Informed Stego-schemes in Active Warden Context : Tradeoff between steganographic performance, Journal of Signal Processing : Image Communication ,
How Quantization Based Schemes can be Used in Steganographic Context submitted in ,
Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack, 2010 IEEE International Conference on Image Processing, 2009. ,
DOI : 10.1109/ICIP.2010.5651418
URL : https://hal.archives-ouvertes.fr/hal-00548156
Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), 2009. ,
DOI : 10.1109/ICIP.2009.5414122
URL : https://hal.archives-ouvertes.fr/hal-00445555
Improved performances of Scalar Costa Scheme for images watermarking in an independent domain, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009. ,
DOI : 10.1109/ISPA.2009.5297675
URL : https://hal.archives-ouvertes.fr/hal-00548151
How quantization based scheme can be used in steganographic context, International Workshop on Multimedia Signal Processing (MMSP), 2009. ,
DOI : 10.1109/mmsp.2009.5293335
Watermarking scar as an ultimate copy protection, Journal of Physics: Conference Series, vol.206, 2009. ,
DOI : 10.1088/1742-6596/206/1/012037
URL : https://hal.archives-ouvertes.fr/hal-00445554
Informed stego-systems in active warden context: Statistical undetectability and capacity, 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008. ,
DOI : 10.1109/MMSP.2008.4665167
URL : https://hal.archives-ouvertes.fr/hal-00868780
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ,
DOI : 10.1109/ICASSP.2008.4517964
URL : https://hal.archives-ouvertes.fr/hal-00871165
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003. ,
DOI : 10.1109/TSP.2003.809366
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886
Applied public-key steganography, Proc. SPIE, pp.38-49, 2002. ,
URL : https://hal.archives-ouvertes.fr/inria-00080818
Information hiding-a survey, Proceedings of the IEEE, special issue on protection of multimedia content, pp.1062-1078, 1999. ,
DOI : 10.1109/5.771065
Security Issue and Collusion Attacks in Video Watermarking, 2005. ,
The histories. Penguin books, 1996. ,
Digital watermarking and steganography, 2008. ,
Watermarking systems engineering. Signal processing and communications series, 2004. ,
Multimedia watermarking techniques and applications . Auberbach publications, 2006. ,
DOI : 10.1201/9781420013467
Multimedia Fingerprinting Forensics for Traitor Tracing, EURASIP Book Series on Signal Processing and Communications, 2005. ,
DOI : 10.1155/9789775945181
<title>Strict integrity control of biomedical images</title>, Security and Watermarking of Multimedia Contents III, pp.229-240, 2001. ,
DOI : 10.1117/12.435403
Invisible watermarking for image verification, Journal of Electronic Imaging, vol.7, issue.3, pp.578-591, 1998. ,
DOI : 10.1117/1.482612
Digital watermarking of raw and compressed video, digital compression systems for video communication, pp.205-213, 1996. ,
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
Data-hiding codes. (tutorial paper), IEEE Trans. Information Theory, special issue on Security, vol.93, pp.2783-2127, 2005. ,
DOI : 10.1109/jproc.2005.859599
Pérez-gonzález. A tutorial on digital watermarking, IEEE Annual Carnahan Conference on Security Technology, 1999. ,
The role of human visual models in image processing, Proce. IEEE, 1981. ,
DOI : 10.1109/PROC.1981.12024
The role of human visual models in image processing, Proce. IEEE, 1981. ,
Mapping based reversible watermarking, 4th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications, pp.70000-70001 ,
URL : https://hal.archives-ouvertes.fr/hal-00160315
A high capacity reversible watermarking scheme, Visual Communications and Image Processing 2009, 2009. ,
DOI : 10.1117/12.805561
URL : https://hal.archives-ouvertes.fr/lirmm-00416006
Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform, IEEE Transactions on Image Processing, vol.13, issue.8, pp.1147-1156, 2004. ,
DOI : 10.1109/TIP.2004.828418
A new fast reversible method for image safe transfer, Journal of Real-Time Image Processing, vol.33, issue.3, pp.55-65 ,
DOI : 10.1007/s11554-007-0045-x
URL : https://hal.archives-ouvertes.fr/lirmm-00192119
Scalable 3d terrain visualization through reversible jpeg2000-based blind data hiding, IEEE Trans. on Multimedia, vol.10, pp.1261-1276 ,
URL : https://hal.archives-ouvertes.fr/lirmm-00348551
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444
Channels with Side Information at the Transmitter, IBM Journal of Research and Development, vol.2, issue.4, pp.289-293, 1958. ,
DOI : 10.1147/rd.24.0289
Problems of control theory, pp.19-31, 1980. ,
On the capacity of computer memory with defects, IEEE Transactions on Information Theory, vol.29, issue.5, pp.731-739, 1983. ,
DOI : 10.1109/TIT.1983.1056723
Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.83-93, 1990. ,
DOI : 10.1109/26.46532
Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982. ,
DOI : 10.1109/TIT.1982.1056454
Principle of digital communication and coding, 1979. ,
Trellis coded quantization for data hiding, The IEEE Region 8 EUROCON 2003. Computer as a Tool., pp.24-24, 2003. ,
DOI : 10.1109/EURCON.2003.1248224
The prisonners' problem and the subliminal channel, Advances in Cryptology : Proceedings of CRYPTO, pp.51-67, 1984. ,
DOI : 10.1007/978-1-4684-4730-9_5
Limit Theorems for Stochastic Processes, 2002. ,
DOI : 10.1007/978-3-662-02514-7
Practical datahiding : Additive attacks performance analysis, International Workshop on Digital Watermarking, pp.244-259, 2005. ,
