S. Braci, C. Delpha, and R. Boyer, Informed Stego-schemes in Active Warden Context : Tradeoff between steganographic performance, Journal of Signal Processing : Image Communication

S. Braci, C. Delpha, and R. Boyer, How Quantization Based Schemes can be Used in Steganographic Context submitted in

S. Braci, R. Boyer, and C. Delpha, Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack, 2010 IEEE International Conference on Image Processing, 2009.
DOI : 10.1109/ICIP.2010.5651418

URL : https://hal.archives-ouvertes.fr/hal-00548156

S. Braci, R. Boyer, and C. Delpha, Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), 2009.
DOI : 10.1109/ICIP.2009.5414122

URL : https://hal.archives-ouvertes.fr/hal-00445555

B. Mostefa, I. Braci, S. Delpha, C. Boyer, R. Khamadja et al., Improved performances of Scalar Costa Scheme for images watermarking in an independent domain, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009.
DOI : 10.1109/ISPA.2009.5297675

URL : https://hal.archives-ouvertes.fr/hal-00548151

S. Braci, C. Delpha, and R. Boyer, How quantization based scheme can be used in steganographic context, International Workshop on Multimedia Signal Processing (MMSP), 2009.
DOI : 10.1109/mmsp.2009.5293335

S. Braci, A. Miraoui, C. Delpha, and R. Boyer, Watermarking scar as an ultimate copy protection, Journal of Physics: Conference Series, vol.206, 2009.
DOI : 10.1088/1742-6596/206/1/012037

URL : https://hal.archives-ouvertes.fr/hal-00445554

S. Braci, C. Delpha, R. Boyer, L. Guelvouit, and G. , Informed stego-systems in active warden context: Statistical undetectability and capacity, 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008.
DOI : 10.1109/MMSP.2008.4665167

URL : https://hal.archives-ouvertes.fr/hal-00868780

S. Braci, R. Boyer, and C. Delpha, On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008.
DOI : 10.1109/ICASSP.2008.4517964

URL : https://hal.archives-ouvertes.fr/hal-00871165

R. J. Eggers, R. Bauml, R. Tzchoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886

P. Guillon, T. Furon, and P. Duhamel, Applied public-key steganography, Proc. SPIE, pp.38-49, 2002.
URL : https://hal.archives-ouvertes.fr/inria-00080818

F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information hiding-a survey, Proceedings of the IEEE, special issue on protection of multimedia content, pp.1062-1078, 1999.
DOI : 10.1109/5.771065

G. Doërr, Security Issue and Collusion Attacks in Video Watermarking, 2005.

. Herodotus, The histories. Penguin books, 1996.

F. Shih, Digital watermarking and steganography, 2008.

M. Barni and F. Bartolini, Watermarking systems engineering. Signal processing and communications series, 2004.

B. Furht and D. Kirovski, Multimedia watermarking techniques and applications . Auberbach publications, 2006.
DOI : 10.1201/9781420013467

K. J. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting Forensics for Traitor Tracing, EURASIP Book Series on Signal Processing and Communications, 2005.
DOI : 10.1155/9789775945181

G. Coatrieux, B. Sankur, and H. Maitre, <title>Strict integrity control of biomedical images</title>, Security and Watermarking of Multimedia Contents III, pp.229-240, 2001.
DOI : 10.1117/12.435403

M. M. Yeung and F. C. Mintzer, Invisible watermarking for image verification, Journal of Electronic Imaging, vol.7, issue.3, pp.578-591, 1998.
DOI : 10.1117/1.482612

F. Hertung, I. Cox, T. Kalker, J. Linnartz, M. Miller et al., Digital watermarking of raw and compressed video, digital compression systems for video communication, pp.205-213, 1996.

M. H. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

B. Chen and G. W. , Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

P. Moulin and R. Koetter, Data-hiding codes. (tutorial paper), IEEE Trans. Information Theory, special issue on Security, vol.93, pp.2783-2127, 2005.
DOI : 10.1109/jproc.2005.859599

J. R. Hernández and O. , Pérez-gonzález. A tutorial on digital watermarking, IEEE Annual Carnahan Conference on Security Technology, 1999.

