A. Barg, G. R. Blakley, and G. A. Kabatiansky, Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003.
DOI : 10.1109/TIT.2003.809570

J. P. Linnartz, T. Kalker, and G. Depovere, Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks, Proc. of the second Int. Workshop on Information Hiding, pp.329-343, 1998.
DOI : 10.1007/3-540-49380-8_23

V. Solachidis and I. Pitas, Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals, EURASIP Journal on Advances in Signal Processing, vol.2004, issue.16, pp.2522-2532, 2004.
DOI : 10.1155/S1110865704408014

J. Galambos, Advanced probability theory, 1995.

F. Pérez-gonzález, F. Balado, and J. Hernández, Performance analysis of existing and new methods for data hiding with known-host information in additive channels, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.960-980, 2003.
DOI : 10.1109/TSP.2003.809368

P. Comesaña, Side-Informed Data Hiding: Robustness and Security Analysis, 2006.

T. Furon, G. Silvestre, and N. Hurley, JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002.
DOI : 10.1109/ICIP.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826

M. Miller and J. Bloom, Computing the Probability of False Watermark Detection, Proc. of the third Int. Workshop on Information Hiding, INRIA A. Pfitzmann, pp.146-158, 1999.
DOI : 10.1007/10719724_11

G. Fishman, Monte Carlo: concept, algorithms and applications, 1996.
DOI : 10.1007/978-1-4757-2553-7

M. Villen-altamirano and J. Villen-altamirano, RESTART: a method for accelerating rare event simulations, Proc. of the 13th Int. Teletraffic Congress, pp.71-76, 1991.

F. Cérou and A. Guyader, Adaptive multilevel splitting for rare event analysis, Stochastic Analysis and Applications, pp.417-443, 2007.

N. Merhav and E. Sabbag, Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008.
DOI : 10.1109/TIT.2007.911210

URL : http://arxiv.org/abs/0705.1919

C. Henry and J. Thode, Testing for normality, Statistics: Textbooks and Monographs, vol.164, 2002.

G. Tardos, Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

B. Skoric, T. Vladimirova, M. Celik, and J. Talstra, Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, 2006.
DOI : 10.1109/TIT.2008.926307

URL : http://arxiv.org/abs/cs/0607131

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

K. Nuida, M. Hagiwara, H. Watanabe, and H. Imai, Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, 2006.