F. T. Duhamel-p, Asymmetric Public Detection Watermarking Technique, Proc. of the third Int. Workshop on Information Hiding, pp.88-100, 1999.

F. T. Duhamel-p, « Robustness of an asymmetric technique, Proc. of Int. Conf. on Image Processing, 2000.

T. Furon, I. Venturini, and P. Duhamel, Unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III, 2001.
URL : https://hal.archives-ouvertes.fr/inria-00080814

. T. Furon, Application du tatouage numérique à la protection de copie, 2002.

F. T. and P. Duhamel, special issue on signal processing for data hiding in digital media & secure content delivery, IEEE Trans. on Signal Processing IEEE Trans. on Signal Processing, vol.51, issue.4, pp.981-995, 2003.

[. J. Eggers, J. Su, and B. Girod, Public key watermarking by eigenvectors of linear transforms, Proc. of the European Signal Processing Conference, 2000.

. T. Kalker, « A security risk for publicly available watermark detectors », Benelux Information Theory Symposium, 1998.

. D. Knuth, The art of computer programming, Computer Science and Information Processing, 1981.

. C. Shannon, Communication Theory of Secrecy Systems*, Bell system technical journal, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

. Ste and . J. Stern, Contribution à la théorie de la protection de l'information, 2001.