A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948. ,
DOI : 10.1002/j.1538-7305.1948.tb01338.x
Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology, IEEE Spectrum, vol.21, issue.9, pp.70-80, 1984. ,
DOI : 10.1109/MSPEC.1984.6370466
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
La cryptographie militaire, Journal des sciences militaires IX, pp.5-83, 1883. ,
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, Proceedings of the 7th International Workshop on Information Hiding, pp.146-160, 2005. ,
DOI : 10.1007/11558859_12
Information-Theoretic Analysis of Security in Side-Informed Data Hiding, Proceedings of the 7th International Workshop on Information Hiding, pp.131-145, 2005. ,
DOI : 10.1007/11558859_11
Secret dither estimation in lattice-quantization data hiding: a set membership approach, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp.6072-6072, 2006. ,
DOI : 10.1117/12.642688
Fast public-key watermarking of compressed video, Proceedings of International Conference on Image Processing, pp.528-531, 1997. ,
DOI : 10.1109/ICIP.1997.647966
An Asymmetric Public Detection Watermarking Technique, Proceedings of the Third Information Hiding Workshop, pp.88-100, 1999. ,
DOI : 10.1007/10719724_7
URL : https://hal.archives-ouvertes.fr/inria-00001125
Public key watermarking by eigenvectors of linear transforms, Proceedings of the European Signal Processing Conference. Volume III, 2000. ,
An asymmetric watermarking method, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.51-981, 2003. ,
DOI : 10.1109/TSP.2003.809376
URL : https://hal.archives-ouvertes.fr/inria-00080829
<title>Unified approach of asymmetric watermarking schemes</title>, Security and Watermarking of Multimedia Contents III, pp.269-279, 2001. ,
DOI : 10.1117/12.435408
Is asymmetry watermarking necessary or sufficient?, Proceedings of European Signal Processing Conference, pp.292-294, 2002. ,
OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, vol.28, issue.4, pp.425-432, 1980. ,
DOI : 10.1109/TCOM.1980.1094702
<title>Watermark copy attack</title>, Security and Watermarking of Multimedia Contents II, pp.371-380, 2000. ,
DOI : 10.1117/12.384991
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
DOI : 10.1109/18.705568
Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.51-1069, 2003. ,
DOI : 10.1109/TSP.2003.809378
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.2955-2964, 2004. ,
DOI : 10.1109/TSP.2004.833867
Temporal Synchronization in Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.3007-3022, 2004. ,
DOI : 10.1109/TSP.2004.833866
Temporal synchronization of watermarked video using image hashing, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.370-380, 2005. ,
DOI : 10.1117/12.587437
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Trellis-Coded Rational Dither Modulation for Digital Watermarking, Proceedings of the 4th International Workshop on Digital Watermarking, pp.351-360, 2005. ,
DOI : 10.1007/11551492_27
Robust hash functions for digital watermarking, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), pp.178-183, 2000. ,
DOI : 10.1109/ITCC.2000.844203
Robust video hashing based on radial projections of key frames, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.4020-4037, 2005. ,
DOI : 10.1109/TSP.2005.855414
Robust perceptual image hashing via matrix invariants, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.3443-3446, 2004. ,
DOI : 10.1109/ICIP.2004.1421855
Robust image hashing via non-negative matrix factorizations, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.225-228, 2006. ,
A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL, International Journal of Image and Graphics, vol.05, issue.01, pp.1-14, 2005. ,
DOI : 10.1142/S0219467805001690
Secure scalable streaming enabling transcoding without decryption, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.437-440, 2001. ,
DOI : 10.1109/ICIP.2001.959047
On the Integration of Watermarks and Cryptography, Proceedings of the 2nd International Workshop on Digital Watermarking, pp.50-60, 2003. ,
DOI : 10.1007/978-3-540-24624-4_4