C. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

D. Kahn, Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology, IEEE Spectrum, vol.21, issue.9, pp.70-80, 1984.
DOI : 10.1109/MSPEC.1984.6370466

M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires IX, pp.5-83, 1883.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

P. Comesaña, L. Pérez-freire, and F. Pérez-gonzàlez, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, Proceedings of the 7th International Workshop on Information Hiding, pp.146-160, 2005.
DOI : 10.1007/11558859_12

L. Pérez-freire, P. Comesaña, and F. Pérez-gonzàlez, Information-Theoretic Analysis of Security in Side-Informed Data Hiding, Proceedings of the 7th International Workshop on Information Hiding, pp.131-145, 2005.
DOI : 10.1007/11558859_11

L. Pérez-freire, F. Pérez-gonzàlez, and P. Comesaña, Secret dither estimation in lattice-quantization data hiding: a set membership approach, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp.6072-6072, 2006.
DOI : 10.1117/12.642688

F. Hartung and B. Girod, Fast public-key watermarking of compressed video, Proceedings of International Conference on Image Processing, pp.528-531, 1997.
DOI : 10.1109/ICIP.1997.647966

T. Furon and P. Duhamel, An Asymmetric Public Detection Watermarking Technique, Proceedings of the Third Information Hiding Workshop, pp.88-100, 1999.
DOI : 10.1007/10719724_7

URL : https://hal.archives-ouvertes.fr/inria-00001125

J. Eggers, J. Su, and B. Girod, Public key watermarking by eigenvectors of linear transforms, Proceedings of the European Signal Processing Conference. Volume III, 2000.

T. Furon and P. Duhamel, An asymmetric watermarking method, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.51-981, 2003.
DOI : 10.1109/TSP.2003.809376

URL : https://hal.archives-ouvertes.fr/inria-00080829

T. Furon, I. Venturini, and P. Duhamel, <title>Unified approach of asymmetric watermarking schemes</title>, Security and Watermarking of Multimedia Contents III, pp.269-279, 2001.
DOI : 10.1117/12.435408

M. L. Miller, Is asymmetry watermarking necessary or sufficient?, Proceedings of European Signal Processing Conference, pp.292-294, 2002.

H. Zimmermann, OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980.
DOI : 10.1109/TCOM.1980.1094702

M. Kutter, S. Voloshynovskiy, and A. Herrigel, <title>Watermark copy attack</title>, Security and Watermarking of Multimedia Contents II, pp.371-380, 2000.
DOI : 10.1117/12.384991

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

W. Trappe, M. Wu, Z. Wang, and K. Liu, Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.51-1069, 2003.
DOI : 10.1109/TSP.2003.809378

G. Doërr and J. Dugelay, Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.2955-2964, 2004.
DOI : 10.1109/TSP.2004.833867

E. Lin and E. Delp, Temporal Synchronization in Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.3007-3022, 2004.
DOI : 10.1109/TSP.2004.833866

¨. O. Harmanc?, M. Kucukgoz, and K. M?hçak, Temporal synchronization of watermarked video using image hashing, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.370-380, 2005.
DOI : 10.1117/12.587437

M. L. Miller, G. Doërr, and I. J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

A. Abrardo, M. Barni, F. Pérez-gonzàlez, and C. Mosquera, Trellis-Coded Rational Dither Modulation for Digital Watermarking, Proceedings of the 4th International Workshop on Digital Watermarking, pp.351-360, 2005.
DOI : 10.1007/11551492_27

J. Fridrich and M. Goljan, Robust hash functions for digital watermarking, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), pp.178-183, 2000.
DOI : 10.1109/ITCC.2000.844203

C. De-roover, C. De-vleeschouwer, F. Lefèbvre, and B. Macq, Robust video hashing based on radial projections of key frames, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.4020-4037, 2005.
DOI : 10.1109/TSP.2005.855414

S. Kozat, R. Venkatesan, and K. M?hçak, Robust perceptual image hashing via matrix invariants, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.3443-3446, 2004.
DOI : 10.1109/ICIP.2004.1421855

V. Monga and K. M?hçak, Robust image hashing via non-negative matrix factorizations, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.225-228, 2006.

Q. Sun, S. Ye, C. Lin, and S. Chang, A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL, International Journal of Image and Graphics, vol.05, issue.01, pp.1-14, 2005.
DOI : 10.1142/S0219467805001690

S. Wee and J. Apostolopoulos, Secure scalable streaming enabling transcoding without decryption, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.437-440, 2001.
DOI : 10.1109/ICIP.2001.959047

S. Katzenbeisser, On the Integration of Watermarks and Cryptography, Proceedings of the 2nd International Workshop on Digital Watermarking, pp.50-60, 2003.
DOI : 10.1007/978-3-540-24624-4_4