ACKNOWLEDGEMENTS Patrick Bas is supported by the National French projects Nebbiano ANR-06-SETIN-009 ,
Blind newton sensitivity attack, IEE Proceedings on Information Security, pp.115-125, 2006. ,
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, p.53, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Bows-2, 2007. ,
La cryptographie militaire, Journal des sciences militaires, p.1883 ,
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, 2004. ,
DOI : 10.1109/TSP.2004.833867
Security of Lattice-Based Data Hiding Against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol.1, issue.4, pp.421-439, 2006. ,
DOI : 10.1109/TIFS.2006.885029
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, 2008. ,
DOI : 10.1145/1411328.1411366
URL : https://hal.archives-ouvertes.fr/hal-00325086
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311
A regression-based restoration technique for automated watermark removal, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.215-220, 2008. ,
DOI : 10.1145/1411328.1411364
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.791-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Toward generic image dewatermarking?, Proceedings. International Conference on Image Processing, pp.633-636, 2002. ,
DOI : 10.1109/ICIP.2002.1039050
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, 2008. ,
DOI : 10.1109/TIFS.2007.916006
URL : https://hal.archives-ouvertes.fr/hal-00325091
Fast orthogonal past algorithm, IEEE Signal Processing Letters, vol.7, issue.3, 2000. ,
Spread-Spectrum Watermarking Security, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, 2008. ,
DOI : 10.1109/TIFS.2008.2009603
Principal angles between subspaces in an a-based scalar product, In SIAM, J. Sci. Comput, vol.23, pp.2009-2041, 2002. ,
Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components. IEE proceeding, transaction on information security, pp.127-139, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00166596
Independent Component Analysis, 2001. ,
The fastica package for matlab, 2005. ,