Fingerprinting, 1983 IEEE Symposium on Security and Privacy, p.18, 1983. ,
DOI : 10.1109/SP.1983.10018
Fingerprinting Long Forgiving Messages, pp.180-189, 1986. ,
DOI : 10.1007/3-540-39799-X_15
Tracing traitors, Proc. Advances in Cryptology-Crypto, pp.257-270, 1994. ,
DOI : 10.1007/3-540-48658-5_25
Optimal probabilistic fingerprint codes, Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pp.116-125, 2003. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Lower bounds for collusion-secure fingerprinting, Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, pp.472-479, 2003. ,
Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, pp.3663-3676, 2008. ,
DOI : 10.1109/TIT.2008.926307
Estimating the Minimal Length of Tardos Code, Information Hid- ing, vol.20, pp.176-190, 2009. ,
DOI : 10.1007/s10623-007-9142-x
URL : https://hal.archives-ouvertes.fr/inria-00505882
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes, Lecture Notes in Computer Science, vol.44, pp.341-356, 2008. ,
DOI : 10.1007/3-540-47870-1_5
An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography, vol.46, issue.5, pp.339-362, 2009. ,
DOI : 10.1007/s10623-009-9285-z
Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.56-60, 2009. ,
DOI : 10.1109/WIFS.2009.5386484
URL : https://hal.archives-ouvertes.fr/inria-00505893
Saddle-point solution of the fingerprinting capacity game under the marking assumption, 2009 IEEE International Symposium on Information Theory, pp.2256-2260, 2009. ,
DOI : 10.1109/ISIT.2009.5205882
Collusion resistance of multimedia fingerprinting using orthogonal modulation, IEEE Trans. Image Process. Citeseer, pp.804-821, 2005. ,
Anti-collusion fingerprinting for multimedia, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1069-1087, 2003. ,
DOI : 10.1109/TSP.2003.809378
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.7136
On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008. ,
DOI : 10.1145/1411328.1411347
URL : https://hal.archives-ouvertes.fr/inria-00504606
Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
La Cryptographie militaire, Journal des Sciences militaires, vol.IX, pp.5-38, 1883. ,
Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009. ,
DOI : 10.1145/1597817.1597819
URL : https://hal.archives-ouvertes.fr/hal-00384058
Comparison of secure spread-spectrum modulations applied to still image watermarking Annals of Telecommunications -Annales Des Télécommunications, pp.12243-12252, 2009. ,
Practical Security Analysis of Dirty Paper Trellis Watermarking, Proceedings of the 9th international conference on Information hiding, pp.174-188, 2007. ,
DOI : 10.1080/01621459.1963.10500845
URL : https://hal.archives-ouvertes.fr/hal-00166690
Security and robustness constraints for spread-spectrum Tardos fingerprinting, 2010 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2010. ,
DOI : 10.1109/WIFS.2010.5711457
URL : https://hal.archives-ouvertes.fr/hal-00541383
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008. ,
DOI : 10.1007/s10623-007-9142-x
On the systematic generation of Tardos's fingerprinting codes, IEEE 10th Workshop on Multimedia Signal Processing, pp.748-753, 2008. ,
Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008. ,
DOI : 10.1109/ISIT.2008.4594980
URL : http://arxiv.org/abs/0801.3837
Decoding Fingerprinting Using the Markov Chain Monte Carlo Method, WIFS -IEEE Workshop on Information Forensics and Security, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00757152
Bias Equalizer for Binary Probabilistic Fingerprinting Codes, Proc. of 14th Information Hiding Conference, ser. LNCS, S. Verlag, 2012. ,
DOI : 10.1007/978-3-642-36373-3_18
Achieving subspace or key security for WOA using natural or circular watermarking, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.80-88, 2006. ,
DOI : 10.1145/1161366.1161381
URL : https://hal.archives-ouvertes.fr/hal-00166575
Short collusion-secure fingerprint codes against three pirates, International Journal of Information Security, vol.55, issue.2, pp.85-102, 2012. ,
DOI : 10.1007/s10207-012-0155-8
URL : http://arxiv.org/abs/1012.3340
Asymptotic fingerprinting capacity in the Combined Digit Model Cryptology ePrint Archive, 2012. ,
A Simplex Method for Function Minimization, The Computer Journal, vol.7, issue.4, pp.308-313, 1965. ,
DOI : 10.1093/comjnl/7.4.308
Interference Removal Operation for Spread Spectrum Fingerprinting Scheme, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.403-417, 2012. ,
DOI : 10.1109/TIFS.2011.2170421
An algorithm with guaranteed convergence for finding a zero of a function, The Computer Journal, vol.14, issue.4, pp.422-425, 1971. ,
DOI : 10.1093/comjnl/14.4.422
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.821-826, 2012. ,
DOI : 10.1109/TIFS.2012.2184093
Collusion-resistant fingerprinting for multimedia, IEEE Signal Process. Mag, vol.21, issue.2, pp.15-27, 2004. ,
On achievable security levels for lattice data hiding in the known message attack scenario, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.68-79, 2006. ,
DOI : 10.1145/1161366.1161380
Tardos's Fingerprinting Code over AWGN Channel , " in Information Hiding, ser. Lecture Notes in Computer Science, pp.103-117, 2010. ,