A. Barg and G. Kabatiansky, A class of I.P.P. codes with efficient identification, Journal of Complexity, vol.20, issue.2-3, pp.137-147, 2004.
DOI : 10.1016/j.jco.2003.08.012

A. Barg, G. Blakley, and G. Kabatiansky, Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003.
DOI : 10.1109/TIT.2003.809570

M. Barni, F. Bartolini, and T. Furon, A general framework for robust watermarking security, Signal Processing, vol.83, issue.10, pp.2069-2084, 2003.
DOI : 10.1016/S0165-1684(03)00168-3

URL : https://hal.archives-ouvertes.fr/inria-00080835

P. Barreto, H. Kim, and R. , Toward secure public-key blockwise fragile authentication watermarking, IEE Proc. Vision, pp.57-62, 2002.
DOI : 10.1049/ip-vis:20020168

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.3189

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638

J. Camenish and M. Michels, Proving in zero-knowledge that a number is the product of two safe primes, Proc. of Eurocrypt'99 (ed. 1592 L), pp.107-122, 1999.

M. Celik, G. Sharma, E. Saber, and A. Tekalp, Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.11, issue.6, pp.585-595, 2002.
DOI : 10.1109/TIP.2002.1014990

B. Chor and M. Naor, Advances in cryptology, Proc of CRYPTO 94, pp.257-270, 1994.

B. Chor, A. Fiat, M. Naor, and B. Pinkas, Tracing traitors, IEEE Transactions on Information Theory, vol.46, issue.3, pp.893-910, 2000.
DOI : 10.1109/18.841169

D. Coppersmith, F. Mintzer, C. Tresser, C. W. Wu, and M. M. , Yeung 1999 Fragile imperceptible digital watermarking with privacy control, Proc. of SPIE Electronic Imaging Symp., Security and Watermarking of Multimedia Contents, pp.79-84

I. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

S. Craver, N. Memon, B. Yeo, and M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.573-586, 1998.
DOI : 10.1109/49.668979

F. Deguillaume, S. Voloshynovskiy, and T. Pun, Secure hybrid robust watermarking resistant against tampering and copy attack, Signal Processing, vol.83, issue.10, pp.2133-2170, 2003.
DOI : 10.1016/S0165-1684(03)00172-5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9357

M. Fernandez and M. Soriano, Soft-decision tracing in fingerprinted multimedia content, IEEE Multimedia, vol.11, issue.2, pp.38-46, 2004.
DOI : 10.1109/MMUL.2004.1289040

J. Fridrich, M. Goljan, and R. Du, Lossless Data Embedding???New Paradigm in Digital Watermarking, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.2, pp.185-196, 2002.
DOI : 10.1155/S1110865702000537

G. Friedman, The trustworthy digital camera: restoring credibility to the photographic image, IEEE Transactions on Consumer Electronics, vol.39, issue.4, pp.905-910, 1993.
DOI : 10.1109/30.267415

T. Furon and P. Duhamel, An asymmetric watermarking method, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.981-995, 2003.
DOI : 10.1109/TSP.2003.809376

URL : https://hal.archives-ouvertes.fr/inria-00080829

T. Furon, I. Venturini, and P. Duhamel, Unified approach of asymmetric watermarking schemes In Security and Watermarking of Multimedia Contents III, SPIE, 2001.

K. Gopalakrishnan, N. Memon, and P. Vora, Protocols for watermark verification, IEEE Multimedia, vol.8, issue.4, pp.66-70, 2001.
DOI : 10.1109/93.959104

V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1757-1767, 1999.
DOI : 10.1109/18.782097

M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000.
DOI : 10.1109/83.826780

H. Hollmann, J. Van-lint, J. Linnartz, and L. Tolhuizen, On Codes with the Identifiable Parent Property, Journal of Combinatorial Theory, Series A, vol.82, issue.2, pp.121-133, 1998.
DOI : 10.1006/jcta.1997.2851

J. Fridrich, Add data for field: Volume, Proc. SPIE Photonic West. Security and Watermarking of Multimedia Contents, pp.691-700, 2002.

