F. Cazenave, V. Quint, and C. Roisin, Timesheets.js, Proceedings of the 11th ACM symposium on Document engineering, DocEng '11, 2011.
DOI : 10.1145/2034691.2034700

URL : https://hal.archives-ouvertes.fr/hal-00619396

A. Cheddad, J. Condell, K. Curran, and P. Mc-kevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010.
DOI : 10.1016/j.sigpro.2009.08.010

S. Djaziri-larbi, G. Mahé, I. Marrakchi, M. Turki, and M. Ja¨?daneja¨?dane, Doping and witness watermarking for audio processing, 7th Int. Workshop on Systems, Signal Process. and their Applications, 2011.

J. Fridrich, A new steganographic method for palette-based images, IS&T PICS conference, 1999.

J. Fridrich and D. Rui, Secure Steganographic Methods for Palette Images, 3 rd Int. Workshop on Information Hiding, 2000.
DOI : 10.1007/10719724_4

S. Johnson, Adobe Illustrator CS5 on Demand, 2010.

S. Kim, Z. Cheng, and K. Yoo, A New Steganography Scheme Based on an Index-Color Image, 2009 Sixth International Conference on Information Technology: New Generations, 2009.
DOI : 10.1109/ITNG.2009.119

E. Kohler, Gifsicle 1.7. Available from <http

J. Krasner, Motion graphics design and fine art animation: principles and practice, 2004.

R. Machado, Ez stego Available from <http, 1997.

R. K. Mantiuk, A. Tomaszewska, and R. Mantiuk, Comparison of Four Subjective Methods for Image Quality Assessment, Computer Graphics Forum, 2012.
DOI : 10.1111/j.1467-8659.2012.03188.x

T. Morkel, J. Eloff, and M. S. Olivier, An overview of image steganography, Information Systems Security International Conference (ISSA), pp.1-11, 2005.

D. Mukherjee, J. J. Chae, and S. K. Mitra, A source and channel coding approach to data hiding with application to hiding speech in video, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.348-352, 1998.
DOI : 10.1109/ICIP.1998.723494

J. Niederst and J. Robbins, Web design in a nutshell: A desktop quick reference, 2001.

A. Sagi and D. Malah, Bandwith extension of telephone speech aided by data embedding, Eurasip J. Appl. Signal Process, 2007.

C. H. Tzeng, Z. F. Yang, and W. Tsai, Adaptive Data Hiding in Palette Images by Color Ordering and Mapping With Security Protection, IEEE Transactions on Communications, vol.52, issue.5, 2004.
DOI : 10.1109/TCOMM.2004.826379

X. Wang, T. Yao, and C. Li, A palette-based image steganographic method using colour quantisation, IEEE Int. Conf. on Image Process, 2005.

Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, 2004.
DOI : 10.1109/TIP.2003.819861

H. Wu and H. Wang, Multibit color-mapping steganography using depthfirst search, International Symposium on Biometrics and Security Technologies, pp.224-229, 2013.

H. Wu, H. Wang, H. Zhao, and X. Yu, Multi-layer assignment steganography using graph-theoretic approach, Multimedia Tools and Applications, pp.1-26, 2014.
DOI : 10.1007/s11042-014-2050-y

M. Y. Wu, Y. K. Ho, and J. H. Lee, An iterative method of palette-based image steganography, Pattern Recognition Letters, vol.25, issue.3, 2004.
DOI : 10.1016/j.patrec.2003.10.013

D. Zhang, R. Zhang, X. Niu, and Y. Yang, A digital watermarking algorithm for high capacity index image robust to format transformation, 3rd International Conference on Computer Science and Information Technology, pp.216-220, 2010.

X. Zhang, S. Wang, and Z. Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, vol.15, pp.553-556, 2008.
DOI : 10.1109/LSP.2008.2001117