A class of I.P.P. codes with efficient identification, Journal of Complexity, vol.20, issue.2-3, pp.137-147, 2004. ,
DOI : 10.1016/j.jco.2003.08.012
Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003. ,
DOI : 10.1109/TIT.2003.809570
A general framework for robust watermarking security, Signal Processing, vol.83, issue.10, pp.2069-2084, 2003. ,
DOI : 10.1016/S0165-1684(03)00168-3
URL : https://hal.archives-ouvertes.fr/inria-00080835
Toward secure public-key blockwise fragile authentication watermarking, IEE Proc. Vision, pp.57-62, 2002. ,
DOI : 10.1049/ip-vis:20020168
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.3189
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
DOI : 10.1109/18.705568
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638
Proving in zero-knowledge that a number is the product of two safe primes, Proc. of Eurocrypt'99 (ed. 1592 L), pp.107-122, 1999. ,
Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.11, issue.6, pp.585-595, 2002. ,
DOI : 10.1109/TIP.2002.1014990
Advances in cryptology, Proc of CRYPTO 94, pp.257-270, 1994. ,
Tracing traitors, IEEE Transactions on Information Theory, vol.46, issue.3, pp.893-910, 2000. ,
DOI : 10.1109/18.841169
Yeung 1999 Fragile imperceptible digital watermarking with privacy control, Proc. of SPIE Electronic Imaging Symp., Security and Watermarking of Multimedia Contents, pp.79-84 ,
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-586, 1998. ,
DOI : 10.1109/49.668979
Secure hybrid robust watermarking resistant against tampering and copy attack, Signal Processing, vol.83, issue.10, pp.2133-2170, 2003. ,
DOI : 10.1016/S0165-1684(03)00172-5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9357
Soft-decision tracing in fingerprinted multimedia content, IEEE Multimedia, vol.11, issue.2, pp.38-46, 2004. ,
DOI : 10.1109/MMUL.2004.1289040
Lossless Data Embedding???New Paradigm in Digital Watermarking, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.2, pp.185-196, 2002. ,
DOI : 10.1155/S1110865702000537
The trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, vol.39, issue.4, pp.905-910, 1993. ,
DOI : 10.1109/30.267415
An asymmetric watermarking method, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.981-995, 2003. ,
DOI : 10.1109/TSP.2003.809376
URL : https://hal.archives-ouvertes.fr/inria-00080829
Unified approach of asymmetric watermarking schemes In Security and Watermarking of Multimedia Contents III, SPIE, 2001. ,
Protocols for watermark verification, IEEE Multimedia, vol.8, issue.4, pp.66-70, 2001. ,
DOI : 10.1109/93.959104
Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1757-1767, 1999. ,
DOI : 10.1109/18.782097
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000. ,
DOI : 10.1109/83.826780
On Codes with the Identifiable Parent Property, Journal of Combinatorial Theory, Series A, vol.82, issue.2, pp.121-133, 1998. ,
DOI : 10.1006/jcta.1997.2851
Add data for field: Volume, Proc. SPIE Photonic West. Security and Watermarking of Multimedia Contents, pp.691-700, 2002. ,
Digital watermarking for telltale tamper proofing and authentication, Proceedings of the IEEE, vol.87, issue.7, pp.1167-1180, 1999. ,
DOI : 10.1109/5.771070
A Watermarking Scheme Applicable for Fingerprinting Protocol, Proc. of Int. Workshop on Digital Watermarking (ed. LNCS), pp.532-543, 2003. ,
DOI : 10.1007/978-3-540-24624-4_43
A robust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Trans. on Circuits Syst. Video Technol, vol.11, issue.2, pp.153-168, 2001. ,
Multipurpose watermarking for image authentication and protection, IEEE Trans. on Image Processing, vol.10, issue.10, pp.1579-1592, 2001. ,
Secure detection of public watermarks with fractal decision boundaries XI European Signal Processing Conference, p.2, 2002. ,
A buyer-seller watermarking protocol, IEEE Transactions on Image Processing, vol.10, issue.4, pp.643-649 ,
DOI : 10.1109/83.913598
Van Oorschot and S. Vanstone 1996 Handbook of applied cryptography Discrete mathematics and its applications ,
Collusion Secure q-ary Fingerprinting for Perceptual Content, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, pp.57-75, 2001. ,
DOI : 10.1007/3-540-47870-1_5
Sequential traitor tracing, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1319-1326, 2003. ,
DOI : 10.1109/TIT.2003.810629
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.870
Binary collusion-secure codes: comparison and improvements, 2004. ,
Tirkel and I. Svalbe 1999 Key independent watermark detection Int, Conf. on Multimedia Computing and Systems ,
Applications of list decoding to tracing traitors, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1312-1318, 2003. ,
DOI : 10.1109/TIT.2003.810630
Combinatorial properties of frameproof and traceability codes, IEEE Transactions on Information Theory, vol.47, issue.3, pp.1042-1049, 2001. ,
DOI : 10.1109/18.915661
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.3873
ContributionàContributionà la théorie de la protection de l'information PhD thesis, 2001. ,
Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics, vol.11, issue.1, pp.41-53, 1998. ,
DOI : 10.1137/S0895480196304246
Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1069-1087, 2003. ,
DOI : 10.1109/TSP.2003.809378
Information authentication for a slippery new age, Dr. Dobbs Journal, vol.4, issue.20, pp.18-26, 1995. ,
Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, issue.10, pp.1593-1601, 2001. ,
DOI : 10.1109/83.951543
On the design of content-based multimedia authentication system, IEEE Trans. on Multimedia, vol.4, issue.3, pp.385-393, 2002. ,
Collusion-resistant fingerprinting for multimedia, Signal Processing magazine, vol.21, issue.2, pp.15-27, 2004. ,
Linear combination collusion attack and its application on an anti-collusion fingerprinting, Proc. of Int. Conf. Acoustics, Speech, and Signal Processing, ICASSP'05, pp.13-16, 2005. ,
Arce 2001 A class of authentication digital watermarking for secure multimedia communication, IEEE Trans. on Image Processing, vol.10, issue.11, pp.1754-1764 ,
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images, IEEE Transactions on Image Processing, vol.13, issue.3, pp.430-448, 2004. ,
DOI : 10.1109/TIP.2003.821552
When seeing isn't believing, IEEE Signal Processing Magazine, vol.21, issue.2, pp.40-49 ,
DOI : 10.1109/MSP.2004.1276112