T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

P. Comesaña, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05, 2005.
DOI : 10.1007/11558859_12

L. Pérez-freire, F. Pérez-gonzález, T. Furon, and P. Comesaña, Security of Lattice-Based Data Hiding Against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol.1, issue.4, pp.421-439, 2006.
DOI : 10.1109/TIFS.2006.885029

F. Cayre and P. Bas, Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, 2008.
DOI : 10.1109/TIFS.2007.916006

URL : https://hal.archives-ouvertes.fr/hal-00325091

L. Pérez-freire and F. Pérez-gonzález, Spread-Spectrum Watermarking Security, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.2-24, 2009.
DOI : 10.1109/TIFS.2008.2009603

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

H. S. Malvar and D. A. Florêncio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003.
DOI : 10.1109/TSP.2003.809385

A. Valizadeh and Z. J. Wang, Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding, IEEE Transactions on Information Forensics and Security, vol.6, issue.2, pp.267-282, 2011.
DOI : 10.1109/TIFS.2010.2103061

L. Pérez-freire and F. Pérez-gonzález, Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.593-610, 2008.
DOI : 10.1109/TIFS.2008.2002938

D. Zhang and D. Lee, Security of cass data hiding scheme under the scenarios of KMA and WOA, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1797-1800, 2012.
DOI : 10.1109/ICASSP.2012.6288249

A. Kraskov, H. Stögbauer, and P. Grassberger, Estimating mutual information, Physical Review E, vol.69, issue.6, p.66138, 2004.
DOI : 10.1103/PhysRevE.69.066138

A. Bogdanov, D. Khovratovich, and C. Rechberger, Biclique Cryptanalysis of the Full AES, 2011.
DOI : 10.1007/978-3-642-25385-0_19

U. Maurer, Authentication theory and hypothesis testing, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1350-1356, 2000.
DOI : 10.1109/18.850674

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.4053

I. Cox, G. Doerr, and T. Furon, Watermarking Is Not Cryptography, Proc. Int. Work. on Digital Watermarking, 2006.
DOI : 10.1007/11922841_1

URL : https://hal.archives-ouvertes.fr/inria-00504528

S. Katzenbeisser, Computational security models for digital watermarks, Proc. of the Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), 2005.

T. Furon and P. Bas, A New Measure of Watermarking Security Applied on QIM, Proc. of Information Hiding Workshop, 2012.
DOI : 10.1007/978-3-642-36373-3_14

URL : https://hal.archives-ouvertes.fr/hal-00702689

S. Kay, Can detectability be improved by adding noise?, IEEE Signal Processing Letters, vol.7, issue.1, pp.8-10, 2000.
DOI : 10.1109/97.809511

S. Zozor and P. Amblard, Stochastic resonance in locally optimal detectors, IEEE Transactions on Signal Processing, vol.51, issue.12, pp.3177-3181, 2003.
DOI : 10.1109/TSP.2003.818905

URL : https://hal.archives-ouvertes.fr/hal-00022620

F. Cérou, P. Del-moral, T. Furon, and A. Guyader, Sequential Monte Carlo for rare event estimation, Statistics and Computing, pp.1-14, 2011.

A. Guyader, N. Hengartner, and E. Matzner-lober, Simulation and Estimation of Extreme Quantiles and Extreme Probabilities, Applied Mathematics & Optimization, vol.22, issue.4, pp.171-196, 2011.
DOI : 10.1007/s00245-011-9135-z

URL : https://hal.archives-ouvertes.fr/hal-00911891

P. Bas and T. Furon, Key length estimation of zero-bit watermarking schemes, Proc. EUSIPCO, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00728159

M. Abramowitz and I. A. Stegun, Handbook of mathematical functions with formulas, graphs, and mathematical tables, of National Bureau of Standards Applied Mathematics Series, Superintendent of Documents, U.S. Government Printing Office, 1964.

C. Robert, On some accurate bounds for the quantiles of a non-central chi squared distribution, Statistics & Probability Letters, vol.10, issue.2, pp.101-106, 1990.
DOI : 10.1016/0167-7152(90)90003-P

F. Polytechnique-de-grenoble, he was a member of the Laboratoire des Images et des Signaux de Grenoble (LIS), France where he worked on still image watermarking. During his post-doctoral activities, he was a member of the Communications and, 1997.

. Dr, Furon serves as Associate, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, and of the Elsevier Digital Signal Processing Journal. He is an elected member of the IEEE Information Forensics and Security Technical Committee