J. Bloom, I. J. Cox, T. Kalker, J. Linnartz, M. L. Miller et al., Copy protection for DVD video, special issue on identification and protection of multimedia information, pp.1267-1276, 1999.
DOI : 10.1109/5.771077

M. Maes, T. Kalker, J. Linnartz, J. Talstra, and G. Depovere, Jaap Haitsma, Digital watermarking for DVD video copy protection, Signal Processing Magazine, vol.17, issue.5

S. Craver, N. Memon, B. Yeo, and M. M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-87, 1998.
DOI : 10.1109/49.668979

J. Stern and J. Tillich, Automatic Detection of a Watermarked Document Using a Private Key, 4th Int, p.p. electronic version, 2001.
DOI : 10.1007/3-540-45496-9_19

A. Adelsbach, S. Katzenbeisser, and A. Sadeghi, Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure, Proc. of European Signal Processing Conference, 2002.
DOI : 10.1007/s00530-003-0098-z

T. Kalker, Considerations on watermarking seccurity, Proc of the IEEE Multimedia Signal Processing MMSP'01 workshop, pp.201-206, 2001.
DOI : 10.1109/mmsp.2001.962734

T. Furon, Use of watermarking techniques for copy protection, Ecole Nationale Supérieure des Télécommunications, 2002.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976.
DOI : 10.1109/TIT.1976.1055638

I. J. Cox, M. L. Miller, and A. L. Mckellips, Watermarking as communications with side information, Proc. IEEE, pp.1127-1141, 1999.
DOI : 10.1109/5.771068

I. Cox and J. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.587-93, 1998.
DOI : 10.1109/49.668980

URL : http://buffy.eecs.berkeley.edu/~linnartz/articles/jsacfinal.ps

A. Herrigel, S. Voloshynovskiy, and Y. Rystar, The watermark template attack, Security and Watermarking of Multimedia Contents III, SPIE Proceedings, 2001.

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk et al., <title>Combining digital watermarks and collusion-secure fingerprints for digital images</title>, Security and Watermarking of Multimedia Contents, 1999.
DOI : 10.1117/12.344702

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

W. Trappe, M. Wu, and K. J. Liu, Joint coding and embedding for collusionresistant fingerprinting, Proc. European Signal Processing Conf, 2002.

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

G. Langelaar, R. L. Lagendijk, and J. Biemond, Removing spatial spread spectrum watermarks by non-linear filtering, Proc. of 9th European Signal Processing Conference, 1998.

A. Patrizio, DVD privacy: It can be done

S. Craver and J. Stern, Lessons learned from SDMI, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), 2001.
DOI : 10.1109/MMSP.2001.962736

S. Singh, The code book, Fourth Estate Limited, 1999.

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

S. Pereira and T. Pun, Fast Robust Template Matching for Affine Resistant Image Watermarks, Proc. of the third Int. Workshop on Information Hiding, pp.199-210, 1999.
DOI : 10.1007/10719724_15

J. O-'ruanaidh and T. , Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, Special issue on copyrigth protection and control, vol.66, issue.3, pp.303-320, 1998.

P. Bas and B. Macq, A new video-object watermarking scheme robust to object manipulation, Proc. of Int. Conf. on Image Processing, 2001.
URL : https://hal.archives-ouvertes.fr/hal-00166583

F. A. Petitcolas, Watermarking schemes evaluation, IEEE Signal Processing Magazine, vol.17, issue.5, pp.58-64, 2000.
DOI : 10.1109/79.879339

S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-maillet, and T. Pun, Second Generation Benchmarking and Application Oriented Evaluation, Fourth workshop on information hiding, 2001.
DOI : 10.1007/3-540-45496-9_25

V. Solachidis, A. Tefas, N. Nikolaidis, S. Tsekeridou, and A. , Nikolaidis, I.Pitas, A benchmarking protocol for watermarking methods, Proc. 2001 IEEE Int. Conf. on Image Processing -ICIP'01, pp.1023-1026, 2001.

F. A. Petitcolas and D. Kirovski, Blind pattern matching attack on audio watermarking systems, Proc. of the IEEE Int. Conf. on Acoustic, Speech and Signal Processing, 2002.

C. Rey, G. Dorr, J. Dugelay, and G. K. Csurka, Toward generic image dewatermarking?, Proceedings. International Conference on Image Processing, pp.633-636, 2002.
DOI : 10.1109/ICIP.2002.1039050

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, A Stochastic Approach to Content Adaptive Digital Image Watermarking, Third workshop on information hiding, 1999.
DOI : 10.1007/10719724_16

J. Su, J. Eggers, and B. Girod, Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.81-1141, 2001.
DOI : 10.1016/S0165-1684(01)00038-X

S. Pateux, G. Le-guelvouit, and C. Guillemot, Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information, Proc. of IEEE Int. Conf. on Image Processing, 2002.

T. Kalker, A security risk for publicly available watermark detectors, Benelux Information Theory Symposium, 1998.

M. L. Miller, Is asymmetric watermarking necessary or sufficient?, Proc. European Signal Processing Conference -EUSIPCO 2002, 2002.

T. Furon and P. , An asymmetric watermarking method, accepted to the special issue on signal processing for data hiding in digital media & secure content delivery, IEEE Trans. on Signal Processing, 2003.

T. Furon, G. Silvestre, N. Hurley, and J. , Just Another N-order side-Informed Scheme, Proc. of Int. Conf. on Image Processing ICIP'02, 2002.
DOI : 10.1109/icip.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826

M. F. Mansour and A. H. Tewfik, Secure detection of public watermarks with fractal decision boundaries, Proc. European Signal Processing Conference - EUSIPCO 2002, 2002.

G. Depovere and T. Kalker, Secret key watermarking with changing keys, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.427-429, 2000.
DOI : 10.1109/ICIP.2000.900986

C. Cachin, An Information-Theoretic Model for Steganography, Proc. of the second Int. Workshop on Information Hiding, pp.306-318, 1998.
DOI : 10.1007/3-540-49380-8_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Mittelholzer, An infomation-theoritic approach to steganography and watermarking, Proc. of the third Int. Workshop on Information Hiding, pp.1-17, 1999.
DOI : 10.1007/10719724_1

T. Furon, I. Venturini, and P. , Unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III, SPIE, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00080814