S. Braci, R. Boyer, and C. Delpha, Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.117-120, 2009.
DOI : 10.1109/ICIP.2009.5414122

URL : https://hal.archives-ouvertes.fr/hal-00445555

M. Chaumont, A novel embedding technique for dirty paper trellis codes watermarking, Visual Information Processing and Communication, VIPC 2010, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, pp.7543-7581, 2010.
DOI : 10.1117/12.839853

URL : http://hal-lirmm.ccsd.cnrs.fr/docs/00/46/42/03/PDF/SPIE2010_CHAUMONT_RB-DPTC.pdf

B. Chen and G. W. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

J. Chen, T. S. Chen, C. N. Lin, and C. Y. Cheng, A BITRATE CONTROLLED DATA HIDING SCHEME FOR JPEG2000, International Journal of Computers and Applications, vol.32, issue.2, pp.238-241, 2010.
DOI : 10.2316/Journal.202.2010.2.202-2864

J. Chou, S. S. Pradhan, and K. Ramchandran, On the duality between distributed source coding and data hiding, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020), pp.1503-1507, 1999.
DOI : 10.1109/ACSSC.1999.832000

M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

E. Esen and A. A. Alatan, Data hiding using trellis coded quantization, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.59-62, 2004.
DOI : 10.1109/ICIP.2004.1418689

Y. Fan and H. Tsao, A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, vol.5, issue.1/2, pp.84-96, 2007.
DOI : 10.1504/IJHPCN.2007.015767

Y. Fan, A. Chiang, and J. Shen, ROI-based Watermarking Scheme for JPEG 2000, Circuits, Systems & Signal Processing, vol.2, issue.3, pp.763-774, 2000.
DOI : 10.1007/s00034-008-9055-6

F. Jr and G. D. , The viterbi algorithm, IEEE Transaction on Information Theory, vol.61, pp.268-278, 1973.

D. Goudia, M. Chaumont, W. Puech, and N. H. Said, A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme, Visual Information Processing and Communication II, pp.7882-7893, 2011.
DOI : 10.1117/12.872122

URL : https://hal.archives-ouvertes.fr/lirmm-00839373

D. Goudia, M. Chaumont, W. Puech, and N. H. Said, A Joint Trellis Coded Quantization (TCQ) Data Hiding Scheme in the JPEG2000 Part 2 Coding Framework, The 19th European Signal Processing Conference, 2011.

I. Wg1, JPEG2000 part II final committee draft version 1, 2000.

G. Le-guelvouit, Trellis-coded quantization for public-key watermarking, Acoustics, Speech and Signal Processing, 2005.

G. Le-guelvouit, Tatouage robuste d'images par turbo tcq, Traitement du Signal, vol.25, issue.6, 2009.

Q. Li and I. Cox, Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007.
DOI : 10.1109/TIFS.2007.897266

L. Lin, I. J. Cox, G. Doërr, and M. L. Miller, An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking, IEEE International Conference on Image Processing 2005, pp.697-700, 2005.
DOI : 10.1109/ICIP.2005.1529846

M. Marcellin and T. Fischer, Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.82-93, 1990.
DOI : 10.1109/26.46532

P. Meerwald, Quantization Watermarking in the JPEG2000 Coding Pipeline, Proc. of the 5th joint working Conference on Communications and Multimedia Security, Communications and Multimedia Security Issues of the new century, pp.69-79, 2001.
DOI : 10.1007/978-0-387-35413-2_6

M. Miller, G. Doerr, and I. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

A. Ouled-zaid, A. Makhloufi, and A. Bouallegue, Wavelet Domain Watermark Embedding Strategy using TTCQ Quantization, International Journal of Computer Science and Network Security (IJCSNS), vol.7, issue.6, pp.165-170, 2007.

A. Ouled-zaid, A. Makhloufi, and C. Olivier, Improved QIM-based watermarking integrated to JPEG2000 coding scheme, Signal, Image and Video Processing, vol.2, issue.1, pp.197-207, 2009.
DOI : 10.1007/s11760-008-0094-z

URL : https://hal.archives-ouvertes.fr/hal-00581067

F. Pérez-gonzàlez, F. Mosquera, M. Barni, and A. Abrardo, Rational dither modulation: a high-rate data-hiding method invariant to gain attacks, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3960-3975, 2005.
DOI : 10.1109/TSP.2005.855407

M. Schlauweg, D. Profrock, and E. Muller, JPEG2000-based secure image authentication, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.62-67, 2006.
DOI : 10.1145/1161366.1161378

L. Schuchman, Dither Signals and Their Effect on Quantization Noise, IEEE Transactions on Communications, vol.12, issue.4, pp.162-165, 1994.
DOI : 10.1109/TCOM.1964.1088973

P. C. Su and C. J. Kuo, Steganography in JPEG2000 compressed images, IEEE Transaction on Consumer Electronics, vol.49, issue.4, pp.824-832, 2003.

D. Taubman and M. Marcellin, JPEG2000: Image Compression Fundamentals, Standards, and Practice, 2001.

N. Thomos, N. V. Boulgouris, E. Kokkinou, and M. G. Strintzis, Efficient data hiding in JPEG2000 images using sequential decoding of convolutional codes, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628), pp.710-720, 2002.
DOI : 10.1109/ICDSP.2002.1028191

G. Ungerboeck, Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982.
DOI : 10.1109/TIT.1982.1056454

X. Wang and X. P. Zhang, Generalized Trellis Coded Quantization for Data Hiding, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, pp.269-272, 2007.
DOI : 10.1109/ICASSP.2007.366224