Sdmi challenge information ,
Lessons learned from the SDMI, Proc. of the Multimedia Signal Processing Workshop, 2001. ,
La cryptographie militaire, Journal des sciences militaires, vol.9, issue.1883, pp.5-38 ,
The code book, Fourth Estate Limited Histoire des codes secrets, 1999. ,
An Information-Theoretic Model for Steganography, Proc. of the second Int. Workshop on Information Hiding, pp.306-318, 1998. ,
DOI : 10.1007/3-540-49380-8_21
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-87, 1998. ,
DOI : 10.1109/49.668979
Watermark copy attack, 2000. ,
DOI : 10.1117/12.384991
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
Watermarking as communications with side information, Proc. of the IEEE, pp.1127-1141, 1999. ,
DOI : 10.1109/5.771068
Cryptology and the origins of spread spectrum, IEEE spectrum, pp.70-80, 1984. ,
Digital Communications, Electrical and computer engineering, 1996. ,
Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.587-93, 1998. ,
DOI : 10.1109/49.668980
Copy protection for DVD video, Special issue on identification and protection of multimedia information, pp.1267-1276, 1999. ,
DOI : 10.1109/5.771077
URL : http://buffy.eecs.berkeley.edu/~linnartz/articles/IEEE-doc-copyproc.pdf
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976. ,
DOI : 10.1109/TIT.1976.1055638
A security risk for publicly available watermark detectors, Benelux Information Theory Symposium, 1998. ,
DVD privacy: It can be done ,
Writing on dirty paper, IEEE Trans. on Information Theory, vol.29, issue.3, 1983. ,
Design and analysis of digital watermarking, information embedding, and data hiding systems, 2000. ,
Turbo coded trellis-based constructions for data embedding: channel coding with side information, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256), 2001. ,
DOI : 10.1109/ACSSC.2001.986929
A robust blind watermarking scheme based on distributed source coding principles, Proceedings of the eighth ACM international conference on Multimedia , MULTIMEDIA '00, 2000. ,
DOI : 10.1145/354384.354420
Secure detection of public watermarks with fractal decision boundaries, XI European Signal Processing Conference, EUSIPCO'02, 2002. ,
Fast public-key watermarking of compressed video, Proceedings of International Conference on Image Processing, 1997. ,
DOI : 10.1109/ICIP.1997.647966
An Asymmetric Public Detection Watermarking Technique, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.88-100, 1999. ,
DOI : 10.1007/10719724_7
URL : https://hal.archives-ouvertes.fr/inria-00001125
Public key watermarking by eigenvectors of linear transforms, Proc. of the European Signal Processing Conference, 2000. ,
Key independent watermark detection, Proceedings IEEE International Conference on Multimedia Computing and Systems, 1999. ,
DOI : 10.1109/MMCS.1999.779265
Developments in Steganography, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.77-87, 1999. ,
DOI : 10.1007/10719724_6
Automatic Detection of a Watermarked Document Using a Private Key, 4th Int of Lecture Notes in Computer Science, p. electronic version, 2001. ,
DOI : 10.1007/3-540-45496-9_19
Informed audio watermarking using digtial chaotic signals, Proc. of Int. Conf. on Acoustics, Speech and Signal Processing, 2001. ,
DOI : 10.1109/icassp.2001.941181
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.1729
Unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III ,
URL : https://hal.archives-ouvertes.fr/inria-00080814
Neural Networks Functions for Public Key Watermarking, 4th Int, pp.142-156, 2001. ,
DOI : 10.1007/3-540-45496-9_11
Cyclostationnarity-based audio watermarking with private and public hidden data, Proc. of the 109th Convention of Audio Engineering Society, 2000. ,
Audio asymmetric watermarking technique, Proc. of Int. Conf. on Audio, Speech and Signal Processing, 2000. ,
URL : https://hal.archives-ouvertes.fr/inria-00001126
Robust audio watermarking using perceptual masking, Signal Processing, vol.66, issue.3, pp.337-355, 1998. ,
DOI : 10.1016/S0165-1684(98)00014-0
Robustness of an asymmetric technique, Proc. of Int. Conf. on Image Processing, 2000. ,
URL : https://hal.archives-ouvertes.fr/inria-00080811
Optimum Decoding of Non-additive Full Frame DFT Watermarks, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.159-171, 1999. ,
DOI : 10.1007/10719724_12
Handbook of applied cryptography, Discrete mathematics and its applications, 1996. ,
Testing statistical hypothesis, J. Wiley & Sons, 1986. ,
Parameter estimation and hypothesis testing in spectral analysis of stationary time series, 1986. ,
DOI : 10.1007/978-1-4612-4842-2
Time Series: Theory and methods, 1991. ,
Théorèmes limite pour les fonctionnelles de périodogramme, 2000. ,
ContributionàContribution`Contributionà la théorie de la protection de l'information, 2001. ,
A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. on Image Processing, vol.5, pp.755-66, 2001. ,
Principes and practice of information theory, 1987. ,