Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.117-120, 2009. ,
DOI : 10.1109/ICIP.2009.5414122
URL : https://hal.archives-ouvertes.fr/hal-00445555
A novel embedding technique for dirty paper trellis codes watermarking, Visual Information Processing and Communication, VIPC 2010, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, pp.7543-7581, 2010. ,
DOI : 10.1117/12.839853
URL : http://hal-lirmm.ccsd.cnrs.fr/docs/00/46/42/03/PDF/SPIE2010_CHAUMONT_RB-DPTC.pdf
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001. ,
DOI : 10.1109/18.923725
A BITRATE CONTROLLED DATA HIDING SCHEME FOR JPEG2000, International Journal of Computers and Applications, vol.32, issue.2, pp.238-241, 2010. ,
DOI : 10.2316/Journal.202.2010.2.202-2864
On the duality between distributed source coding and data hiding, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020), pp.1503-1507, 1999. ,
DOI : 10.1109/ACSSC.1999.832000
Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
DOI : 10.1109/TIT.1983.1056659
Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003. ,
DOI : 10.1109/TSP.2003.809366
Data hiding using trellis coded quantization, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.59-62, 2004. ,
DOI : 10.1109/ICIP.2004.1418689
A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, vol.5, issue.1/2, pp.84-96, 2007. ,
DOI : 10.1504/IJHPCN.2007.015767
ROI-based Watermarking Scheme for JPEG 2000, Circuits, Systems & Signal Processing, vol.2, issue.3, pp.763-774, 2000. ,
DOI : 10.1007/s00034-008-9055-6
The viterbi algorithm, IEEE Transaction on Information Theory, vol.61, pp.268-278, 1973. ,
A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme, Visual Information Processing and Communication II, pp.7882-7893, 2011. ,
DOI : 10.1117/12.872122
URL : https://hal.archives-ouvertes.fr/lirmm-00839373
A Joint Trellis Coded Quantization (TCQ) Data Hiding Scheme in the JPEG2000 Part 2 Coding Framework, The 19th European Signal Processing Conference, 2011. ,
JPEG2000 part II final committee draft version 1, 2000. ,
Trellis-coded quantization for public-key watermarking, Acoustics, Speech and Signal Processing, 2005. ,
Tatouage robuste d'images par turbo tcq, Traitement du Signal, vol.25, issue.6, 2009. ,
Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007. ,
DOI : 10.1109/TIFS.2007.897266
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking, IEEE International Conference on Image Processing 2005, pp.697-700, 2005. ,
DOI : 10.1109/ICIP.2005.1529846
Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.82-93, 1990. ,
DOI : 10.1109/26.46532
Quantization Watermarking in the JPEG2000 Coding Pipeline, Proc. of the 5th joint working Conference on Communications and Multimedia Security, Communications and Multimedia Security Issues of the new century, pp.69-79, 2001. ,
DOI : 10.1007/978-0-387-35413-2_6
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Wavelet Domain Watermark Embedding Strategy using TTCQ Quantization, International Journal of Computer Science and Network Security (IJCSNS), vol.7, issue.6, pp.165-170, 2007. ,
Improved QIM-based watermarking integrated to JPEG2000 coding scheme, Signal, Image and Video Processing, vol.2, issue.1, pp.197-207, 2009. ,
DOI : 10.1007/s11760-008-0094-z
URL : https://hal.archives-ouvertes.fr/hal-00581067
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3960-3975, 2005. ,
DOI : 10.1109/TSP.2005.855407
JPEG2000-based secure image authentication, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.62-67, 2006. ,
DOI : 10.1145/1161366.1161378
Dither Signals and Their Effect on Quantization Noise, IEEE Transactions on Communications, vol.12, issue.4, pp.162-165, 1994. ,
DOI : 10.1109/TCOM.1964.1088973
Steganography in JPEG2000 compressed images, IEEE Transaction on Consumer Electronics, vol.49, issue.4, pp.824-832, 2003. ,
JPEG2000: Image Compression Fundamentals, Standards, and Practice, 2001. ,
Efficient data hiding in JPEG2000 images using sequential decoding of convolutional codes, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628), pp.710-720, 2002. ,
DOI : 10.1109/ICDSP.2002.1028191
Channel coding with multilevel/phase signals, IEEE Transactions on Information Theory, vol.28, issue.1, pp.55-67, 1982. ,
DOI : 10.1109/TIT.1982.1056454
Generalized Trellis Coded Quantization for Data Hiding, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, pp.269-272, 2007. ,
DOI : 10.1109/ICASSP.2007.366224