Conclusion & Perspectives References: Spread Spectrum, 1997. ,
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007. ,
DOI : 10.1109/TIFS.2007.897266
A watermarking scheme for digital cinema, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.587-489, 2001. ,
DOI : 10.1109/ICIP.2001.958534
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, Proceedings of the 8th International Workshop on Digital Watermarking, pp.81-95, 2009. ,
DOI : 10.1109/TMM.2007.906580
On-Off Keying Modulation and Tardos Fingerprinting video watermarking -Marc Chaumont -IPTA'2010 Conclusion & Perspectives References: Luma modification: [Golikeri et al, JEI, issue.08, 2008. ,
DOI : 10.1145/1411328.1411347
URL : https://hal.inria.fr/inria-00504606/file/mmsec37s-xie.pdf
Robust Digital Video Watermarking Scheme for H.264 Advanced Video Coding Standard Motion vector modification, Journal of Electronic Imaging, vol.16, issue.4, 2001. ,
Video Watermark Technique in Motion Vector, Proc. of XIV Symposium on Computer Graphics and Image Processing, pp.179-182, 2001. ,
MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video, Proceedings of ESORICS, pp.221-240, 1998. ,
DOI : 10.1007/BFb0055866
Considering the Reconstruction Loop for Watermarking of Intra and Inter Frames of H The 17th European Signal Processing Conference, 2009. ,
Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.441-455, 2008. ,
DOI : 10.1109/TIFS.2008.923825
Watermarking of uncompressed and compressed video, [Gong and Lu, pp.283-301, 1998. ,
DOI : 10.1016/S0165-1684(98)00011-5
Towards Fast and Robust Watermarking Scheme for H.264 Video, 2008 Tenth IEEE International Symposium on Multimedia, pp.649-653, 2008. ,
DOI : 10.1109/ISM.2008.16
Authentication of H.264 streams by direct watermarking of CAVLC blocks, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007. ,
DOI : 10.1117/12.703369
AVC Substitution Watermarking: A CAVLC Example, Media Forensics and Security, Proc. of SPIE-IS&T Electronic Imaging, 2009. ,
DOI : 10.1117/12.824631
Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, 2009. ,
DOI : 10.1145/1597817.1597819
URL : https://hal.archives-ouvertes.fr/hal-00384058
Better security levels for 'Broken Arrows, Proc. IS&T/SPIE Electronic Imaging, Media Forensics and Security XII, 2008. ,
DOI : 10.1117/12.838895
URL : https://hal.archives-ouvertes.fr/hal-00472982
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08 ,
DOI : 10.1145/1411328.1411366
URL : https://hal.archives-ouvertes.fr/hal-00325086
Annals of Telecommunication, 2007. ,
Exploiting Security Holes in Lattice Data Hiding, Information Hiding, IH'07, pp.11-13, 2007. ,
DOI : 10.1109/9.233172