T. Maillard and T. Furon, Towards digital rights and exemptions management systems, Computer Law & Security Review, vol.20, issue.4, pp.281-287, 2004.
DOI : 10.1016/S0267-3649(04)00049-4

URL : https://hal.archives-ouvertes.fr/inria-00083204

S. Craver, N. Memon, B. L. Yeo, and M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-87, 1998.
DOI : 10.1109/49.668979

J. Bloom, I. Cox, T. Kalker, J. P. Linnartz, M. Miller et al., Copy protection for DVD video, Proc. of the IEEE Special issue on identification and protection of multimedia information, pp.1267-1276, 1999.
DOI : 10.1109/5.771077

J. Stern and S. Craver, Lessons learned from the SDMI, Proc. of the Fourth Workshop on Multimedia Signal Processing (MMSP), pp.213-218, 2001.

I. Cox and M. Miller, Electronic watermarking: The first 50 years, Proc. of Fourth Workshop on Multimedia Signal Processing (MMSP), pp.225-230, 2001.

F. Bartolini, M. Barni, and T. Furon, Special session on watermarking security, Proc. of 11th European Signal Processing Conference, pp.283-302, 2002.

M. Barni and F. Pérez-gonzález, Special session on watermarking security, Security, Steganography, and Watermarking of Multimedia Contents VII. Volume 5681 of Proceedings of SPIE-IS&T Electronic Imaging, pp.685-768, 2005.

G. Doërr and J. L. Dugelay, Collusion issue in video watermarking, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.685-696, 2005.
DOI : 10.1117/12.585783

W. Trappe, M. Wu, Z. Wang, and K. Liu, Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1069-1087, 2003.
DOI : 10.1109/TSP.2003.809378

M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack Security and Watermarking of Multimedia Contents II, 2000.

P. W. Wong and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, issue.10, pp.1593-1601, 2001.
DOI : 10.1109/83.951543

R. Anderson and F. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.474-481, 1998.
DOI : 10.1109/49.668971

M. Barni, F. Bartolini, and T. Furon, A general framework for robust watermarking security, Special issue on Security of Data Hiding Technologies, pp.2069-2084, 2003.
DOI : 10.1016/S0165-1684(03)00168-3

URL : https://hal.archives-ouvertes.fr/inria-00080835

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

C. Cachin, An information-theoretic model for steganography, Proc. of the 2nd Int. Workshop on Inf. Hiding, pp.306-318, 1998.

R. Blahut, Principes and practice of information theory, 1987.

P. Guillon, T. Furon, and P. Duhamel, Applied public-key steganography, 2002.
URL : https://hal.archives-ouvertes.fr/inria-00080818

Y. Wang and P. Moulin, Steganalysis of block-structured stegotext Security, steganography and watermarking of multimedia contents VI, of Proceedings of SPIE-IS&T Electronic Imaging, pp.477-488, 2004.

T. Mittelholzer, An information-theoritic approach to steganography and watermarking, Proc. of the 3rd Int. Workshop on Inf. Hiding, pp.1-17, 1999.

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

J. Hernandez and F. Pérez-gonzález, Throwing more light on image watermarks, Proc. of 2nd Int. Workshop on Inf. Hiding (IH98, pp.191-207, 1998.

T. Furon, Security analysis, Certimark European Project, 2002.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security part I: Theory, Proc. SPIE-IS&T Electronic Imaging Watermarking of Multimedia Contents VII, pp.746-757, 2005.
DOI : 10.1117/12.586876

URL : https://hal.archives-ouvertes.fr/inria-00083329

P. Comesana, L. Pérez-freire, and F. Pérez-gonzález, Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, Proc. of 7th Inf. Hiding Workshop (IH05), 2005.
DOI : 10.1007/11558859_12

C. Cachin, Entropy Measures and Unconditional Security in Cryptography, of ETH Series in Inf. Security and Cryptography. H.-Gorre Verlag, 1997.

