M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

B. Chen and G. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

M. L. Miller, G. J. Doërr, and I. J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

P. Bas and G. Doërr, Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008.
DOI : 10.1145/1411328.1411366

URL : https://hal.archives-ouvertes.fr/hal-00325086

L. Lin, I. J. Cox, G. Doërr, and M. L. Miller, An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking, IEEE International Conference on Image Processing 2005, pp.697-700, 2005.
DOI : 10.1109/ICIP.2005.1529846

C. Wang, G. Doërr, and I. J. Cox, Toward a Better Understanding of Dirty Paper Trellis Codes, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.233-236, 2006.

A. Kerckhoffs, La Cryptographie Militaire, Journal des Sciences Militaires, vol.IX, pp.5-38, 1883.

M. Chaumont, Fast Embedding Technique for Dirty Paper Trellis Watermarking, 8th International Workshop on Digital Watermarking, 2009.
DOI : 10.1109/TIP.2003.821551

URL : https://hal.archives-ouvertes.fr/lirmm-00411704

S. Craver, I. Atakli, and J. Yua, How we broke the BOWS watermark, Security, Steganography, and Watermarking of Multimedia Contents IX, pp.1-8, 2007.
DOI : 10.1117/12.704376

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311