D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

M. Fernandez and M. Soriano, Soft-decision tracing in fingerprinted multimedia content, IEEE Multimedia, vol.11, issue.2, pp.38-46, 2004.
DOI : 10.1109/MMUL.2004.1289040

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

M. Gursoy, H. Poor, and S. Verdú, On-Off Frequency-Shift Keying for Wideband Fading Channels, EURASIP Journal on Wireless Communications and Networking, vol.13, issue.3, p.15, 2006.
DOI : 10.1155/WCN/2006/98564

P. Moulin and N. Kiyavash, Performance of Random Fingerprinting Codes Under Arbitrary Nonlinear Attacks, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, 2007.
DOI : 10.1109/ICASSP.2007.366196

R. Safavi-naini and Y. Wang, Collusion Secure q-ary Fingerprinting for Perceptual Content, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, pp.57-75, 2001.
DOI : 10.1007/3-540-47870-1_5

A. Silverberg, J. R. Staddon, and J. Walker, Applications of list decoding to tracing traitors, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1312-1318, 2003.
DOI : 10.1109/TIT.2003.810630

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes. Designs, Codes and Cryptography, pp.137-166, 2008.

Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu, Resistance of orthogonal gaussian fingerprints to collusion attacks, Proc. of Int. Conf. on Acoustics, Speech and Signal Processing IEEE ICASSP'03, pp.724-727, 2003.