Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Transactions on Information Theory, vol.49, issue.4, pp.852-865, 2003. ,
DOI : 10.1109/TIT.2003.809570
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks, Proc. of the second Int. Workshop on Information Hiding, pp.329-343, 1998. ,
DOI : 10.1007/3-540-49380-8_23
Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals, EURASIP Journal on Advances in Signal Processing, vol.2004, issue.16, pp.2522-2532, 2004. ,
DOI : 10.1155/S1110865704408014
Advanced probability theory, 1995. ,
Performance analysis of existing and new methods for data hiding with known-host information in additive channels, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.960-980, 2003. ,
DOI : 10.1109/TSP.2003.809368
Side-Informed Data Hiding: Robustness and Security Analysis, 2006. ,
JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002. ,
DOI : 10.1109/ICIP.2002.1039910
URL : https://hal.archives-ouvertes.fr/inria-00080826
Computing the Probability of False Watermark Detection, Proc. of the third Int. Workshop on Information Hiding, INRIA A. Pfitzmann, pp.146-158, 1999. ,
DOI : 10.1007/10719724_11
Monte Carlo: concept, algorithms and applications, 1996. ,
DOI : 10.1007/978-1-4757-2553-7
RESTART: a method for accelerating rare event simulations, Proc. of the 13th Int. Teletraffic Congress, pp.71-76, 1991. ,
Adaptive multilevel splitting for rare event analysis, Stochastic Analysis and Applications, pp.417-443, 2007. ,
Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008. ,
DOI : 10.1109/TIT.2007.911210
URL : http://arxiv.org/abs/0705.1919
Testing for normality, Statistics: Textbooks and Monographs, vol.164, 2002. ,
Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003. ,
DOI : 10.1145/1346330.1346335
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911
Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, 2006. ,
DOI : 10.1109/TIT.2008.926307
URL : http://arxiv.org/abs/cs/0607131
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008. ,
DOI : 10.1007/s10623-007-9142-x
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature, 2006. ,