A. Cedilnik and K. Kosmelj, Relations among Fisher, Shannon-Wiener and Kullback measures of information for continuous variables, Developments in Statistics, pp.55-62, 2002.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976.
DOI : 10.1109/TIT.1976.1055638

A. Menezes, P. Van-oorschot, and S. Vanstone, Handbook of applied cryptography. Discrete mathematics and its applications, 1996.

J. F. Cardoso, Dependence, correlation and gaussianity in independent component analysis, Journal of Machine Learning Research, vol.4, pp.1177-1203, 2003.

S. Lyu and H. Farid, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Proc. of the 5th Int, pp.340-354, 2002.
DOI : 10.1007/3-540-36415-3_22

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1855

H. V. Poor, An introduction to signal detection and estimation, 1994.
DOI : 10.1007/978-1-4757-2341-0

J. Fridrich, M. Goljan, and D. Hogea, New methodology for breaking steganographic techniques for JPEGs Security and watermarking of multimedia contents V, of Proc. of SPIE-IS&T Electronic Imaging, pp.143-155, 2003.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security part II: Practice, Proc. of SPIE-IS&T Electronic Imaging Watermarking of Multimedia Contents VII, pp.758-768, 2005.
DOI : 10.1117/12.586890

URL : https://hal.archives-ouvertes.fr/inria-00083335

G. Doërr and J. L. Dugelay, Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.52-2955, 2004.
DOI : 10.1109/TSP.2004.833867

M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000.
DOI : 10.1109/83.826780

J. Vila-forcen, S. Voloshynovskiy, O. Koval, F. Pérez-gonzález, and T. Pun, Worst-case additive attack against quantization-based data-hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.136-146, 2005.
DOI : 10.1117/12.586263

S. Pateux, L. Guelvouit, and G. , Practical watermarking scheme based on wide spread spectrum and game theory, Signal Proc.: Image Communication, pp.283-296, 2003.
DOI : 10.1016/S0923-5965(02)00145-5

P. Moulin and A. Ivanovic, The zero-rate spread-spectrum watermarking game, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1098-1117, 2003.
DOI : 10.1109/TSP.2003.809370

A. Herrigel, S. Voloshynovskiy, and Y. Rystar, The watermark template attack, 2001.

E. Topak, S. Voloshynovskiy, O. Koval, M. Mihcak, and T. Pun, Security analysis of robust data-hiding with geometrically structured codebooks Security, steganogrpahy, and watermarking of multimedia content VII, of Proceedings of SPIE-IS&T Electronic Imaging, pp.709-720, 2005.

S. Craver, N. Memon, B. Yeo, and M. M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of International Conference on Image Processing, pp.540-543, 1997.
DOI : 10.1109/ICIP.1997.647969

J. Linnartz and M. Van-dijk, Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Proc. of the 2nd Int. Workshop on Inf. Hiding, 1998.
DOI : 10.1007/3-540-49380-8_18

M. E. Choubassi and P. Moulin, New sensitivity attack Security, steganography, and watermarking of multimedia contents VII, of Proceedings of SPIE-IS&T Electronic imaging, pp.734-745, 2005.

P. S. Barreto, H. Y. Kim, and V. Rijmen, Toward secure public-key blockwise fragile authentication watermarking, IEE Proc. Vision, pp.57-62, 2002.
DOI : 10.1049/ip-vis:20020168

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.3189

L. Pérez-freire, P. Comesana, and F. Pérez-gonzález, Information-Theoretic Analysis of Security in Side-Informed Data Hiding, Proc. of 7th Inf. Hiding Workshop (IH05), 2005.
DOI : 10.1007/11558859_11

M. Miller, G. Doërr, and I. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

A. Abrardo and M. Barni, Orthogonal dirty paper coding for informed data hiding, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.274-286, 2004.
DOI : 10.1117/12.524345