F. Cayre, T. Furon, and C. Fontaine, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

P. Comesaña, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th information hiding workshop , IH05. Lecture notes in computer science, 2005.
DOI : 10.1007/11558859_12

F. Cayre and P. Bas, Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, pp.1-15, 2008.
DOI : 10.1109/TIFS.2007.916006

URL : https://hal.archives-ouvertes.fr/hal-00325091

I. Cox, J. Killian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

H. Malvar and D. Flôrencio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003.
DOI : 10.1109/TSP.2003.809385

I. Cox, G. Doërr, and T. Furon, Watermarking Is Not Cryptography, Proc. international workshop on digital watermarking (IWDW), 2006.
DOI : 10.1007/11922841_1

URL : https://hal.archives-ouvertes.fr/inria-00504528

P. Bas and F. Cayre, Natural Watermarking: A Secure Spread Spectrum Technique for WOA, Proc. information hiding, 2006.
DOI : 10.1007/978-3-540-74124-4_1

URL : https://hal.archives-ouvertes.fr/hal-00166574

P. Bas and F. Cayre, Achieving subspace or key security for WOA using natural or circular watermarking, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, 2006.
DOI : 10.1145/1161366.1161381

URL : https://hal.archives-ouvertes.fr/hal-00166575

A. Piva, M. Barni, F. Bartolini, and V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, Proceedings of International Conference on Image Processing, 1997.
DOI : 10.1109/ICIP.1997.647964

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

P. Bas, T. Furon, J. Karhunen, and E. Oja, Break our watermarking system Independent component analysis, 2001.

F. Cayre, C. Fontaine, and T. Furon, Watermarking Attack: Security of WSS Techniques, Proc. international workshop on digital watermarking (IWDW). Lecture notes on computer science, pp.171-183, 2004.
DOI : 10.1109/72.761722

URL : https://hal.archives-ouvertes.fr/inria-00083194

A. Hyvarinen, Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999.
DOI : 10.1109/72.761722

P. Bas and G. Doërr, Practical Security Analysis of Dirty Paper Trellis Watermarking, Proc. information hiding, 2007.
DOI : 10.1080/01621459.1963.10500845

URL : https://hal.archives-ouvertes.fr/hal-00166690

B. Mathon, P. Bas, F. Cayre, and F. Pérez-gonzález, Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, Proc. information hiding, 2008.
DOI : 10.1002/nav.3800020109

URL : https://hal.archives-ouvertes.fr/hal-00325080