution?wikipedia, the free encyclopedia, 2008. ,
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.1141-1175, 2001. ,
DOI : 10.1016/S0165-1684(01)00038-X
<title>Wide spread spectrum watermarking with side information and interference cancellation</title>, Security and Watermarking of Multimedia Contents V, pp.278-289, 2003. ,
DOI : 10.1117/12.476839
On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp.1-12, 2006. ,
DOI : 10.1117/12.640659
Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Proceedings of the 2nd International Workshop on Information Hiding (IH '98), D. Aucsmith, pp.258-272, 1998. ,
DOI : 10.1007/3-540-49380-8_18
Secure detection of public watermarks with fractal decision boundaries, Proceedings of the 11th European Signal Processing Conference (EUSIPCO '02), 2002. ,
Reverse-engineering a detector with false alarms, Security, Steganography, and Watermarking of Multimedia Contents IX, pp.1-10, 2007. ,
DOI : 10.1117/12.704389
libit: Information theory and signal processing library ,
Factoring wavelet transforms into lifting steps, The Journal of Fourier Analysis and Applications, vol.34, issue.5, pp.247-269, 1998. ,
DOI : 10.1007/BF02476026
Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator, ACM Transactions on Modeling and Computer Simulation, vol.8, issue.1, pp.3-30, 1998. ,
DOI : 10.1145/272991.272995