P. Bas, Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching, Proc. of the thirteenth Int. Workshop on Information Hiding, 2011.
DOI : 10.1007/978-3-642-24178-9_15

URL : https://hal.archives-ouvertes.fr/hal-00648055

P. Bas and F. Cayre, Achieving subspace or key security for WOA using natural or circular watermarking, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.80-88, 2006.
DOI : 10.1145/1161366.1161381

URL : https://hal.archives-ouvertes.fr/hal-00166575

P. Bas and F. Cayre, Natural Watermarking: A Secure Spread Spectrum Technique for WOA, Information Hiding, pp.1-14, 2007.
DOI : 10.1007/978-3-540-74124-4_1

URL : https://hal.archives-ouvertes.fr/hal-00166574

P. Bas and G. Doërr, Practical Security Analysis of Dirty Paper Trellis Watermarking, Information Hiding, pp.174-188, 2007.
DOI : 10.1080/01621459.1963.10500845

URL : https://hal.archives-ouvertes.fr/hal-00166690

P. Bas and T. Furon, Break Our Watermarking System 2nd edition, 2007.

P. Bas and J. Hurri, Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent components. Information Security, IEE Proceedings, pp.127-139, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00166596

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

E. Berlekamp, Nonbinary BCH decoding, 1966.

G. R. Blakley, C. Meadows, and G. B. Purdy, Fingerprinting Long Forgiving Messages, Proc. of Crypto'85, pp.180-189, 1985.
DOI : 10.1007/3-540-39799-X_15

D. Boesten and B. Skoric, Asymptotic fingerprinting capacity for non-binary alphabets. Arxiv preprint, 2011.

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data. Information Theory, IEEE Transactions on, vol.44, issue.5, pp.1897-1905, 1998.

R. P. Brent, An algorithm with guaranteed convergence for finding a zero of a function, The Computer Journal, vol.14, issue.4, pp.422-425, 1971.
DOI : 10.1093/comjnl/14.4.422

J. C. Bus and T. J. Dekker, Two Efficient Algorithms with Guaranteed Convergence for Finding a Zero of a Function, ACM Transactions on Mathematical Software, vol.1, issue.4, pp.330-345, 1975.
DOI : 10.1145/355656.355659

C. Cachin, An information-theoretic model for steganography, Information Hiding, pp.306-318, 1998.

F. Cayre and P. Bas, Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. Information Forensics and Security, IEEE Transactions on, vol.3, issue.1, pp.1-15, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00325091

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

A. Charpentier, C. Fontaine, and T. Furon, D??codage EM du code de Tardos pour le fingerprinting, Traitement du signal, vol.27, issue.2, pp.127-146, 2010.
DOI : 10.3166/ts.27.127-146

URL : https://hal.inria.fr/inria-00504522/file/GRETSI09.pdf

A. Charpentier, F. Xie, T. Furon, and C. Fontaine, Expectation maximisation decoding of tardos probabilistic fingerprinting code, Proc. of SPIE Electronic Imaging on Media Forensics and Security XI, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00504523

B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. of Crypto'94, pp.257-270, 1994.
DOI : 10.1007/3-540-48658-5_25

J. H. Conway, R. H. Hardin, and N. J. Sloane, Packing Lines, Planes, etc.: Packings in Grassmannian Spaces, Experimental Mathematics, vol.52, issue.2, pp.139-159, 1996.
DOI : 10.1080/10586458.1996.10504585

I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

I. Cox, M. Miller, and A. Mckellips, Watermarking as communications with side information, Proceedings of the IEEE, pp.1127-1141, 2002.
DOI : 10.1109/5.771068

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.9601

J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886

M. El-choubassi and P. Moulin, Sensitivity Analysis Attacks Against Randomized Detectors, 2007 IEEE International Conference on Image Processing, pp.129-132, 2007.
DOI : 10.1109/ICIP.2007.4379109

R. A. Fisher and F. Yates, Statistical tables for biological, agricultural and medical research

J. Fridrich, Steganography in Digital Media : Principles, Algorithms, and Applications, p.1, 2009.
DOI : 10.1017/CBO9781139192903

T. Furon, Le traçage de traîtres. Symposium sur la Sécurité des Technologies de l'Information et des Communications, 2009.

