Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003. ,
DOI : 10.1109/TSP.2003.809366
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.6886
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
JPEG2000 image compression fundamentals standards and practice. Kluwer Academic, 2002. ,
DOI : 10.1007/978-1-4615-0799-4
JPEG2000 part II final committee draft version 1, 2000. ,
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
JPSEC for secure imaging in JPEG2000. SPIE application of digital image processing, Proc. SPIE, pp.319-330, 2004. ,
A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, vol.5, issue.1/2, pp.84-96, 2007. ,
DOI : 10.1504/IJHPCN.2007.015767
ROI-based Watermarking Scheme for JPEG 2000, Circuits, Systems & Signal Processing, vol.2, issue.3, pp.763-774, 2008. ,
DOI : 10.1007/s00034-008-9055-6
Reliable adaptive watermarking scheme integrated with JPEG2000, Proc. ISPA 2003, pp.117-122, 2003. ,
Quantization watermarking in the JPEG2000 coding pipeline. 5th joint working conference on communications and multimedia security, communications and multimedia security issues of the new century, Proc. IFIP TC6/TC11, pp.69-79, 2001. ,
JPEG2000-based secure image authentication, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.62-67, 2006. ,
DOI : 10.1145/1161366.1161378
Improved QIM-based watermarking integrated to JPEG2000 coding scheme, Signal, Image and Video Processing, vol.2, issue.1, pp.197-207, 2009. ,
DOI : 10.1007/s11760-008-0094-z
URL : https://hal.archives-ouvertes.fr/hal-00581067
Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.82-93, 1990. ,
DOI : 10.1109/26.46532
The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973. ,
DOI : 10.1109/PROC.1973.9030
Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.117-120, 2009. ,
DOI : 10.1109/ICIP.2009.5414122
URL : https://hal.archives-ouvertes.fr/hal-00445555
Wavelet domain watermark embedding strategy using TTCQ quantization, Int J Comput Sci Netw Secur (IJCSNS), vol.7, issue.6, pp.165-170, 2007. ,
Trellis-coded quantization for public-key watermarking, speech and signal processing (ICASSP 2005), see the website http, 2005. ,
On the duality between data hiding and distributed source coding. Annual Asilomar conference on signals systems and computers, Proc. AACSSC 1999, pp.1503-1507, 1999. ,
Data hiding using trellis coded quantization, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.59-62, 2004. ,
DOI : 10.1109/ICIP.2004.1418689
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2035
Generalized Trellis Coded Quantization for Data Hiding, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, pp.269-272, 2007. ,
DOI : 10.1109/ICASSP.2007.366224
Entropy-constrained trellis-coded quantization, IEEE Transactions on Information Theory, vol.38, issue.2, pp.415-426, 1992. ,
DOI : 10.1109/18.119697
Dither Signals and Their Effect on Quantization Noise, IEEE Transactions on Communications, vol.12, issue.4, pp.162-165, 1994. ,
DOI : 10.1109/TCOM.1964.1088973
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.593-610, 2008. ,
DOI : 10.1109/TIFS.2008.2002938
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006