A. Barg, G. R. Blakley, and G. A. Kabatiansky, Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003.
DOI : 10.1109/TIT.2003.809570

T. Furon, B. Macq, N. Hurley, and G. Silvestre, JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002.
DOI : 10.1109/ICIP.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826

M. L. Miller and J. A. Bloom, Computing the Probability of False Watermark Detection, Proceedings of the 3rd International Workshop on Information Hiding (HI '99, pp.146-158, 1999.
DOI : 10.1007/10719724_11

J. Galambos, Advanced Probability Theory of Probability: Pure and Applied, Marcel Dekker, 1995.

F. Pérez-gonzález, F. Balado, and J. R. Martin, Performance analysis of existing and new methods for data hiding with known-host information in additive channels, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.960-980, 2003.
DOI : 10.1109/TSP.2003.809368

P. Comesaña, Side-informed data hiding: robustness and security analysis, 2006.

J. Linnartz, T. Kalker, and G. Depovere, Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks, Proceedings of the 2nd International Workshop on Information Hiding (IH '98), pp.329-343, 1998.
DOI : 10.1007/3-540-49380-8_23

V. Solachidis and I. Pitas, Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals, EURASIP Journal on Advances in Signal Processing, vol.2004, issue.16, pp.2522-2532, 2004.
DOI : 10.1155/S1110865704408014

G. Fishman, Monte Carlo: Concepts, Algorithms and Applications, 1996.
DOI : 10.1007/978-1-4757-2553-7

M. Villen-altamirano and J. Villen-altamirano, RESTART: a method for accelerating rare event simulations, Proceedings of the 13th International Teletraffic Congress (ITC '91), pp.71-76, 1991.

F. Cérou and A. Guyader, Adaptive multilevel splitting for rare event analysis, Stochastic Analysis and Applications, pp.417-443, 2007.

N. Merhav and E. Sabbag, Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008.
DOI : 10.1109/TIT.2007.911210

H. C. Thode-jr, Testing for Normality, Statistics: Textbooks and Monographs, vol.164, 2002.
DOI : 10.1201/9780203910894

G. Tardos16-]-b, T. U. Skori´cskori´c, M. Vladimirova, J. C. Celik, B. Talstra et al., Optimal probabilistic fingerprint codes Tardos fingerprinting is better than we thought Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Proceedings of the 35th Annual ACM Symposium on Theory of Computing Designs, Codes, and Cryptography, pp.116-125, 2003.

K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe et al., An Improvement of Tardos???s Collusion-Secure Fingerprinting Codes with Very Short Lengths, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, pp.80-89, 2007.
DOI : 10.1007/978-3-540-77224-8_12