H. and V. Poor, An introduction to signal detection and estimation, 1994.
DOI : 10.1007/978-1-4757-2341-0

J. Galambos, Advanced probability theory, 1995.

P. Comesaña, Side-Informed Data Hiding: Robustness and Security Analysis, 2006.

A. Lagnoux, RARE EVENT SIMULATION, Probability in the Engineering and Informational Sciences, vol.8, issue.01, pp.45-66, 2006.
DOI : 10.1214/aoap/1034968137

URL : https://hal.archives-ouvertes.fr/hal-00644139

F. Cérou and A. Guyader, Adaptive multilevel splitting for rare event analysis, Stochastic Analysis and Applications, pp.417-443, 2007.

A. Guyader, F. Cérou, T. Furon, and P. , Rare event simulation for a static distribution, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00505919

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

M. Miller and J. Bloom, Computing the Probability of False Watermark Detection, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.146-158, 1999.
DOI : 10.1007/10719724_11

P. Comesaña, M. Barni, and N. Merhav, Asymptotically optimum embedding strategy for one-bit watermarking under gaussian attacks, Security, Steganography and Watermarking of Multimedia contents VIII of Proc. of SPIE-IS&T Electronic Imaging, 2008.

M. Abramowitz and I. A. Stegun, Handbook of mathematical functions with formulas, graphs, and mathematical tables, of National Bureau of Standards Applied Mathematics Series, Superintendent of Documents, U.S. Government Printing Office, 1964.

C. Henry and J. Thode, Testing for normality, Statistics: Textbooks and Monographs, vol.164, 2002.

N. Merhav and E. Sabbag, Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008.
DOI : 10.1109/TIT.2007.911210

URL : http://arxiv.org/abs/0705.1919

]. T. Furon, G. Silvestre, and N. Hurley, JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002.
DOI : 10.1109/ICIP.2002.1039910

URL : https://hal.archives-ouvertes.fr/inria-00080826