P. Bas and T. Furon, Bows-2, 2007.

P. Bas, T. Furon, and F. Cayre, Practical key length of watermarking systems, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012.
DOI : 10.1109/ICASSP.2012.6288242

URL : https://hal.archives-ouvertes.fr/hal-00686813

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

C. M. Bishop, Neural networks for pattern recognition, 1995.

C. Cachin, Entropy measures and unconditional security in cryptography, 1997.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, p.53, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

B. Chen and G. W. , Quantization index modulation : a class of provably good methods for digital watermarking and information embedding, IEEE Transaction on information theory, pp.1423-1443, 2001.

P. Comesaa, N. Merhav, and M. Barni, Asymptotically optimum universal watermark embedding and detection in the high-snr regime. Information Theory, IEEE Transactions on, vol.56, issue.6, pp.2804-2815, 2010.

P. Comesaña, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05, Lecture Notes in Computer Science, 2005.
DOI : 10.1007/11558859_12

I. Cox, G. Doerr, and T. Furon, Watermarking Is Not Cryptography, Proc. Int. Work. on Digital Watermarking, 2006.
DOI : 10.1007/11922841_1

URL : https://hal.archives-ouvertes.fr/inria-00504528

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, pp.1-13, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

T. Furon, C. Jégourel, A. Guyader, and F. Cérou, Estimating the probability fo false alarm for a zero-bit watermarking technique, 2009 16th International Conference on Digital Signal Processing, pp.1-8, 2009.
DOI : 10.1109/ICDSP.2009.5201130

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734