<title>Public automated web-based evaluation service for watermarking schemes: StirMark benchmark</title>, Security and Watermarking of Multimedia Contents III, pp.575-584, 2001. ,
DOI : 10.1117/12.435442
Considerations on watermarking seccurity, Proc of the IEEE Multimedia Signal Processing workshop, pp.201-206, 2001. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
The role of information theory in watermarking and its application to image watermarking, Signal Processing, vol.81, issue.6, pp.1121-1139, 2001. ,
DOI : 10.1016/S0165-1684(01)00037-8
Principles and Practice, 2001. ,
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, 2004. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Independent component analysis applied to digital image watermarking, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), p.1, 2001. ,
DOI : 10.1109/ICASSP.2001.941340
ICA for watermarking digital images, Journal of Machine Learning Research, vol.1, pp.1-25, 2002. ,
Watermark attack based on blind estimation without priors, Lecture Notes in Computer Science, 2002. ,
Danger of low-dimensional watermarking subspaces, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004. ,
DOI : 10.1109/ICASSP.2004.1326489
Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, vol.18, issue.4, pp.283-296, 2003. ,
DOI : 10.1016/S0923-5965(02)00145-5
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003. ,
DOI : 10.1109/TSP.2003.809366
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
A general framework for robust watermarking security, Special issue on Security of Data Hiding Technologies, pp.2069-2084, 2003. ,
DOI : 10.1016/S0165-1684(03)00168-3
URL : https://hal.archives-ouvertes.fr/inria-00080835
An asymmetric watermarking method, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.981-995, 2003. ,
DOI : 10.1109/TSP.2003.809376
URL : https://hal.archives-ouvertes.fr/inria-00080829
La cryptographie militaire, Journal des sciences militaires, vol.9, pp.5-38, 1883. ,
On the Cramer-Rao bound under parametric constraints, IEEE Signal Processing Letters, vol.5, issue.7, pp.177-179, 1998. ,
DOI : 10.1109/97.700921
Independent component analysis: algorithms and applications, Neural Networks, vol.13, issue.4-5, pp.411-430, 2000. ,
DOI : 10.1016/S0893-6080(00)00026-5
Blind source separation and independent component analysis: a crossroad of tools and ideas, Proceedings of Fourth International Symposium on Independent Component Analysis and Blind Signal Separation, 2003. ,
Maximum likelihood from incomplete data via the em algorithm, J. Roy. Stat. Soc, pp.1-38, 1977. ,
Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999. ,
DOI : 10.1109/72.761722