S. Craver, Sdmi challenge information

J. Stern and S. Craver, Lessons learned from the SDMI, Proc. of the Multimedia Signal Processing Workshop, 2001.

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol.9, issue.1883, pp.5-38

S. Singh, The code book, Fourth Estate Limited Histoire des codes secrets, 1999.

C. Cachin, An Information-Theoretic Model for Steganography, Proc. of the second Int. Workshop on Information Hiding, pp.306-318, 1998.
DOI : 10.1007/3-540-49380-8_21

S. Craver, N. Memon, B. Yeo, and M. M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-87, 1998.
DOI : 10.1109/49.668979

M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack, 2000.
DOI : 10.1117/12.384991

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

I. Cox, M. Miller, and A. Mckellips, Watermarking as communications with side information, Proc. of the IEEE, pp.1127-1141, 1999.
DOI : 10.1109/5.771068

D. Kahn, Cryptology and the origins of spread spectrum, IEEE spectrum, pp.70-80, 1984.

J. Proakis, Digital Communications, Electrical and computer engineering, 1996.

I. Cox and J. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.587-93, 1998.
DOI : 10.1109/49.668980

J. A. Bloom, I. J. Cox, T. Kalker, J. Linnartz, M. L. Miller et al., Copy protection for DVD video, Special issue on identification and protection of multimedia information, pp.1267-1276, 1999.
DOI : 10.1109/5.771077

URL : http://buffy.eecs.berkeley.edu/~linnartz/articles/IEEE-doc-copyproc.pdf

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976.
DOI : 10.1109/TIT.1976.1055638

T. Kalker, A security risk for publicly available watermark detectors, Benelux Information Theory Symposium, 1998.

A. Patrizio, DVD privacy: It can be done

M. H. Costa, Writing on dirty paper, IEEE Trans. on Information Theory, vol.29, issue.3, 1983.

B. Chen, Design and analysis of digital watermarking, information embedding, and data hiding systems, 2000.

J. Chou, S. Pradhan, and K. Ramchandran, Turbo coded trellis-based constructions for data embedding: channel coding with side information, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256), 2001.
DOI : 10.1109/ACSSC.2001.986929

J. Chou, S. Pradhan, and K. Ramchandran, A robust blind watermarking scheme based on distributed source coding principles, Proceedings of the eighth ACM international conference on Multimedia , MULTIMEDIA '00, 2000.
DOI : 10.1145/354384.354420

M. Mansour and A. Tewfik, Secure detection of public watermarks with fractal decision boundaries, XI European Signal Processing Conference, EUSIPCO'02, 2002.

F. Hartung and B. Girod, Fast public-key watermarking of compressed video, Proceedings of International Conference on Image Processing, 1997.
DOI : 10.1109/ICIP.1997.647966

T. Furon and P. Duhamel, An Asymmetric Public Detection Watermarking Technique, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.88-100, 1999.
DOI : 10.1007/10719724_7

URL : https://hal.archives-ouvertes.fr/inria-00001125

J. Eggers, J. Su, and B. Girod, Public key watermarking by eigenvectors of linear transforms, Proc. of the European Signal Processing Conference, 2000.

R. Van-schyndel, A. Tirkel, and I. Svalbe, Key independent watermark detection, Proceedings IEEE International Conference on Multimedia Computing and Systems, 1999.
DOI : 10.1109/MMCS.1999.779265

J. Smith and C. Dodge, Developments in Steganography, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.77-87, 1999.
DOI : 10.1007/10719724_6

J. Stern and J. Tillich, Automatic Detection of a Watermarked Document Using a Private Key, 4th Int of Lecture Notes in Computer Science, p. electronic version, 2001.
DOI : 10.1007/3-540-45496-9_19

G. Silvestre, N. Hurley, G. Hanau, and W. Dowling, Informed audio watermarking using digtial chaotic signals, Proc. of Int. Conf. on Acoustics, Speech and Signal Processing, 2001.
DOI : 10.1109/icassp.2001.941181

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.1729

T. Furon, I. Venturini, and P. Duhamel, Unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III
URL : https://hal.archives-ouvertes.fr/inria-00080814

J. Picard and A. Robert, Neural Networks Functions for Public Key Watermarking, 4th Int, pp.142-156, 2001.
DOI : 10.1007/3-540-45496-9_11

L. De, C. T. Gomes, M. Mboup, M. Bonnet, and N. Moreau, Cyclostationnarity-based audio watermarking with private and public hidden data, Proc. of the 109th Convention of Audio Engineering Society, 2000.

T. Furon, N. Moreau, and P. Duhamel, Audio asymmetric watermarking technique, Proc. of Int. Conf. on Audio, Speech and Signal Processing, 2000.
URL : https://hal.archives-ouvertes.fr/inria-00001126

M. Swanson, B. Zhu, A. Tewfik, and L. Boney, Robust audio watermarking using perceptual masking, Signal Processing, vol.66, issue.3, pp.337-355, 1998.
DOI : 10.1016/S0165-1684(98)00014-0

T. Furon and P. Duhamel, Robustness of an asymmetric technique, Proc. of Int. Conf. on Image Processing, 2000.
URL : https://hal.archives-ouvertes.fr/inria-00080811

A. De-rosa, M. Barni, F. Bartolini, V. Cappelini, and A. Piva, Optimum Decoding of Non-additive Full Frame DFT Watermarks, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.159-171, 1999.
DOI : 10.1007/10719724_12

A. Menezes, P. Van-oorschot, and S. Vanstone, Handbook of applied cryptography, Discrete mathematics and its applications, 1996.

E. Lehmann, Testing statistical hypothesis, J. Wiley & Sons, 1986.

K. Dzhaparidze, Parameter estimation and hypothesis testing in spectral analysis of stationary time series, 1986.
DOI : 10.1007/978-1-4612-4842-2

P. J. Brockwell and R. A. Davis, Time Series: Theory and methods, 1991.

G. Fay, Théorèmes limite pour les fonctionnelles de périodogramme, 2000.

J. Stern, ContributionàContribution`Contributionà la théorie de la protection de l'information, 2001.

M. Barni, F. Bartolini, A. De-rosa, and A. Piva, A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. on Image Processing, vol.5, pp.755-66, 2001.

R. E. Blahut, Principes and practice of information theory, 1987.