. Sur-un-code-de-tardos, 2 colluders ont des symboles différents sur 13% des blocs, 4 colluders 45%. Autrement dit, e n'est plus petit devant m

H. Jin, J. Lotspiech, and S. Nusser, Traitor tracing for prerecorded and recordable media, Proceedings of the 4th ACM workshop on Digital rights management , DRM '04, pp.83-90, 2004.
DOI : 10.1145/1029146.1029160

B. Chor, A. Fiat, and M. Naor, Tracing traitors, Proc. of Advances in cryptology, CRYPTO'94, pp.257-270, 1994.
DOI : 10.1007/3-540-48658-5_25

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.6638

D. R. Stinson and R. Wei, Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes, SIAM Journal on Discrete Mathematics, vol.11, issue.1, pp.41-53, 1998.
DOI : 10.1137/S0895480196304246

B. Chor, A. Fiat, M. Naor, and B. Pinkas, Tracing traitors, IEEE Transactions on Information Theory, vol.46, issue.3, pp.893-910, 2000.
DOI : 10.1109/18.841169

H. Schaathun, The Boneh???Shaw Fingerprinting Scheme is Better Than We Thought, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.248-255, 2006.
DOI : 10.1109/TIFS.2006.873596

C. Peikert, A. Shelat, and . Smith, Lower bounds for collusion-secure fingerprinting codes, Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.472-479, 2003.

G. Tardos, Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

B. Skoric, T. Vladimirova, M. Celik, and J. Talstra, Tardos Fingerprinting is Better Than We Thought, IEEE Transactions on Information Theory, vol.54, issue.8, 2008.
DOI : 10.1109/TIT.2008.926307

URL : http://arxiv.org/abs/cs/0607131

T. Furon, A. Guyader, and F. Cérou, On the design and optimisation of tardos probabilistic fingerprinting codes, Proc. of the 10th Information Hiding Workshop, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00504549

F. Cérou, T. Furon, and A. Guyader, Experimental assessment of the reliability for watermarking and fingerprinting schemes, EURASIP Jounal on Information Security ID, vol.12, p.414962, 2008.

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606