N. R. Wagner, Fingerprinting, 1983 IEEE Symposium on Security and Privacy, p.18, 1983.
DOI : 10.1109/SP.1983.10018

G. Blakley, C. Meadows, and G. Purdy, Fingerprinting Long Forgiving Messages, pp.180-189, 1986.
DOI : 10.1007/3-540-39799-X_15

B. Chor, A. Fiat, and M. Naor, Tracing traitors, Proc. Advances in Cryptology-Crypto, pp.257-270, 1994.
DOI : 10.1007/3-540-48658-5_25

G. Tardos, Optimal probabilistic fingerprint codes, Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

C. Peikert, A. Shelat, and A. Smith, Lower bounds for collusion-secure fingerprinting, Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, pp.472-479, 2003.

B. ?kori?, T. U. Vladimirova, M. Celik, and J. C. Talstra, Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3663-3676, 2008.
DOI : 10.1109/TIT.2008.926307

T. Furon, L. Pérez-freire, and A. Guyader, Estimating the Minimal Length of Tardos Code, Information Hid- ing, vol.20, pp.176-190, 2009.
DOI : 10.1007/s10623-007-9142-x

URL : https://hal.archives-ouvertes.fr/inria-00505882

T. Furon, A. Guyader, and F. Cérou, On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes, Lecture Notes in Computer Science, vol.44, pp.341-356, 2008.
DOI : 10.1007/3-540-47870-1_5

K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe et al., An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography, vol.46, issue.5, pp.339-362, 2009.
DOI : 10.1007/s10623-009-9285-z

T. Furon and L. Pérez-freire, Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.56-60, 2009.
DOI : 10.1109/WIFS.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893

Y. W. Huang and P. Moulin, Saddle-point solution of the fingerprinting capacity game under the marking assumption, 2009 IEEE International Symposium on Information Theory, pp.2256-2260, 2009.
DOI : 10.1109/ISIT.2009.5205882

M. Wu and Z. J. Wang, Collusion resistance of multimedia fingerprinting using orthogonal modulation, IEEE Trans. Image Process. Citeseer, pp.804-821, 2005.

W. Trappe, M. Wu, Z. J. Wang, and K. J. Liu, Anti-collusion fingerprinting for multimedia, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1069-1087, 2003.
DOI : 10.1109/TSP.2003.809378

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.7136

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

A. Kerckhoffs, La Cryptographie militaire, Journal des Sciences militaires, vol.IX, pp.5-38, 1883.

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

B. Mathon, P. Bas, F. Cayre, and B. Macq, Comparison of secure spread-spectrum modulations applied to still image watermarking Annals of Telecommunications -Annales Des Télécommunications, pp.12243-12252, 2009.

P. Bas and G. Doërr, Practical Security Analysis of Dirty Paper Trellis Watermarking, Proceedings of the 9th international conference on Information hiding, pp.174-188, 2007.
DOI : 10.1080/01621459.1963.10500845

URL : https://hal.archives-ouvertes.fr/hal-00166690

B. Mathon, P. Bas, F. Cayre, and B. Macq, Security and robustness constraints for spread-spectrum Tardos fingerprinting, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010.
DOI : 10.1109/WIFS.2010.5711457

URL : https://hal.archives-ouvertes.fr/hal-00541383

B. ?kori?, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

M. Kuribayashi and M. Morii, On the systematic generation of Tardos's fingerprinting codes, IEEE 10th Workshop on Multimedia Signal Processing, pp.748-753, 2008.

P. Moulin, Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008.
DOI : 10.1109/ISIT.2008.4594980

URL : http://arxiv.org/abs/0801.3837

T. Furon, A. Guyader, and F. Cérou, Decoding Fingerprinting Using the Markov Chain Monte Carlo Method, WIFS -IEEE Workshop on Information Forensics and Security, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00757152

M. Kuribayashi, Bias Equalizer for Binary Probabilistic Fingerprinting Codes, Proc. of 14th Information Hiding Conference, ser. LNCS, S. Verlag, 2012.
DOI : 10.1007/978-3-642-36373-3_18

P. Bas and F. Cayre, Achieving subspace or key security for WOA using natural or circular watermarking, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.80-88, 2006.
DOI : 10.1145/1161366.1161381

URL : https://hal.archives-ouvertes.fr/hal-00166575

K. Nuida, Short collusion-secure fingerprint codes against three pirates, International Journal of Information Security, vol.55, issue.2, pp.85-102, 2012.
DOI : 10.1007/s10207-012-0155-8

URL : http://arxiv.org/abs/1012.3340

D. Boesten and B. ?kori?, Asymptotic fingerprinting capacity in the Combined Digit Model Cryptology ePrint Archive, 2012.

J. A. Nelder and R. Mead, A Simplex Method for Function Minimization, The Computer Journal, vol.7, issue.4, pp.308-313, 1965.
DOI : 10.1093/comjnl/7.4.308

M. Kuribayashi, Interference Removal Operation for Spread Spectrum Fingerprinting Scheme, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.403-417, 2012.
DOI : 10.1109/TIFS.2011.2170421

R. P. Brent, An algorithm with guaranteed convergence for finding a zero of a function, The Computer Journal, vol.14, issue.4, pp.422-425, 1971.
DOI : 10.1093/comjnl/14.4.422

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444

J. Cao and J. Huang, Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.821-826, 2012.
DOI : 10.1109/TIFS.2012.2184093

M. Wu, W. Trappe, Z. J. Wang, and K. R. Liu, Collusion-resistant fingerprinting for multimedia, IEEE Signal Process. Mag, vol.21, issue.2, pp.15-27, 2004.

L. Pérez-freire, F. Pérez-gonzález, and T. Furon, On achievable security levels for lattice data hiding in the known message attack scenario, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.68-79, 2006.
DOI : 10.1145/1161366.1161380

M. Kuribayashi, Tardos's Fingerprinting Code over AWGN Channel , " in Information Hiding, ser. Lecture Notes in Computer Science, pp.103-117, 2010.