Asymmetric Public Detection Watermarking Technique, Proc. of the third Int. Workshop on Information Hiding, pp.88-100, 1999. ,
« Robustness of an asymmetric technique, Proc. of Int. Conf. on Image Processing, 2000. ,
Unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III, 2001. ,
URL : https://hal.archives-ouvertes.fr/inria-00080814
Application du tatouage numérique à la protection de copie, 2002. ,
special issue on signal processing for data hiding in digital media & secure content delivery, IEEE Trans. on Signal Processing IEEE Trans. on Signal Processing, vol.51, issue.4, pp.981-995, 2003. ,
Public key watermarking by eigenvectors of linear transforms, Proc. of the European Signal Processing Conference, 2000. ,
« A security risk for publicly available watermark detectors », Benelux Information Theory Symposium, 1998. ,
The art of computer programming, Computer Science and Information Processing, 1981. ,
Communication Theory of Secrecy Systems*, Bell system technical journal, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Contribution à la théorie de la protection de l'information, 2001. ,