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2706-2722, 2008. ,
DOI : 10.1109/TIT.2008.921684
URL : http://arxiv.org/abs/cs/0702161
A robust digital image watermarking method using wavelet-based fusion, Proceedings of International Conference on Image Processing, pp.544-547, 1997. ,
DOI : 10.1109/ICIP.1997.647970
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.8711
Improving audio watermarking scheme using psychoacoustic watermark filtering, Proc. of the first IEEE International Symposium on Signal Processing and IT, pp.163-168, 2001. ,
Steganalysis of block-structured stegotext, Security, Steganography, and Watermarking of Multimedia Contents VI, pp.477-488, 2004. ,
DOI : 10.1117/12.527745
Vector quantization and signal compression, 1992. ,
DOI : 10.1007/978-1-4615-3626-0
A communications approach to image steganography, Proc. SPIE, pp.26-37, 2002. ,
DOI : 10.1117/12.465284
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7094
Elements of Information Theory, 1991. ,
Coding for channel with random parameters, pp.19-31, 1980. ,
On the limits of steganography, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.474-481, 1998. ,
DOI : 10.1109/49.668971
Trellis-coded quantization for public-key steganography, accepted to IEEE Conf. on Acoustics, Speech and Signal Proc, 2005. ,
Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), 2009. ,
DOI : 10.1109/ICIP.2009.5414122
URL : https://hal.archives-ouvertes.fr/hal-00445555
Watermarking scar as an ultimate copy protection, Euro American Workshop on Information Optics, 2009. ,
DOI : 10.1088/1742-6596/206/1/012037
URL : https://hal.archives-ouvertes.fr/hal-00445554
Analysis of the resistance of the Spread Transform against Temporal Frame Averaging attack, 2010 IEEE International Conference on Image Processing, 2009. ,
DOI : 10.1109/ICIP.2010.5651418
URL : https://hal.archives-ouvertes.fr/hal-00548156
Embedding secret information into a dithered multi-level image, IEEE Conference on Military Communications, 1990. ,
DOI : 10.1109/MILCOM.1990.117416
Electronic watermark, DICTA conference, pp.666-673 ,
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1733-1736, 2008. ,
DOI : 10.1109/ICASSP.2008.4517964
URL : https://hal.archives-ouvertes.fr/hal-00871165
Watermarking systems engineering. Signal processing and communication series, 2004. ,
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
La cryptographie militaire, Journal des sciences militaires, 1983. ,
A general frameworkfor robust watermarking security. Signal processing revue, Elsivier, pp.2069-2084, 2003. ,
DOI : 10.1016/s0165-1684(03)00168-3
URL : https://hal.inria.fr/inria-00080835/file/SP03_final.pdf
Information theory and reliable communication, John WILLEY & SONS, 1969. ,
DOI : 10.1007/978-3-7091-2945-6
Digital communications, 2000. ,
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
A security risk for publicly available watermark detectors, Benelux Information Theory Symposium, 1998. ,
Security pitfalls of frame-by-frame approaches to cideo watermarking, IEEE Trans. on signal processing, vol.52, issue.7, pp.2955-2964, 2004. ,
New intra-video collusion attack using mosaicing, IEEE proceeding on multimedia and expo (ICME), pp.505-508, 2003. ,
Effectiveness of ST-DM Watermarking Against Intra-video Collusion, Lecture Notes in Computer Science, vol.3710, pp.158-170, 2005. ,
DOI : 10.1007/11551492_13
Security Issue and Collusion Attacks in Video Watermarking, Thse de doctorat, 2005. ,
Computer vision and image processing, 1999. ,
Basics of Code Division Multiple Access (CDMA), 2005. ,
DOI : 10.1117/3.626142
Thoughts on inverse orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colours, with applications to newton's rule, ornamental tile-work, and the theory of numbers, Philosophical Magazine, vol.34, pp.461-475, 1867. ,
An information-theoretic model for steganography. Information Hiding, 1998. ,
Informed stego-systems in active warden context: Statistical undetectability and capacity, 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp.707-712, 2008. ,
DOI : 10.1109/MMSP.2008.4665167
URL : https://hal.archives-ouvertes.fr/hal-00868780
Fast protection of h.264/avc by selective encryption, Singaporean-French IPAL Symposium, pp.18-20 ,
URL : https://hal.archives-ouvertes.fr/lirmm-00416013
A comparative study on insertion strategies in MPEG-4 AVC watermarking, Mathematics of Data/Image Pattern Recognition, Compression, and Encryption with Applications XI, p.707509, 2008. ,
DOI : 10.1117/12.796386
URL : https://hal.archives-ouvertes.fr/hal-01372737
Compressed versus uncompressed video watermarking, Proceedings SPIE Conference on Mathematics of Data/Image Pattern Recognition, Compression, Coding, and Encryption with Applications X, pp.1-12, 2007. ,
DOI : 10.1117/12.734415
URL : https://hal.archives-ouvertes.fr/hal-00271199
Hybrid Coding of Pictorial Data, IEEE Transactions on Communications, vol.22, issue.5, 1974. ,
DOI : 10.1109/TCOM.1974.1092258
Generic coding of moving pictures and associated audio infor-mation : Systems, 1996. ,
Video coding for low bit rate communication, 1995. ,
Context-adaptive VLC coding of coefficients, 2002. ,
Context-based adaptive binary arithmetic coding in the h.264/avc video compression standard, IEEE Trans. on Circuits and Systems for Video Technology, vol.13, issue.7, pp.620-636, 2003. ,
Adaptive codes for H.26L. Technical repor, 2001. ,
Low-complexity transform and quantization in H.264/AVC, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.7, pp.598-603, 2003. ,
DOI : 10.1109/TCSVT.2003.814964