La cryptographie militaire, Journal des Sciences Militaires, vol.9, pp.5-38 ,
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, pp.1-15, 2008. ,
DOI : 10.1109/TIFS.2007.916006
URL : https://hal.archives-ouvertes.fr/hal-00325091
Comparison of secure spread-spectrum modulations applied to still image watermarking, annals of telecommunications - annales des t??l??communications, vol.10, issue.3, pp.11-12, 2009. ,
DOI : 10.1007/s12243-009-0119-9
URL : https://hal.archives-ouvertes.fr/hal-00437864
Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, vol.18, issue.4, pp.283-296, 2003. ,
DOI : 10.1016/S0923-5965(02)00145-5
Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.1141-1175, 2001. ,
DOI : 10.1016/S0165-1684(01)00038-X
The zero-rate spread-spectrum watermarking game, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1098-1117, 2003. ,
DOI : 10.1109/TSP.2003.809370
Information-theoretic analysis of information hiding Information Theory, IEEE Transactions on, vol.49, issue.3, pp.563-593, 2003. ,
Worst-case additive attack against quantization-based data-hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.136-146, 2005. ,
DOI : 10.1117/12.586263
The Importance of Aliasing in Structured Quantization Index Modulation Data Hiding, Digital Watermarking, pp.1-17, 2004. ,
DOI : 10.1007/978-3-540-24624-4_1
Additive non-Gaussian noise attacks on the scalar Costa scheme (SCS), Security, Steganography, and Watermarking of Multimedia Contents VII, pp.114-123, 2005. ,
DOI : 10.1117/12.587492
Block QIM watermarking games Information Forensics and Security, IEEE Transactions on, vol.1, issue.3, pp.293-310, 2006. ,
Watermarking Security, Signal Processing IEEE TransactionsIEEE), vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.4018/978-1-59904-513-9.ch014
URL : https://hal.archives-ouvertes.fr/inria-00580838
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images, Advances in Visual Computing, pp.400-409, 2008. ,
DOI : 10.1109/TCOMM.1994.580247
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Spread-Spectrum Watermarking Security Information Forensics and Security, IEEE Transactions on, vol.4, issue.1, pp.2-24, 2009. ,
Security of lattice-based data hiding against the Known Message Attack Information Forensics and Security, IEEE Transactions on, vol.1, issue.4, pp.421-439, 2006. ,
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack Information Forensics and Security, IEEE Transactions on, vol.3, issue.4, pp.593-610, 2008. ,
Watermarking Is Not Cryptography, Proceedings of the International Workshop on Digital Watermarking, pp.1-15, 2006. ,
DOI : 10.1007/11922841_1
URL : https://hal.archives-ouvertes.fr/inria-00504528
Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
A New Measure of Watermarking Security: The Effective Key Length Information Forensics and Security, IEEE TransactionsIEEE), vol.8, issue.8, pp.1306-1317, 2013. ,
Key length Estimation of zero-bit watermarking schemes, EUSIPCO - 20th European Signal Processing Conference, p.p. TBA, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00728159
A New Measure of Watermarking Security Applied on DC-DM QIM, IH -Information Hiding, p.p. TBA, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00702689
Computational security models for digital watermarks, Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), pp.1261-1282, 2005. ,
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.2955-2964, 2004. ,
DOI : 10.1109/TSP.2004.833867
Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009. ,
DOI : 10.1145/1597817.1597819
URL : https://hal.archives-ouvertes.fr/hal-00384058
Practical Security Analysis of Dirty Paper Trellis Watermarking, Information Hiding, pp.174-188, 2007. ,
DOI : 10.1080/01621459.1963.10500845
URL : https://hal.archives-ouvertes.fr/hal-00166690
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008. ,
DOI : 10.1145/1411328.1411366
URL : https://hal.archives-ouvertes.fr/hal-00325086
Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding Information Forensics and Security, IEEE Transactions on, vol.6, issue.2, pp.267-282, 2011. ,
Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Information Hiding, pp.258-272, 1998. ,
DOI : 10.1007/3-540-49380-8_18
Public watermarks and resistance to tampering, Proceedings of International Conference on Image Processing, pp.3-6, 1997. ,
DOI : 10.1109/ICIP.1997.632226
Side-informed data hiding: robustness and security analysis, 2006. ,
Tangential sensitivity analysis of watermarks using prior
information, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007. ,
DOI : 10.1117/12.704704
JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002. ,
DOI : 10.1109/ICIP.2002.1039910
URL : https://hal.archives-ouvertes.fr/inria-00080826
Watermark estimation through detector analysis, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.425-429, 1998. ,
DOI : 10.1109/ICIP.1998.723516
Noniterative Algorithms for Sensitivity Analysis Attacks Information Forensics and Security, IEEE Transactions on, vol.2, issue.2, pp.113-126, 2007. ,
On Reliability and Security of Randomized Detectors Against Sensitivity Analysis Attacks Information Forensics and Security, IEEE Transactions on, vol.4, issue.3, pp.273-283, 2009. ,
Secure detection of public watermarks with fractal decision boundaries, Signal Processing Conference, pp.1-4, 2002. ,
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311
Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2, Information Hiding, pp.89-101, 2009. ,
DOI : 10.1109/TIP.2003.821551
On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks, Security, Steganography, and Watermarking of Multimedia Contents VIII, p.1, 2006. ,
DOI : 10.1117/12.640659
Breaking the BOWS Watermarking System: Key Guessing and Sensitivity Attacks, EURASIP Journal on Information Security, vol.2007, issue.2, 2007. ,
Are you threatening me? Towards smart detectors in watermarking, Proc. of SPIE Media Watermarking, Security, and Forensics, 2014. ,
Watermark copy attack, Proc. SPIE Security and Watermarking of Multimedia Contents II, pp.371-380, 2000. ,