B. Chen and G. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886

M. Miller, G. Doerr, and I. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

D. Taubman and M. Marcellin, JPEG2000 image compression fundamentals standards and practice. Kluwer Academic, 2002.
DOI : 10.1007/978-1-4615-0799-4

I. Wg1, JPEG2000 part II final committee draft version 1, 2000.

M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

F. Dufaux, S. Wee, J. Apostolopoulos, and T. Ebrahimi, JPSEC for secure imaging in JPEG2000. SPIE application of digital image processing, Proc. SPIE, pp.319-330, 2004.

Y. Fan and H. Tsao, A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, vol.5, issue.1/2, pp.84-96, 2007.
DOI : 10.1504/IJHPCN.2007.015767

Y. Fan, A. Chiang, and J. Shen, ROI-based Watermarking Scheme for JPEG 2000, Circuits, Systems & Signal Processing, vol.2, issue.3, pp.763-774, 2008.
DOI : 10.1007/s00034-008-9055-6

K. Li and X. Zhang, Reliable adaptive watermarking scheme integrated with JPEG2000, Proc. ISPA 2003, pp.117-122, 2003.

P. Meerwald, Quantization watermarking in the JPEG2000 coding pipeline. 5th joint working conference on communications and multimedia security, communications and multimedia security issues of the new century, Proc. IFIP TC6/TC11, pp.69-79, 2001.

M. Schlauweg, D. Profrock, and E. Muller, JPEG2000-based secure image authentication, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.62-67, 2006.
DOI : 10.1145/1161366.1161378

A. Ouled-zaid, A. Makhloufi, and C. Olivier, Improved QIM-based watermarking integrated to JPEG2000 coding scheme, Signal, Image and Video Processing, vol.2, issue.1, pp.197-207, 2009.
DOI : 10.1007/s11760-008-0094-z

URL : https://hal.archives-ouvertes.fr/hal-00581067

M. Marcellin and T. Fischer, Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.82-93, 1990.
DOI : 10.1109/26.46532

G. Forney and . Jr, The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973.
DOI : 10.1109/PROC.1973.9030

S. Braci, R. Boyer, and C. Delpha, Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.117-120, 2009.
DOI : 10.1109/ICIP.2009.5414122

URL : https://hal.archives-ouvertes.fr/hal-00445555

O. Zaid, A. Makhloufi, A. Bouallegue, and A. , Wavelet domain watermark embedding strategy using TTCQ quantization, Int J Comput Sci Netw Secur (IJCSNS), vol.7, issue.6, pp.165-170, 2007.

G. Le-guelvouit, Trellis-coded quantization for public-key watermarking, speech and signal processing (ICASSP 2005), see the website http, 2005.

J. Chou, S. Pradhan, and K. Ramchandran, On the duality between data hiding and distributed source coding. Annual Asilomar conference on signals systems and computers, Proc. AACSSC 1999, pp.1503-1507, 1999.

E. Esen and A. Alatan, Data hiding using trellis coded quantization, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.59-62, 2004.
DOI : 10.1109/ICIP.2004.1418689

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2035

X. Wang and X. Zhang, Generalized Trellis Coded Quantization for Data Hiding, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, pp.269-272, 2007.
DOI : 10.1109/ICASSP.2007.366224

T. Fischer and M. Wang, Entropy-constrained trellis-coded quantization, IEEE Transactions on Information Theory, vol.38, issue.2, pp.415-426, 1992.
DOI : 10.1109/18.119697

L. Schuchman, Dither Signals and Their Effect on Quantization Noise, IEEE Transactions on Communications, vol.12, issue.4, pp.162-165, 1994.
DOI : 10.1109/TCOM.1964.1088973

L. Pérez-freire and F. Pérez-gonzalez, Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.593-610, 2008.
DOI : 10.1109/TIFS.2008.2002938

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006