. Cox, Conclusion & Perspectives References: Spread Spectrum, 1997.

I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

M. L. Miller, G. J. Doërr, and J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

Q. Li and I. J. Cox, Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007.
DOI : 10.1109/TIFS.2007.897266

L. Haitsma and T. Kalker, A watermarking scheme for digital cinema, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.587-489, 2001.
DOI : 10.1109/ICIP.2001.958534

C. Chen, J. Ni, and J. Huang, Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, Proceedings of the 8th International Workshop on Digital Watermarking, pp.81-95, 2009.
DOI : 10.1109/TMM.2007.906580

F. Xie, T. Furon, and C. Fontaine, On-Off Keying Modulation and Tardos Fingerprinting video watermarking -Marc Chaumont -IPTA'2010 Conclusion & Perspectives References: Luma modification: [Golikeri et al, JEI, issue.08, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.inria.fr/inria-00504606/file/mmsec37s-xie.pdf

A. Golikeri, P. Nasiopoulos, and Z. Wang, Robust Digital Video Watermarking Scheme for H.264 Advanced Video Coding Standard Motion vector modification, Journal of Electronic Imaging, vol.16, issue.4, 2001.

J. Zhang, J. Li, and L. Zhang, Video Watermark Technique in Motion Vector, Proc. of XIV Symposium on Computer Graphics and Image Processing, pp.179-182, 2001.

J. M. Linnartz and J. Talstra, MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video, Proceedings of ESORICS, pp.221-240, 1998.
DOI : 10.1007/BFb0055866

Z. Shahid, P. Meuel, M. Chaumont, and W. Puech, Considering the Reconstruction Loop for Watermarking of Intra and Inter Frames of H The 17th European Signal Processing Conference, 2009.

M. Noorkami and R. Mersereau, Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.441-455, 2008.
DOI : 10.1109/TIFS.2008.923825

F. Hartung and B. Girod, Watermarking of uncompressed and compressed video, [Gong and Lu, pp.283-301, 1998.
DOI : 10.1016/S0165-1684(98)00011-5

X. Gong and H. Lu, Towards Fast and Robust Watermarking Scheme for H.264 Video, 2008 Tenth IEEE International Symposium on Multimedia, pp.649-653, 2008.
DOI : 10.1109/ISM.2008.16

B. G. Mobasseri and Y. N. Raikar, Authentication of H.264 streams by direct watermarking of CAVLC blocks, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
DOI : 10.1117/12.703369

D. Zou and J. A. Bloom, AVC Substitution Watermarking: A CAVLC Example, Media Forensics and Security, Proc. of SPIE-IS&T Electronic Imaging, 2009.
DOI : 10.1117/12.824631

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

F. Xie, T. Furon, and C. Fontaine, Better security levels for 'Broken Arrows, Proc. IS&T/SPIE Electronic Imaging, Media Forensics and Security XII, 2008.
DOI : 10.1117/12.838895

URL : https://hal.archives-ouvertes.fr/hal-00472982

P. Bas and G. Doërr, Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08
DOI : 10.1145/1411328.1411366

URL : https://hal.archives-ouvertes.fr/hal-00325086

F. Cayre and B. Macq, Annals of Telecommunication, 2007.

L. Perez-freire and F. Perez-gonzalez, Exploiting Security Holes in Lattice Data Hiding, Information Hiding, IH'07, pp.11-13, 2007.
DOI : 10.1109/9.233172