Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th information hiding workshop , IH05. Lecture notes in computer science, 2005. ,
DOI : 10.1007/11558859_12
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, pp.1-15, 2008. ,
DOI : 10.1109/TIFS.2007.916006
URL : https://hal.archives-ouvertes.fr/hal-00325091
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003. ,
DOI : 10.1109/TSP.2003.809385
Watermarking Is Not Cryptography, Proc. international workshop on digital watermarking (IWDW), 2006. ,
DOI : 10.1007/11922841_1
URL : https://hal.archives-ouvertes.fr/inria-00504528
Natural Watermarking: A Secure Spread Spectrum Technique for WOA, Proc. information hiding, 2006. ,
DOI : 10.1007/978-3-540-74124-4_1
URL : https://hal.archives-ouvertes.fr/hal-00166574
Achieving subspace or key security for WOA using natural or circular watermarking, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, 2006. ,
DOI : 10.1145/1161366.1161381
URL : https://hal.archives-ouvertes.fr/hal-00166575
DCT-based watermark recovering without resorting to the uncorrupted original image, Proceedings of International Conference on Image Processing, 1997. ,
DOI : 10.1109/ICIP.1997.647964
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311
Break our watermarking system Independent component analysis, 2001. ,
Watermarking Attack: Security of WSS Techniques, Proc. international workshop on digital watermarking (IWDW). Lecture notes on computer science, pp.171-183, 2004. ,
DOI : 10.1109/72.761722
URL : https://hal.archives-ouvertes.fr/inria-00083194
Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999. ,
DOI : 10.1109/72.761722
Practical Security Analysis of Dirty Paper Trellis Watermarking, Proc. information hiding, 2007. ,
DOI : 10.1080/01621459.1963.10500845
URL : https://hal.archives-ouvertes.fr/hal-00166690
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, Proc. information hiding, 2008. ,
DOI : 10.1002/nav.3800020109
URL : https://hal.archives-ouvertes.fr/hal-00325080