Towards digital rights and exemptions management systems, Computer Law & Security Review, vol.20, issue.4, pp.281-287, 2004. ,
DOI : 10.1016/S0267-3649(04)00049-4
URL : https://hal.archives-ouvertes.fr/inria-00083204
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-87, 1998. ,
DOI : 10.1109/49.668979
Copy protection for DVD video, Proc. of the IEEE Special issue on identification and protection of multimedia information, pp.1267-1276, 1999. ,
DOI : 10.1109/5.771077
Lessons learned from the SDMI, Proc. of the Fourth Workshop on Multimedia Signal Processing (MMSP), pp.213-218, 2001. ,
Electronic watermarking: The first 50 years, Proc. of Fourth Workshop on Multimedia Signal Processing (MMSP), pp.225-230, 2001. ,
Special session on watermarking security, Proc. of 11th European Signal Processing Conference, pp.283-302, 2002. ,
Special session on watermarking security, Security, Steganography, and Watermarking of Multimedia Contents VII. Volume 5681 of Proceedings of SPIE-IS&T Electronic Imaging, pp.685-768, 2005. ,
Collusion issue in video watermarking, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.685-696, 2005. ,
DOI : 10.1117/12.585783
Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1069-1087, 2003. ,
DOI : 10.1109/TSP.2003.809378
Watermark copy attack Security and Watermarking of Multimedia Contents II, 2000. ,
Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, issue.10, pp.1593-1601, 2001. ,
DOI : 10.1109/83.951543
On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.474-481, 1998. ,
DOI : 10.1109/49.668971
A general framework for robust watermarking security, Special issue on Security of Data Hiding Technologies, pp.2069-2084, 2003. ,
DOI : 10.1016/S0165-1684(03)00168-3
URL : https://hal.archives-ouvertes.fr/inria-00080835
Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
An information-theoretic model for steganography, Proc. of the 2nd Int. Workshop on Inf. Hiding, pp.306-318, 1998. ,
Principes and practice of information theory, 1987. ,
Applied public-key steganography, 2002. ,
URL : https://hal.archives-ouvertes.fr/inria-00080818
Steganalysis of block-structured stegotext Security, steganography and watermarking of multimedia contents VI, of Proceedings of SPIE-IS&T Electronic Imaging, pp.477-488, 2004. ,
An information-theoritic approach to steganography and watermarking, Proc. of the 3rd Int. Workshop on Inf. Hiding, pp.1-17, 1999. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Throwing more light on image watermarks, Proc. of 2nd Int. Workshop on Inf. Hiding (IH98, pp.191-207, 1998. ,
Security analysis, Certimark European Project, 2002. ,
Watermarking security part I: Theory, Proc. SPIE-IS&T Electronic Imaging Watermarking of Multimedia Contents VII, pp.746-757, 2005. ,
DOI : 10.1117/12.586876
URL : https://hal.archives-ouvertes.fr/inria-00083329
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, Proc. of 7th Inf. Hiding Workshop (IH05), 2005. ,
DOI : 10.1007/11558859_12
Entropy Measures and Unconditional Security in Cryptography, of ETH Series in Inf. Security and Cryptography. H.-Gorre Verlag, 1997. ,
Relations among Fisher, Shannon-Wiener and Kullback measures of information for continuous variables, Developments in Statistics, pp.55-62, 2002. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Handbook of applied cryptography. Discrete mathematics and its applications, 1996. ,
Dependence, correlation and gaussianity in independent component analysis, Journal of Machine Learning Research, vol.4, pp.1177-1203, 2003. ,
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Proc. of the 5th Int, pp.340-354, 2002. ,
DOI : 10.1007/3-540-36415-3_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1855
An introduction to signal detection and estimation, 1994. ,
DOI : 10.1007/978-1-4757-2341-0
New methodology for breaking steganographic techniques for JPEGs Security and watermarking of multimedia contents V, of Proc. of SPIE-IS&T Electronic Imaging, pp.143-155, 2003. ,
Watermarking security part II: Practice, Proc. of SPIE-IS&T Electronic Imaging Watermarking of Multimedia Contents VII, pp.758-768, 2005. ,
DOI : 10.1117/12.586890
URL : https://hal.archives-ouvertes.fr/inria-00083335
Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking, IEEE Transactions on Signal Processing, vol.52, issue.10, pp.52-2955, 2004. ,
DOI : 10.1109/TSP.2004.833867
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000. ,
DOI : 10.1109/83.826780
Worst-case additive attack against quantization-based data-hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.136-146, 2005. ,
DOI : 10.1117/12.586263
Practical watermarking scheme based on wide spread spectrum and game theory, Signal Proc.: Image Communication, pp.283-296, 2003. ,
DOI : 10.1016/S0923-5965(02)00145-5
The zero-rate spread-spectrum watermarking game, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1098-1117, 2003. ,
DOI : 10.1109/TSP.2003.809370
The watermark template attack, 2001. ,
Security analysis of robust data-hiding with geometrically structured codebooks Security, steganogrpahy, and watermarking of multimedia content VII, of Proceedings of SPIE-IS&T Electronic Imaging, pp.709-720, 2005. ,
On the invertibility of invisible watermarking techniques, Proceedings of International Conference on Image Processing, pp.540-543, 1997. ,
DOI : 10.1109/ICIP.1997.647969
Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Proc. of the 2nd Int. Workshop on Inf. Hiding, 1998. ,
DOI : 10.1007/3-540-49380-8_18
New sensitivity attack Security, steganography, and watermarking of multimedia contents VII, of Proceedings of SPIE-IS&T Electronic imaging, pp.734-745, 2005. ,
Toward secure public-key blockwise fragile authentication watermarking, IEE Proc. Vision, pp.57-62, 2002. ,
DOI : 10.1049/ip-vis:20020168
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.3189
Information-Theoretic Analysis of Security in Side-Informed Data Hiding, Proc. of 7th Inf. Hiding Workshop (IH05), 2005. ,
DOI : 10.1007/11558859_11
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Orthogonal dirty paper coding for informed data hiding, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.274-286, 2004. ,
DOI : 10.1117/12.524345