Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003. ,
DOI : 10.1109/TSP.2003.809366
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008. ,
DOI : 10.1145/1411328.1411366
URL : https://hal.archives-ouvertes.fr/hal-00325086
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking, IEEE International Conference on Image Processing 2005, pp.697-700, 2005. ,
DOI : 10.1109/ICIP.2005.1529846
Toward a Better Understanding of Dirty Paper Trellis Codes, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.233-236, 2006. ,
La Cryptographie Militaire, Journal des Sciences Militaires, vol.IX, pp.5-38, 1883. ,
Fast Embedding Technique for Dirty Paper Trellis Watermarking, 8th International Workshop on Digital Watermarking, 2009. ,
DOI : 10.1109/TIP.2003.821551
URL : https://hal.archives-ouvertes.fr/lirmm-00411704
How we broke the BOWS watermark, Security, Steganography, and Watermarking of Multimedia Contents IX, pp.1-8, 2007. ,
DOI : 10.1117/12.704376
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311