An introduction to signal detection and estimation, 1994. ,
DOI : 10.1007/978-1-4757-2341-0
Advanced probability theory, 1995. ,
Side-Informed Data Hiding: Robustness and Security Analysis, 2006. ,
RARE EVENT SIMULATION, Probability in the Engineering and Informational Sciences, vol.8, issue.01, pp.45-66, 2006. ,
DOI : 10.1214/aoap/1034968137
URL : https://hal.archives-ouvertes.fr/hal-00644139
Adaptive multilevel splitting for rare event analysis, Stochastic Analysis and Applications, pp.417-443, 2007. ,
Rare event simulation for a static distribution, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00505919
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311
Computing the Probability of False Watermark Detection, Proc. of the third Int. Workshop on Information Hiding, A. Pfitzmann, pp.146-158, 1999. ,
DOI : 10.1007/10719724_11
Asymptotically optimum embedding strategy for one-bit watermarking under gaussian attacks, Security, Steganography and Watermarking of Multimedia contents VIII of Proc. of SPIE-IS&T Electronic Imaging, 2008. ,
Handbook of mathematical functions with formulas, graphs, and mathematical tables, of National Bureau of Standards Applied Mathematics Series, Superintendent of Documents, U.S. Government Printing Office, 1964. ,
Testing for normality, Statistics: Textbooks and Monographs, vol.164, 2002. ,
Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, pp.255-274, 2008. ,
DOI : 10.1109/TIT.2007.911210
URL : http://arxiv.org/abs/0705.1919
JANIS: Just Another n-order Side-Informed Watermarking Scheme, Proceedings. International Conference on Image Processing, pp.153-156, 2002. ,
DOI : 10.1109/ICIP.2002.1039910
URL : https://hal.archives-ouvertes.fr/inria-00080826