P. Comesana, N. Merhav, and M. Barni, Asymptotically optimum embedding strategy for onebit watermarking under gaussian attacks, Proc. SPIE, pp.681909-681909, 2008.

T. Liu and P. Moulin, Error exponents for one-bit watermarking, Proc. of ICASSP, 2003.

M. H. Costa, Writing on dirty paper (corresp.), " Information Theory, IEEE Transactions on, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/tit.1983.1056659

T. Furon, J. Josse, and S. L. Squin, Some theoretical aspects of watermarking detection, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
DOI : 10.1117/12.643779

URL : https://hal.archives-ouvertes.fr/inria-00083370

J. Delhumeau, T. Furon, G. Silvestre, and N. Hurley, Improved Polynomial Detectors for Side-Informed Watermarking, pp.311-321, 2002.
DOI : 10.1117/12.476852

URL : https://hal.archives-ouvertes.fr/inria-00080827

E. Sabbag and N. Merhav, Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, 2006 IEEE International Symposium on Information Theory, pp.173-177, 2006.
DOI : 10.1109/ISIT.2006.261759

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444

T. Furon, C. Jégourel, A. Guyader, and F. Cérou, Estimating the probability fo false alarm for a zero-bit watermarking technique, 2009 16th International Conference on Digital Signal Processing, 2009.
DOI : 10.1109/ICDSP.2009.5201130

P. Comesana, N. Merhav, and M. Barni, Asymptotically optimum universal watermark embedding and detection in the high-snr regime Information Theory, IEEE Transactions on, vol.56, issue.6, pp.2804-2815, 2010.