S. Bhattacharjee and M. Kutter, Compression tolerant image authentication, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269), pp.435-439, 1998.
DOI : 10.1109/ICIP.1998.723518

S. Ebu, EBU/SMPTE task force for harmonized standards for the exchange of programme material as bitstreams, EBU Tech. Rev., Special Supplement, 1998.

L. Blum, M. Blum, and M. Shub, A Simple Unpredictable Pseudo-Random Number Generator, SIAM Journal on Computing, vol.15, issue.2, pp.364-383, 1986.
DOI : 10.1137/0215025

D. E. Knuth, The Art of Computer Programming, 1981.

W. Diffie and M. E. Hellmann, New directions in cryptography, IT-22, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney, Robust audio watermarking using perceptual masking, Signal Processing, vol.66, issue.3, pp.337-356, 1998.
DOI : 10.1016/S0165-1684(98)00014-0

R. Ohbuchi, H. Masuda, and M. Aono, Watermarking three-dimensional polygonal models through geometric and topological modifications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.551-560, 1998.
DOI : 10.1109/49.668977

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.5082

G. W. Braudaway, K. A. Magerlein, and F. Mintzer, Protecting publicly available images with a visible image watermark, Proc. SPIE/IS&T Optical Security and Counterfeit Deterrence Techniques, Electronic Imaging, pp.126-133, 1997.

D. Kundur and D. Hatzinakos, Toward a telltalt watermarking technique for tamper-proofing, Proc. IEEE ICIP'98, pp.409-413, 1998.

W. Bender, D. Gruhl, and N. Morimoto, Techniques for data hiding, Proc. SPIE, pp.2420-2440, 1995.
DOI : 10.1147/sj.353.0313

J. Cox, F. Kilian, T. Leighton, and . Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Processing, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444

J. J. O-'ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing (Special Issue on Watermarking), vol.66, issue.3, pp.303-318, 1998.

W. Meier and O. Staffelbach, The self shrinking generator, pp.205-214, 1995.

F. Hartung and B. Girod, Watermarking of uncompressed and compressed video, Signal Processing, vol.66, issue.3, pp.283-302, 1998.
DOI : 10.1016/S0165-1684(98)00011-5

C. Podilchuk and W. Zeng, Image-adaptive watermarking using visual models, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.525-540, 1998.
DOI : 10.1109/49.668975

M. D. Swanson, B. Zhu, and A. H. Tewfik, Multiresolution scene-based video watermarking using perceptual models, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.540-550, 1998.
DOI : 10.1109/49.668976

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.5886

J. F. Delaigle, C. D. Vleeschouwer, and B. Macq, Watermarking algorithm based on a human visual model, Signal Processing, vol.66, issue.3, pp.319-336, 1998.
DOI : 10.1016/S0165-1684(98)00013-9

F. Peticolas, R. J. Anderson, and M. G. Kuhn, Attacks on copyright marking systems, Information Hiding: Second International Workshop, 1998.

J. Lacy, S. Quackenbush, A. Reibman, and J. Snyder, Intellectual property protection systems and digital watermarking, Proc. Information Hiding Workshop, pp.15-17, 1998.
DOI : 10.1007/3-540-49380-8_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.198.8831

J. M. Boucqueau, M. Arnold, E. Goray, J. Guimaraes, D. Nicholson et al., Octalis tools. Octalis Deliverable D23, 1998.