D. Kundur and D. Hatzinakos, Digital watermarking for telltale tamper proofing and authentication, Proceedings of the IEEE, vol.87, issue.7, pp.1167-1180, 1999.
DOI : 10.1109/5.771070

M. Kuribayashi and H. Tanaka, A Watermarking Scheme Applicable for Fingerprinting Protocol, Proc. of Int. Workshop on Digital Watermarking (ed. LNCS), pp.532-543, 2003.
DOI : 10.1007/978-3-540-24624-4_43

C. Lin and C. S. , A robust image authentication method distinguishing jpeg compression from malicious manipulation, IEEE Trans. on Circuits Syst. Video Technol, vol.11, issue.2, pp.153-168, 2001.

C. Lu and H. M. Liao, Multipurpose watermarking for image authentication and protection, IEEE Trans. on Image Processing, vol.10, issue.10, pp.1579-1592, 2001.

M. Mansour and A. Tewfik, Secure detection of public watermarks with fractal decision boundaries XI European Signal Processing Conference, p.2, 2002.

N. Memon and P. W. , A buyer-seller watermarking protocol, IEEE Transactions on Image Processing, vol.10, issue.4, pp.643-649
DOI : 10.1109/83.913598

A. Menezes and P. , Van Oorschot and S. Vanstone 1996 Handbook of applied cryptography Discrete mathematics and its applications

R. Safavi-naini and Y. Wang, Collusion Secure q-ary Fingerprinting for Perceptual Content, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, pp.57-75, 2001.
DOI : 10.1007/3-540-47870-1_5

R. Safavi-naini and Y. Wang, Sequential traitor tracing, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1319-1326, 2003.
DOI : 10.1109/TIT.2003.810629

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.870

H. Schaathun, Binary collusion-secure codes: comparison and improvements, 2004.

R. Schyndel and A. , Tirkel and I. Svalbe 1999 Key independent watermark detection Int, Conf. on Multimedia Computing and Systems

A. Silverberg, J. Staddon, and W. , Applications of list decoding to tracing traitors, IEEE Transactions on Information Theory, vol.49, issue.5, pp.1312-1318, 2003.
DOI : 10.1109/TIT.2003.810630

J. Staddon, D. Stinson, and R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Transactions on Information Theory, vol.47, issue.3, pp.1042-1049, 2001.
DOI : 10.1109/18.915661

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.3873

J. Stern, ContributionàContributionà la théorie de la protection de l'information PhD thesis, 2001.

D. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics, vol.11, issue.1, pp.41-53, 1998.
DOI : 10.1137/S0895480196304246

W. Trappe, M. Wu, Z. J. Wang, and K. J. Liu, Anti-collusion fingerprinting for multimedia, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery, pp.1069-1087, 2003.
DOI : 10.1109/TSP.2003.809378

S. Walton, Information authentication for a slippery new age, Dr. Dobbs Journal, vol.4, issue.20, pp.18-26, 1995.

P. Wong and N. Memon, Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Transactions on Image Processing, vol.10, issue.10, pp.1593-1601, 2001.
DOI : 10.1109/83.951543

C. Wu, On the design of content-based multimedia authentication system, IEEE Trans. on Multimedia, vol.4, issue.3, pp.385-393, 2002.

M. Wu, W. Trappe, Z. Wang, and K. Liu, Collusion-resistant fingerprinting for multimedia, Signal Processing magazine, vol.21, issue.2, pp.15-27, 2004.

Y. Wu, Linear combination collusion attack and its application on an anti-collusion fingerprinting, Proc. of Int. Conf. Acoustics, Speech, and Signal Processing, ICASSP'05, pp.13-16, 2005.

L. Xie and G. R. , Arce 2001 A class of authentication digital watermarking for secure multimedia communication, IEEE Trans. on Image Processing, vol.10, issue.11, pp.1754-1764

Y. Zhao, P. Campisi, and D. Kundur, Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images, IEEE Transactions on Image Processing, vol.13, issue.3, pp.430-448, 2004.
DOI : 10.1109/TIP.2003.821552

B. Zhu, M. D. Swanson, and A. H. , When seeing isn't believing, IEEE Signal Processing Magazine, vol.21, issue.2, pp.40-49
DOI : 10.1109/MSP.2004.1276112