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

T. Furon and P. Duhamel, An Asymmetric Public Detection Watermarking Technique, Proc. of the third Int. Workshop on Information Hiding, pp.88-100, 1999.
DOI : 10.1007/10719724_7

URL : https://hal.archives-ouvertes.fr/inria-00001125

T. Furon, A. Guyader, and F. Cérou, On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes, Information Hiding, pp.341-356, 2008.
DOI : 10.1007/3-540-47870-1_5

T. Furon and L. Pérez-freire, Worst case attacks against binary probabilistic traitor tracing codes, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 2009.
DOI : 10.1109/WIFS.2009.5386484

URL : https://hal.archives-ouvertes.fr/inria-00505893

T. Furon, L. Pérez-freire, A. Guyader, and F. Cérou, Estimating the Minimal Length of Tardos Code, Information Hiding, pp.176-190, 2009.
DOI : 10.1007/s10623-007-9142-x

URL : https://hal.archives-ouvertes.fr/inria-00505882

I. D. Hill and M. C. , PIKE : Algorithm 299, p.185, 1985.
DOI : 10.1145/214392.214405

Y. W. Huang and P. Moulin, Saddle-point solution of the fingerprinting capacity game under the marking assumption, 2009 IEEE International Symposium on Information Theory, pp.2256-2260, 2009.
DOI : 10.1109/ISIT.2009.5205882

A. Hyvärinen, Fast and robust fixed-point algorithms for independent component analysis, IEEE Transactions on Neural Networks, vol.10, issue.3, pp.626-634, 1999.
DOI : 10.1109/72.761722

A. Hyvärinen and J. Karhunen, OJA : Independent Component Analysis, 2001.

D. Ibbetson, Algorithm 209. Collected Algorithms of the CACM, p.616, 1963.
DOI : 10.1145/367651.367664

H. Jégou, V. Chappelier, and F. Cayre, Libit : Information theory and signal processing library

T. Kalker, Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001.
DOI : 10.1109/MMSP.2001.962734

L. Kantorovitch, On the Translocation of Masses, Management Science, vol.5, issue.1, pp.199-201, 1942.
DOI : 10.1287/mnsc.5.1.1

L. Kantorovitch, On a problem of Monge (in Russian) Uspekhi Math, Nauk, vol.3, pp.225-226, 1948.

A. Kerckhoffs, La Cryptographie militaire, Journal des Sciences militaires, pp.5-38

M. Knott and C. S. Smith, On the optimal mapping of distributions, Journal of Optimization Theory and Applications, vol.47, issue.1, pp.39-49, 1984.
DOI : 10.1007/BF00934745

D. E. Knuth, The Art of Computer Programming volume 2 : Seminumerical algorithms, 1969.

H. W. Kuhn, The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955.
DOI : 10.1002/nav.3800020109

H. Malvar and D. Florêncio, Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003.
DOI : 10.1109/TSP.2003.809385

G. Marsaglia and W. Tsang, The Ziggurat Method for Generating Random Variables, Journal of Statistical Software, vol.5, issue.8, pp.1-7, 2000.
DOI : 10.18637/jss.v005.i08

J. Massey, Shift-register synthesis and BCH decoding. Information Theory, IEEE Transactions on, vol.15, issue.1, pp.122-127, 1969.

B. Mathon, P. Bas, and F. Cayre, Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, pp.237-244, 2007.
DOI : 10.1145/1288869.1288903

URL : https://hal.archives-ouvertes.fr/hal-00166726

B. Mathon, P. Bas, and F. Cayre, MACQ : Comparison of Secure Spread-Spectrum Modulations Applied to Still Image Watermarking, Annals of Telecommunications, vol.64, pp.11-12801, 2009.

B. Mathon, P. Bas, and F. Cayre, MACQ : Optimization of Natural Watermarking using Transportation Theory, MM&Sec '09 : Proceedings of the 11th ACM workshop on Multimedia and security, pp.33-38, 2009.

B. Mathon, P. Bas, and F. Cayre, MACQ : Considering security and robustness constraints for watermark-based tardos fingerprinting, IEEE SPS Multimedia Signal Processing Conference, 2010.

B. Mathon, P. Bas, and F. Cayre, MACQ : Security and robustness constraints for spread-spectrum tardos fingerprinting, IEEE Workshop on Information Forensics and Security, 2010.

B. Mathon, P. Bas, and F. Cayre, MACQ : Théorie du transport appliquée au tatouage sûr d'images naturelles, GRETSI Symposium on Signal and Image Processing (soumis à), 2011.

