J. O-'ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Processing, vol.66, issue.3, pp.303-320, 1998.
DOI : 10.1016/S0165-1684(98)00012-7

I. Cox, M. Miller, and A. Mckellips, Watermarking as communications with side information, Proc. IEEE, pp.1127-1141, 1999.
DOI : 10.1109/5.771068

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9601

B. Chen and G. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

P. Moulin, The role of information theory in watermarking and its application to image watermarking, Signal Processing, vol.81, issue.6, pp.1121-1139, 2001.
DOI : 10.1016/S0165-1684(01)00037-8

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

S. Craver, N. Memon, B. Yeo, and M. M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of International Conference on Image Processing, pp.540-543, 1997.
DOI : 10.1109/ICIP.1997.647969

M. Kutter, S. Voloshynovskiy, and A. Herrigel, Watermark copy attack, Security and Watermarking of Multimedia Contents II, 2000.

I. Cox and J. Linnartz, Some general methods for tampering with watermarks, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.587-93, 1998.
DOI : 10.1109/49.668980

J. P. Linnartz and M. Van-dijk, Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Proc. IHW, D. Aucsmith, 1998.
DOI : 10.1007/3-540-49380-8_18

T. Furon and P. Duhamel, An asymmetric watermarking method, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.981-995
DOI : 10.1109/TSP.2003.809376

URL : https://hal.archives-ouvertes.fr/inria-00080829

T. Mittelholzer, An information-theoritic approach to steganography and watermarking, Proc. IHW, A. Pfitzmann, pp.1-17, 1999.
DOI : 10.1007/10719724_1

M. Barni, F. Bartolini, and T. Furon, A general framework for robust watermarking security, Signal Processing, vol.83, issue.10, pp.2069-2084, 2003.
DOI : 10.1016/S0165-1684(03)00168-3

URL : https://hal.archives-ouvertes.fr/inria-00080835

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol.9, issue.1883, pp.5-38

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-54, 1976.
DOI : 10.1109/TIT.1976.1055638

S. Burgett, E. Koch, and J. Zhao, Copyright labeling of digitized image data, IEEE Communications Magazine, vol.36, issue.3, pp.94-100, 1998.
DOI : 10.1109/35.663333

D. Kahn, Cryptology and the origins of spread spectrum, IEEE Spectr, pp.70-80, 1984.

S. Pateux and G. L. Guelvouit, Practical watermarking scheme based on wide spread spectrum and game theory, Signal Processing: Image Communication, pp.283-296, 2003.
DOI : 10.1016/S0923-5965(02)00145-5

J. Eggers, R. Baüml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019
DOI : 10.1109/TSP.2003.809366

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886

M. Miller, I. Cox, and J. Bloom, Informed embedding: exploiting image and detector information during watermark insertion, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 2000.
DOI : 10.1109/ICIP.2000.899260

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2775

H. S. Malvar and D. A. Florêncio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.868-905
DOI : 10.1109/TSP.2003.809385

D. T. Pham and J. F. Cardoso, Blind separation of instantaneous mixtures of nonstationary sources, IEEE Transactions on Signal Processing, vol.49, issue.9, pp.1837-1848, 2001.
DOI : 10.1109/78.942614

J. Su, J. Eggers, and B. Girod, Analysis of digital watermarks subjected to optimum linear filtering and additive noise, Signal Processing, vol.81, issue.6, pp.1141-1175, 2001.
DOI : 10.1016/S0165-1684(01)00038-X

P. Comon, Independent component analysis, A new concept?, Signal Processing, vol.36, issue.3, pp.287-314, 1994.
DOI : 10.1016/0165-1684(94)90029-9

URL : https://hal.archives-ouvertes.fr/hal-00417283

S. Amari and J. F. Cardoso, Blind source separation; semiparametric statistical approach, Special issue on neural networks, 1997.

J. Cardoso, Blind signal separation: statistical principles, Proc. IEEE, pp.2009-2025, 1998.
DOI : 10.1109/5.720250

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.7237

A. Van-der-veen, Blind separation of BPSK sources with residual carriers, Signal Processing, vol.73, issue.1-2, pp.67-79, 1999.
DOI : 10.1016/S0165-1684(98)00185-6

F. Gamboa and E. Gassiat, Source separation when the input sources are discrete or have constant modulus, IEEE Transactions on Signal Processing, vol.45, issue.12, pp.3062-3072, 1997.
DOI : 10.1109/78.650266

P. Stoica and B. C. Ng, On the Cramer-Rao bound under parametric constraints, IEEE Signal Processing Letters, vol.5, issue.7, pp.177-179, 1998.
DOI : 10.1109/97.700921

Y. Yao and G. B. Giannakis, On regularity and identifiability of blind source separation under constantmodulus constraints, IEEE Trans. Signal Processing, 2004.

F. J. González-serrano and J. J. Murillo-fuentes, Independent component analysis applied to digital image watermarking, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2001.
DOI : 10.1109/ICASSP.2001.941340

S. Bounkong, B. Toch, D. Saad, and D. Lowe, ICA for watermarking digital images, Journal of Machine Learning Research, vol.1, pp.1-25, 2002.

J. Du, C. Lee, H. Lee, and Y. Suh, Watermark attack based on blind estimation without priors, Proc. IWDW, 2002.

G. Doërr and J. Dugelay, Danger of low-dimensional watermarking subspaces, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2004.
DOI : 10.1109/ICASSP.2004.1326489

A. Hyvärinen and E. Oja, Independent component analysis: algorithms and applications, Neural Networks, vol.13, issue.4-5, pp.411-430, 2000.
DOI : 10.1016/S0893-6080(00)00026-5

A. Hyvärinen, Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999.
DOI : 10.1109/72.761722

A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood from incomplete data via the em algorithm, J. Roy. Stat. Soc, issue.39, pp.1-38, 1977.

R. Fischer, R. Tzschoppe, and R. Bäuml, Lattice Costa schemes using subspace projection for digital watermarking, European Transactions on Telecommunications, vol.15, issue.4, pp.351-362, 2004.
DOI : 10.1002/ett.985

A. Akansu, E. Delp, T. Kalker, B. Liu, N. Memon et al., Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery, IEEE Transactions on Signal Processing, vol.51, issue.4, 2003.
DOI : 10.1109/TSP.2003.809365