D. J. Granrath, The role of human visual models in image processing, Proce. IEEE, 1981.
DOI : 10.1109/PROC.1981.12024

D. J. Robinson and M. J. Hawksford, The role of human visual models in image processing, Proce. IEEE, 1981.

D. Coltuc and J. Chassery, Mapping based reversible watermarking, 4th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications, pp.70000-70001
URL : https://hal.archives-ouvertes.fr/hal-00160315

M. Chaumont and W. Puech, A high capacity reversible watermarking scheme, Visual Communications and Image Processing 2009, 2009.
DOI : 10.1117/12.805561

URL : https://hal.archives-ouvertes.fr/lirmm-00416006

A. M. Alattar, Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform, IEEE Transactions on Image Processing, vol.13, issue.8, pp.1147-1156, 2004.
DOI : 10.1109/TIP.2004.828418

W. Puech, J. M. Rodrigues, and J. E. Develay-morice, A new fast reversible method for image safe transfer, Journal of Real-Time Image Processing, vol.33, issue.3, pp.55-65
DOI : 10.1007/s11554-007-0045-x

URL : https://hal.archives-ouvertes.fr/lirmm-00192119

W. Puech, K. Hayat, and G. Gesquì-ere, Scalable 3d terrain visualization through reversible jpeg2000-based blind data hiding, IEEE Trans. on Multimedia, vol.10, pp.1261-1276
URL : https://hal.archives-ouvertes.fr/lirmm-00348551

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

I. J. Cox, J. Kiliany, T. Leightonz, and T. Shamoony, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444

C. E. Shannon, Channels with Side Information at the Transmitter, IBM Journal of Research and Development, vol.2, issue.4, pp.289-293, 1958.
DOI : 10.1147/rd.24.0289

S. I. Gel-'fand and M. S. Pinsker, Problems of control theory, pp.19-31, 1980.

C. Heegard and A. A. , On the capacity of computer memory with defects, IEEE Transactions on Information Theory, vol.29, issue.5, pp.731-739, 1983.
DOI : 10.1109/TIT.1983.1056723

M. W. Marcellin and T. R. Fischer, Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.83-93, 1990.
DOI : 10.1109/26.46532

G. Ungerboeck, Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982.
DOI : 10.1109/TIT.1982.1056454

A. J. Viterbi and J. K. Omura, Principle of digital communication and coding, 1979.

E. Esen, A. A. Alatan, and M. Aska, Trellis coded quantization for data hiding, The IEEE Region 8 EUROCON 2003. Computer as a Tool., pp.24-24, 2003.
DOI : 10.1109/EURCON.2003.1248224

G. J. Simmons, The prisonners' problem and the subliminal channel, Advances in Cryptology : Proceedings of CRYPTO, pp.51-67, 1984.
DOI : 10.1007/978-1-4684-4730-9_5

J. Jacod and A. Shiryaev, Limit Theorems for Stochastic Processes, 2002.
DOI : 10.1007/978-3-662-02514-7

J. E. Vila-forcén, S. Voloshynovskiy, O. Koval, F. Pérez-gonzález, and T. Pun, Practical datahiding : Additive attacks performance analysis, International Workshop on Digital Watermarking, pp.244-259, 2005.

Y. Wang and P. Moulin, Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2706-2722, 2008.
DOI : 10.1109/TIT.2008.921684

URL : http://arxiv.org/abs/cs/0702161

D. Kundur and D. Hatzinakos, A robust digital image watermarking method using wavelet-based fusion, Proceedings of International Conference on Image Processing, pp.544-547, 1997.
DOI : 10.1109/ICIP.1997.647970

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.8711

N. Cvejic and T. Seppnen, Improving audio watermarking scheme using psychoacoustic watermark filtering, Proc. of the first IEEE International Symposium on Signal Processing and IT, pp.163-168, 2001.

Y. Wang and P. Moulin, Steganalysis of block-structured stegotext, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.477-488, 2004.
DOI : 10.1117/12.527745

A. Gersho and R. M. Gray, Vector quantization and signal compression, 1992.
DOI : 10.1007/978-1-4615-3626-0

J. J. Eggers and R. Biuml, A communications approach to image steganography, Proc. SPIE, pp.26-37, 2002.
DOI : 10.1117/12.465284

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7094

T. Cover and J. Thomas, Elements of Information Theory, 1991.

S. I. Gel-'fand and M. S. Pinsker, Coding for channel with random parameters, pp.19-31, 1980.

R. J. Anderson and F. A. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.474-481, 1998.
DOI : 10.1109/49.668971

G. and L. Guelvouit, Trellis-coded quantization for public-key steganography, accepted to IEEE Conf. on Acoustics, Speech and Signal Proc, 2005.

S. Braci, R. Boyer, and C. Delpha, Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), 2009.
DOI : 10.1109/ICIP.2009.5414122

URL : https://hal.archives-ouvertes.fr/hal-00445555

S. Braci, A. Miraoui, C. Delpha, and R. Boyer, Watermarking scar as an ultimate copy protection, Euro American Workshop on Information Optics, 2009.
DOI : 10.1088/1742-6596/206/1/012037

URL : https://hal.archives-ouvertes.fr/hal-00445554

S. Braci, R. Boyer, and C. Delpha, Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack, 2010 IEEE International Conference on Image Processing, 2009.
DOI : 10.1109/ICIP.2010.5651418

URL : https://hal.archives-ouvertes.fr/hal-00548156

K. Tanaka, Y. Nakamura, and K. Matsui, Embedding secret information into a dithered multi-level image, IEEE Conference on Military Communications, 1990.
DOI : 10.1109/MILCOM.1990.117416

A. Z. Tirkel, G. A. Rankin, R. M. Van-schyndel, W. J. Ho, N. R. Mee et al., Electronic watermark, DICTA conference, pp.666-673

S. Braci, R. Boyer, and C. Delpha, On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1733-1736, 2008.
DOI : 10.1109/ICASSP.2008.4517964

URL : https://hal.archives-ouvertes.fr/hal-00871165

M. Barni and F. Bartoloni, Watermarking systems engineering. Signal processing and communication series, 2004.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, 1983.

