I. Cox, M. Miller, and A. Mckellips, Watermarking as communications with side information, Proc. of the IEEE, pp.1127-1141, 1999.
DOI : 10.1109/5.771068

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Furon, Use of watermarking techniques for copy protection, 2002.

T. Furon, G. Silvestre, and N. Hurley, JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, 2002.
DOI : 10.1109/ICIP.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826

T. Furon, G. Silvestre, and N. Hurley, Watermark detectors based on Nth order statistics, Proc. of SPIE, 2002.
DOI : 10.1117/12.455354

M. Costa, Writing on dirty paper, IEEE Trans. on Information Theory, vol.29, 1983.

D. Florencio and H. Malvar, An improved spread-spectrum technique for robust watermarking, Proc of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, pp.3301-3305, 2002.

R. Blahut, Principes and practice of information theory, 1987.

M. Miller, G. Doerr, and I. Cox, Dirty-paper trellis codes for watermarking, Proceedings. International Conference on Image Processing, 2002.
DOI : 10.1109/ICIP.2002.1039904

J. Chou and K. Ramchandran, Robust turbo-based data hiding for image and video sources, Proceedings. IEEE International Conference on Multimedia and Expo, 2002.
DOI : 10.1109/ICME.2002.1035680

M. Miller, I. Cox, and J. Bloom, Informed embedding: exploiting image and detector information during watermark insertion, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 2000.
DOI : 10.1109/ICIP.2000.899260

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=