B. A. Bash, D. Goekel, and D. Towsley, Limits of Reliable Communication with Low Probability of Detection on AWGN Channels, IEEE Journal on Selected Areas in Communications, vol.31, issue.9, pp.1921-1930, 2013.
DOI : 10.1109/JSAC.2013.130923

P. H. Che, M. Bakshi, and S. Jaggi, Reliable deniable communication: Hiding messages in noise, 2013 IEEE International Symposium on Information Theory, 2013.
DOI : 10.1109/ISIT.2013.6620765

URL : http://arxiv.org/abs/1304.6693

L. Wang, G. W. Wornell, and L. Zheng, Fundamental Limits of Communication With Low Probability of Detection, IEEE Transactions on Information Theory, vol.62, issue.6, pp.3493-3503, 2016.
DOI : 10.1109/TIT.2016.2548471

URL : https://hal.archives-ouvertes.fr/hal-01345907

M. Bloch, Covert Communication Over Noisy Channels: A Resolvability Perspective, IEEE Transactions on Information Theory, vol.62, issue.5, pp.2334-2354, 2016.
DOI : 10.1109/TIT.2016.2530089

URL : http://arxiv.org/abs/1503.08778

P. H. Che, M. Bakshi, C. Chan, and S. Jaggi, Reliable deniable communication with channel uncertainty, 2014 IEEE Information Theory Workshop (ITW 2014), 2014.
DOI : 10.1109/ITW.2014.6970786

S. Lee, R. J. Baxley, M. A. Weitnauer, and B. Walkenhorst, Achieving Undetectable Communication, IEEE Journal of Selected Topics in Signal Processing, vol.9, issue.7, pp.1195-1205, 2015.
DOI : 10.1109/JSTSP.2015.2421477

T. V. Sobers, B. A. Bash, D. Goeckel, S. Guha, and D. Towsley, Covert Communication in the Presence of an Uninformed Jammer, IEEE Transactions on Wireless Communications
DOI : 10.1109/TWC.2017.2720736

E. C. Song, P. Cuff, and H. V. Poor, The Likelihood Encoder for Lossy Compression, IEEE Transactions on Information Theory, vol.62, issue.4, pp.1836-1849, 2016.
DOI : 10.1109/TIT.2016.2529657

URL : http://arxiv.org/abs/1408.4522

Z. Goldfeld, G. Kramer, H. H. Permuter, and P. Cuff, Strong Secrecy for Cooperative Broadcast Channels, IEEE Transactions on Information Theory, vol.63, issue.1, pp.469-495, 2017.
DOI : 10.1109/TIT.2016.2622058

URL : http://arxiv.org/abs/1601.01286

Z. Goldfeld, P. Cuff, and H. H. Permuter, Wiretap channels with random states non-causally available at the encoder, 2016 IEEE International Conference on the Science of Electrical Engineering (ICSEE)
DOI : 10.1109/ICSEE.2016.7806196

URL : http://arxiv.org/abs/1608.00743

S. I. Gelfand and M. S. Pinsker, Coding for channel with random parameters, Probl. Control Inf. Theory, vol.9, pp.19-31, 1980.

J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 2009.
DOI : 10.1017/CBO9781139192903

Y. Wang and P. Moulin, Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2706-2722, 2008.
DOI : 10.1109/TIT.2008.921684

URL : http://arxiv.org/abs/cs/0702161

I. Ezzeddine and P. Moulin, Achievable rates for queue-based timing stegocodes, 2009 IEEE Information Theory Workshop, 2009.
DOI : 10.1109/ITW.2009.5351197

S. Lee, L. Wang, A. Khisti, and G. W. , Covert communication with channel-state information at the transmitter
URL : https://hal.archives-ouvertes.fr/hal-01556729

E. L. Lehmann and J. P. Romano, Testing statistical hypotheses, 2005.

A. Gamal and Y. Kim, Network information theory, 2011.
DOI : 10.1017/CBO9781139030687

I. Csiszár and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems, 2011.
DOI : 10.1017/CBO9780511921889

M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

T. M. Cover and J. A. Thomas, Elements of information theory, 1991.
DOI : 10.1002/047174882x

T. S. Han and S. Verdu, Approximation theory of output statistics, IEEE Transactions on Information Theory, vol.39, issue.3, pp.752-772, 1993.
DOI : 10.1109/18.256486

P. Cuff, Distributed Channel Synthesis, IEEE Transactions on Information Theory, vol.59, issue.11, pp.7071-7096, 2013.
DOI : 10.1109/TIT.2013.2279330

URL : http://arxiv.org/pdf/1208.4415