-. Estivale and A. Tsar, ACKNOWLEDGEMENTS Patrick Bas is supported by the National French projects Nebbiano ANR-06-SETIN-009

]. P. Comesaña, L. P. Freire, and F. Pérez-gonzález, Blind newton sensitivity attack, IEE Proceedings on Information Security, pp.115-125, 2006.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, p.53, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

P. Bas and T. Furon, Bows-2, 2007.

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, p.1883

G. Doërr and J. Dugelay, Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, 2004.
DOI : 10.1109/TSP.2004.833867

L. Pérez-freire, F. Pérez-gonzález, T. Furon, and P. Comesaña, Security of Lattice-Based Data Hiding Against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol.1, issue.4, pp.421-439, 2006.
DOI : 10.1109/TIFS.2006.885029

P. Bas and G. Doërr, Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, 2008.
DOI : 10.1145/1411328.1411366

URL : https://hal.archives-ouvertes.fr/hal-00325086

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

A. Westfeld, A regression-based restoration technique for automated watermark removal, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.215-220, 2008.
DOI : 10.1145/1411328.1411364

M. L. Miller, G. J. Doërr, and I. J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.791-807, 2004.
DOI : 10.1109/TIP.2003.821551

C. Rey, G. Doërr, G. Csurka, and J. Dugelay, Toward generic image dewatermarking?, Proceedings. International Conference on Image Processing, pp.633-636, 2002.
DOI : 10.1109/ICIP.2002.1039050

F. Cayre and P. Bas, Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, 2008.
DOI : 10.1109/TIFS.2007.916006

URL : https://hal.archives-ouvertes.fr/hal-00325091

K. Abed-meraim, A. Chkeif, and Y. Hua, Fast orthogonal past algorithm, IEEE Signal Processing Letters, vol.7, issue.3, 2000.

L. Pérez-freire and F. Pérez-gonzález, Spread-Spectrum Watermarking Security, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, 2008.
DOI : 10.1109/TIFS.2008.2009603

A. V. Knyazev and M. E. Argentati, Principal angles between subspaces in an a-based scalar product, In SIAM, J. Sci. Comput, vol.23, pp.2009-2041, 2002.

P. Bas and J. Hurri, Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components. IEE proceeding, transaction on information security, pp.127-139, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00166596

A. Hyvärinen, J. Karhunen, and E. Oja, Independent Component Analysis, 2001.

A. Hyvärinen, The fastica package for matlab, 2005.