M. Barni, F. Bartolini, and T. Furon, A general frameworkfor robust watermarking security. Signal processing revue, Elsivier, pp.2069-2084, 2003.
DOI : 10.1016/s0165-1684(03)00168-3

URL : https://hal.inria.fr/inria-00080835/file/SP03_final.pdf

R. G. Gallager, Information theory and reliable communication, John WILLEY & SONS, 1969.
DOI : 10.1007/978-3-7091-2945-6

J. G. Proakis, Digital communications, 2000.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

S. Voloshynovskiy, L. Pérez-freire, and F. Pérez-gonzález, A security risk for publicly available watermark detectors, Benelux Information Theory Symposium, 1998.

J. Dugelay and G. Doerr, Security pitfalls of frame-by-frame approaches to cideo watermarking, IEEE Trans. on signal processing, vol.52, issue.7, pp.2955-2964, 2004.

J. Dugelay and G. Doerr, New intra-video collusion attack using mosaicing, IEEE proceeding on multimedia and expo (ICME), pp.505-508, 2003.

R. Caldelli, A. Piva, M. Barni, and A. Carboni, Effectiveness of ST-DM Watermarking Against Intra-video Collusion, Lecture Notes in Computer Science, vol.3710, pp.158-170, 2005.
DOI : 10.1007/11551492_13

G. Doërr, Security Issue and Collusion Attacks in Video Watermarking, Thse de doctorat, 2005.

E. Scott, Computer vision and image processing, 1999.

R. Rao and S. Dianat, Basics of Code Division Multiple Access (CDMA), 2005.
DOI : 10.1117/3.626142

J. J. Sylvester, Thoughts on inverse orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colours, with applications to newton's rule, ornamental tile-work, and the theory of numbers, Philosophical Magazine, vol.34, pp.461-475, 1867.

C. Cachin, An information-theoretic model for steganography. Information Hiding, 1998.

S. Braci, C. Delpha, R. Boyer, and G. L. Guelvouit, Informed stego-systems in active warden context: Statistical undetectability and capacity, 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp.707-712, 2008.
DOI : 10.1109/MMSP.2008.4665167

URL : https://hal.archives-ouvertes.fr/hal-00868780

Z. Shahid, M. Chaumont, and W. Puech, Fast protection of h.264/avc by selective encryption, Singaporean-French IPAL Symposium, pp.18-20
URL : https://hal.archives-ouvertes.fr/lirmm-00416013

S. Duta, M. Mitrea, M. Belhaj, and F. Preteux, A comparative study on insertion strategies in MPEG-4 AVC watermarking, Mathematics of Data/Image Pattern Recognition, Compression, and Encryption with Applications XI, p.707509, 2008.
DOI : 10.1117/12.796386

URL : https://hal.archives-ouvertes.fr/hal-01372737

S. Duta, M. Mitrea, and F. Preteux, Compressed versus uncompressed video watermarking, Proceedings SPIE Conference on Mathematics of Data/Image Pattern Recognition, Compression, Coding, and Encryption with Applications X, pp.1-12, 2007.
DOI : 10.1117/12.734415

URL : https://hal.archives-ouvertes.fr/hal-00271199

A. Habibi, Hybrid Coding of Pictorial Data, IEEE Transactions on Communications, vol.22, issue.5, 1974.
DOI : 10.1109/TCOM.1974.1092258

I. and I. Jtc, Generic coding of moving pictures and associated audio infor-mation : Systems, 1996.

I. and I. Jtc, Video coding for low bit rate communication, 1995.

G. Bjontegaard and K. Lillevold, Context-adaptive VLC coding of coefficients, 2002.

T. Weigand, D. Marpe, and H. Schwarz, Context-based adaptive binary arithmetic coding in the h.264/avc video compression standard, IEEE Trans. on Circuits and Systems for Video Technology, vol.13, issue.7, pp.620-636, 2003.

D. Marpe, G. Blattermann, and T. Wiegand, Adaptive codes for H.26L. Technical repor, 2001.

H. S. Malvar, A. Hallapuro, M. Karczewicz, and L. Kerofsky, Low-complexity transform and quantization in H.264/AVC, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.7, pp.598-603, 2003.
DOI : 10.1109/TCSVT.2003.814964