B. Mathon, P. Bas, F. Cayre, and F. Pérez-gonzález, Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding, Information Hiding, pp.325-340, 2008.
DOI : 10.1002/nav.3800020109

URL : https://hal.archives-ouvertes.fr/hal-00325080

B. Mathon, F. Cayre, and P. Bas, Techniques Sûres de Tatouage pour l'Image, Proc. CORESA2007, 2007.

M. Matsumoto and T. Nishimura, Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator, ACM Transactions on Modeling and Computer Simulation, vol.8, issue.1, pp.3-30, 1998.
DOI : 10.1145/272991.272995

G. Monge, Mémoire sur la théorie des déblais et des remblais Histoire de l'Académie Royale des Sciences de Paris, avec les Mémoires de Mathématique et de Physique pour la même année, pp.666-704

P. Moulin, Universal fingerprinting: Capacity and random-coding exponents, 2008 IEEE International Symposium on Information Theory, pp.220-224, 2008.
DOI : 10.1109/ISIT.2008.4594980

P. Moulin, BRIASSOULI : A stochastic QIM algorithm for robust, undetectable image watermarking, ICIP, pp.1173-1176, 2004.

J. A. Nelder and R. Mead, A Simplex Method for Function Minimization, The Computer Journal, vol.7, issue.4, pp.308-313, 1965.
DOI : 10.1093/comjnl/7.4.308

C. Peikert, A. Shelat, and A. Smith, Lower bounds for collusion-secure fingerprinting, SODA '03 : Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, pp.472-479, 2003.

L. Pérez-freire and F. Pérez-gonzález, Spread-Spectrum Watermarking Security. Information Forensics and Security, IEEE Transactions on, vol.4, issue.1, pp.2-24, 2009.

L. Pérez-freire, F. Pérez-gonzález, and T. Furon, On achievable security levels for lattice data hiding in the known message attack scenario, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.68-79, 2006.
DOI : 10.1145/1161366.1161380

A. Piva, M. Barni, F. Bartolini, and V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, Proceedings of International Conference on Image Processing, pp.520-523, 1997.
DOI : 10.1109/ICIP.1997.647964

S. Rachev and L. Rüschendorf, Mass Transportation Problems : Theory, 1998.

R. Rivest and A. Shamir, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

P. Sallee, de Lecture Notes in Computer Science : Digital Watermarking, Based Steganography, vol.2939, 2004.

C. E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, vol.27, issue.3, pp.379-423, 1948.
DOI : 10.1002/j.1538-7305.1948.tb01338.x

A. Simone and B. Skoric, Asymptotically False-Positive-Maximizing Attack on Non-binary Tardos Codes, 2011.
DOI : 10.1007/978-3-642-24178-9_2

B. Skoric, T. Vladimirova, M. Celik, and J. Talstra, Tardos Fingerprinting is Better Than We Thought. Information Theory, IEEE Transactions on, vol.54, issue.8, pp.3663-3676, 2008.
DOI : 10.1109/tit.2008.926307

URL : http://arxiv.org/abs/cs/0607131

K. Tanaka, Y. Nakamura, and K. Matsui, Embedding secret information into a dithered multi-level image, IEEE Conference on Military Communications, pp.216-220, 1990.
DOI : 10.1109/MILCOM.1990.117416

G. Tardos, Optimal probabilistic fingerprint codes, Journal of the ACM, vol.55, issue.2, pp.1-24, 2008.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8911

W. Trappe, M. Wu, Z. Wang, and K. Liu, Anti-collusion fingerprinting for multimedia, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1069-1087, 2003.
DOI : 10.1109/TSP.2003.809378

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.7136

B. Usevitch, Optimal bit allocation for biorthogonal wavelet coding, Proceedings of Data Compression Conference, DCC '96, pp.387-395, 1996.
DOI : 10.1109/DCC.1996.488344

B. Usevitch, A tutorial on modern lossy wavelet image compression: foundations of JPEG 2000, IEEE Signal Processing Magazine, vol.18, issue.5, pp.22-35, 2000.
DOI : 10.1109/79.952803

C. Villani, Topics in optimal transportation, 2003.
DOI : 10.1090/gsm/058

M. Wu and Z. J. Wang, Collusion resistance of multimedia fingerprinting using orthogonal modulation, IEEE Trans. on Image Proc, pp.804-821, 2005.

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606