Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol.66, issue.3, pp.303-320, 1998. ,
DOI : 10.1016/S0165-1684(98)00012-7
Watermarking as communications with side information, Proc. IEEE, pp.1127-1141, 1999. ,
DOI : 10.1109/5.771068
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9601
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
The role of information theory in watermarking and its application to image watermarking, Signal Processing, vol.81, issue.6, pp.1121-1139, 2001. ,
DOI : 10.1016/S0165-1684(01)00037-8
Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
On the invertibility of invisible watermarking techniques, Proceedings of International Conference on Image Processing, pp.540-543, 1997. ,
DOI : 10.1109/ICIP.1997.647969
Watermark copy attack, Security and Watermarking of Multimedia Contents II, 2000. ,
Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.587-93, 1998. ,
DOI : 10.1109/49.668980
Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Proc. IHW, D. Aucsmith, 1998. ,
DOI : 10.1007/3-540-49380-8_18
An asymmetric watermarking method, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.981-995 ,
DOI : 10.1109/TSP.2003.809376
URL : https://hal.archives-ouvertes.fr/inria-00080829
An information-theoritic approach to steganography and watermarking, Proc. IHW, A. Pfitzmann, pp.1-17, 1999. ,
DOI : 10.1007/10719724_1
A general framework for robust watermarking security, Signal Processing, vol.83, issue.10, pp.2069-2084, 2003. ,
DOI : 10.1016/S0165-1684(03)00168-3
URL : https://hal.archives-ouvertes.fr/inria-00080835
La cryptographie militaire, Journal des sciences militaires, vol.9, issue.1883, pp.5-38 ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976. ,
DOI : 10.1109/TIT.1976.1055638
Copyright labeling of digitized image data, IEEE Communications Magazine, vol.36, issue.3, pp.94-100, 1998. ,
DOI : 10.1109/35.663333
Cryptology and the origins of spread spectrum, IEEE Spectr, pp.70-80, 1984. ,
Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, pp.283-296, 2003. ,
DOI : 10.1016/S0923-5965(02)00145-5
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019 ,
DOI : 10.1109/TSP.2003.809366
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886
Informed embedding: exploiting image and detector information during watermark insertion, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 2000. ,
DOI : 10.1109/ICIP.2000.899260
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2775
Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.868-905 ,
DOI : 10.1109/TSP.2003.809385
Blind separation of instantaneous mixtures of nonstationary sources, IEEE Transactions on Signal Processing, vol.49, issue.9, pp.1837-1848, 2001. ,
DOI : 10.1109/78.942614
Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.1141-1175, 2001. ,
DOI : 10.1016/S0165-1684(01)00038-X
Independent component analysis, A new concept?, Signal Processing, vol.36, issue.3, pp.287-314, 1994. ,
DOI : 10.1016/0165-1684(94)90029-9
URL : https://hal.archives-ouvertes.fr/hal-00417283
Blind source separation; semiparametric statistical approach, Special issue on neural networks, 1997. ,
Blind signal separation: statistical principles, Proc. IEEE, pp.2009-2025, 1998. ,
DOI : 10.1109/5.720250
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.7237
Blind separation of BPSK sources with residual carriers, Signal Processing, vol.73, issue.1-2, pp.67-79, 1999. ,
DOI : 10.1016/S0165-1684(98)00185-6
Source separation when the input sources are discrete or have constant modulus, IEEE Transactions on Signal Processing, vol.45, issue.12, pp.3062-3072, 1997. ,
DOI : 10.1109/78.650266
On the Cramer-Rao bound under parametric constraints, IEEE Signal Processing Letters, vol.5, issue.7, pp.177-179, 1998. ,
DOI : 10.1109/97.700921
On regularity and identifiability of blind source separation under constantmodulus constraints, IEEE Trans. Signal Processing, 2004. ,
Independent component analysis applied to digital image watermarking, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2001. ,
DOI : 10.1109/ICASSP.2001.941340
ICA for watermarking digital images, Journal of Machine Learning Research, vol.1, pp.1-25, 2002. ,
Watermark attack based on blind estimation without priors, Proc. IWDW, 2002. ,
Danger of low-dimensional watermarking subspaces, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004. ,
DOI : 10.1109/ICASSP.2004.1326489
Independent component analysis: algorithms and applications, Neural Networks, vol.13, issue.4-5, pp.411-430, 2000. ,
DOI : 10.1016/S0893-6080(00)00026-5
Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999. ,
DOI : 10.1109/72.761722
Maximum likelihood from incomplete data via the em algorithm, J. Roy. Stat. Soc, issue.39, pp.1-38, 1977. ,
Lattice Costa schemes using subspace projection for digital watermarking, European Transactions on Telecommunications, vol.15, issue.4, pp.351-362, 2004. ,
DOI : 10.1002/ett.985
Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery, IEEE Transactions on Signal Processing, vol.51, issue.4, 2003. ,
DOI : 10.1109/TSP.2003.809365