A. Kerckhoffs, La cryptographie militaire, Journal des Sciences Militaires, vol.9, pp.5-38

F. Cayre and P. Bas, Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, pp.1-15, 2008.
DOI : 10.1109/TIFS.2007.916006

URL : https://hal.archives-ouvertes.fr/hal-00325091

B. Mathon, Comparison of secure spread-spectrum modulations applied to still image watermarking, annals of telecommunications - annales des t??l??communications, vol.10, issue.3, pp.11-12, 2009.
DOI : 10.1007/s12243-009-0119-9

URL : https://hal.archives-ouvertes.fr/hal-00437864

S. Pateux and G. L. Guelvouit, Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, vol.18, issue.4, pp.283-296, 2003.
DOI : 10.1016/S0923-5965(02)00145-5

J. Su, J. Eggers, and B. Girod, Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.1141-1175, 2001.
DOI : 10.1016/S0165-1684(01)00038-X

P. Moulin and A. Ivanovic, The zero-rate spread-spectrum watermarking game, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1098-1117, 2003.
DOI : 10.1109/TSP.2003.809370

P. Moulin and J. O. Sullivan, Information-theoretic analysis of information hiding Information Theory, IEEE Transactions on, vol.49, issue.3, pp.563-593, 2003.

J. Vila-forcén, Worst-case additive attack against quantization-based data-hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.136-146, 2005.
DOI : 10.1117/12.586263

F. Pérez-gonzález, The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding, Digital Watermarking, pp.1-17, 2004.
DOI : 10.1007/978-3-540-24624-4_1

R. Tzschoppe, Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS), Security, Steganography, and Watermarking of Multimedia Contents VII, pp.114-123, 2005.
DOI : 10.1117/12.587492

P. Moulin and A. Goteti, Block QIM watermarking games Information Forensics and Security, IEEE Transactions on, vol.1, issue.3, pp.293-310, 2006.

T. Furon, F. Cayre, and C. Fontaine, Watermarking Security, Signal Processing IEEE TransactionsIEEE), vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.4018/978-1-59904-513-9.ch014

URL : https://hal.archives-ouvertes.fr/inria-00580838

D. Zhang, J. Ni, and D. Lee, Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images, Advances in Visual Computing, pp.400-409, 2008.
DOI : 10.1109/TCOMM.1994.580247

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

L. Pérez-freire and F. Pérez-gonzález, Spread-Spectrum Watermarking Security Information Forensics and Security, IEEE Transactions on, vol.4, issue.1, pp.2-24, 2009.

L. Pérez-freire, Security of lattice-based data hiding against the Known Message Attack Information Forensics and Security, IEEE Transactions on, vol.1, issue.4, pp.421-439, 2006.

L. Pérez-freire and F. Pérez-gonzález, Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack Information Forensics and Security, IEEE Transactions on, vol.3, issue.4, pp.593-610, 2008.

I. Cox, G. Doërr, and T. Furon, Watermarking Is Not Cryptography, Proceedings of the International Workshop on Digital Watermarking, pp.1-15, 2006.
DOI : 10.1007/11922841_1

URL : https://hal.archives-ouvertes.fr/inria-00504528

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

P. Bas and T. Furon, A New Measure of Watermarking Security: The Effective Key Length Information Forensics and Security, IEEE TransactionsIEEE), vol.8, issue.8, pp.1306-1317, 2013.

P. Bas and T. Furon, Key length Estimation of zero-bit watermarking schemes, EUSIPCO - 20th European Signal Processing Conference, p.p. TBA, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00728159

T. Furon and P. Bas, A New Measure of Watermarking Security Applied on DC-DM QIM, IH -Information Hiding, p.p. TBA, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00702689

S. Katzenbeisser, Computational security models for digital watermarks, Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), pp.1261-1282, 2005.

G. Doërr and J. Dugelay, Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.2955-2964, 2004.
DOI : 10.1109/TSP.2004.833867

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

P. Bas and G. Doërr, Practical Security Analysis of Dirty Paper Trellis Watermarking, Information Hiding, pp.174-188, 2007.
DOI : 10.1080/01621459.1963.10500845

URL : https://hal.archives-ouvertes.fr/hal-00166690

P. Bas and G. Doërr, Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008.
DOI : 10.1145/1411328.1411366

URL : https://hal.archives-ouvertes.fr/hal-00325086

A. Valizadeh and J. Wang, Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding Information Forensics and Security, IEEE Transactions on, vol.6, issue.2, pp.267-282, 2011.

J. Linnartz and M. Van-dijk, Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Information Hiding, pp.258-272, 1998.
DOI : 10.1007/3-540-49380-8_18

I. J. Cox and J. Linnartz, Public watermarks and resistance to tampering, Proceedings of International Conference on Image Processing, pp.3-6, 1997.
DOI : 10.1109/ICIP.1997.632226

P. Comesaña, Side-informed data hiding: robustness and security analysis, 2006.

J. Earl, Tangential sensitivity analysis of watermarks using prior information, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
DOI : 10.1117/12.704704

T. Furon, G. Silvestre, and N. Hurley, JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002.
DOI : 10.1109/ICIP.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826

T. Kalker, J. Linnartz, and M. Van-dijk, Watermark estimation through detector analysis, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.425-429, 1998.
DOI : 10.1109/ICIP.1998.723516

E. Choubassi, M. , and P. Moulin, Noniterative Algorithms for Sensitivity Analysis Attacks Information Forensics and Security, IEEE Transactions on, vol.2, issue.2, pp.113-126, 2007.

E. Choubassi, M. , and P. Moulin, On Reliability and Security of Randomized Detectors Against Sensitivity Analysis Attacks Information Forensics and Security, IEEE Transactions on, vol.4, issue.3, pp.273-283, 2009.

M. Mansour and A. Tewfik, Secure detection of public watermarks with fractal decision boundaries, Signal Processing Conference, pp.1-4, 2002.

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

A. Westfeld, Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2, Information Hiding, pp.89-101, 2009.
DOI : 10.1109/TIP.2003.821551

M. E. Choubassi and P. Moulin, On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks, Security, Steganography, and Watermarking of Multimedia Contents VIII, p.1, 2006.
DOI : 10.1117/12.640659

P. Comesaña and F. Pérez-gonzález, Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol.2007, issue.2, 2007.

M. Barni, Are you threatening me? Towards smart detectors in watermarking, Proc. of SPIE Media Watermarking, Security, and Forensics, 2014.

M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack, Proc. SPIE Security and Watermarking of Multimedia Contents II, pp.371-380, 2000.