I. Richardson, [The H.264 Advanced Video Compression Standard, 2010.
DOI : 10.1002/9780470989418

I. Draft, Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T REC. H.264 ISO/IEC 14496-10 AVC), tech. rep., Joint Video Team, 2003.

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, pp.1-313, 2008.
DOI : 10.1145/272991.272995

URL : https://hal.archives-ouvertes.fr/hal-00335311

G. Doërr, Security issue and collusion attacks in video watermarking, 2005.

B. G. Mobasseri and Y. N. Raikar, Authentication of H.264 streams by direct watermarking of CAVLC blocks, Security, Steganography, and Watermarking of Multimedia Contents IX, p.6505, 2007.
DOI : 10.1117/12.703369

I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

A. Golikeri, P. Nasiopoulos, W. , and Z. J. , Robust digital video watermarking scheme for H.264 advanced video coding standard, Journal of Electronic Imaging, vol.16, issue.4, 2007.
DOI : 10.1117/1.2816054

Z. Shahid, M. Chaumont, and W. Puech, Fast Protection of H.264/AVC by Selective Encryption of CABAC For I & P Frames, " in [The 17th European Signal Processing Conference, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00416013

D. Zou and J. A. Bloom, AVC substitution watermarking: a CAVLC example, [Media Forensics and Security I, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, p.7254, 2009.

M. L. Miller, G. Doërr, and I. J. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

M. Noorkami, R. M. Mersereau, and T. Security, Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.441-455, 2008.
DOI : 10.1109/TIFS.2008.923825

Q. Li and I. J. Cox, Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007.
DOI : 10.1109/TIFS.2007.897266

J. Zhang, J. Li, and L. Zhang, Video watermark technique in motion vector, [Proceedings of the 14th Brazilian Symposium on Computer Graphics and Image Processing, pp.179-182, 2001.

J. P. Linnartz and J. C. Talstra, MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video, [Proceedings 5th European Symposium on Research in Computer Security, pp.1485-221, 1998.
DOI : 10.1007/BFb0055866

F. Hartung and B. Girod, Watermarking of uncompressed and compressed video, Signal Processing, vol.66, issue.3, pp.283-301, 1998.
DOI : 10.1016/S0165-1684(98)00011-5

L. Haitsma and T. Kalker, A watermarking scheme for digital cinema, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.587-489, 2001.
DOI : 10.1109/ICIP.2001.958534

X. Gong and H. Lu, Towards Fast and Robust Watermarking Scheme for H.264 Video, 2008 Tenth IEEE International Symposium on Multimedia, pp.649-653, 2008.
DOI : 10.1109/ISM.2008.16

F. Deguillaume, G. Csurka, J. O-'ruanaidh, and T. Pun, Robust 3D DFT Video Watermarking, [Security and Watermarking of Multimedia Contents, Part of IS&T/SPIE 12th Annual Symposium on Electronic Imaging, pp.113-124, 1999.

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606

C. Chen, J. Ni, and J. Huang, Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, [8th International Workshop on Digital Watermarking, pp.81-95, 2009.
DOI : 10.1109/TMM.2007.906580

Z. Shahid, M. Chaumont, and W. Puech, Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video, 2010 IEEE International Conference on Image Processing, 2010.
DOI : 10.1109/ICIP.2010.5652607

URL : https://hal.archives-ouvertes.fr/lirmm-00839379

A. Kerckhoffs, La Cryptographie Militaire, Journal des Sciences Militaires IX, pp.5-38, 1883.

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, special issue " Supplement on Secure Media III, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

L. Pérez-freire, P. Comesana, J. R. Troncoso-pastoriza, and F. Pérez-gonzález, Watermarking Security: A Survey, IEEE Transactions on Data Hiding and Multimedia Security, vol.1, issue.4300, pp.41-72, 2006.
DOI : 10.1007/11926214_2

G. Doërr and J. Dugelay, A guide tour of video watermarking, Signal Processing: Image Communication, vol.18, issue.4, pp.263-282, 2003.
DOI : 10.1016/S0923-5965(02)00144-3

B. Mathon, P. Bas, F. Cayre, and B. Macq, Comparison of secure spread-spectrum modulations applied to still image watermarking, annals of telecommunications - annales des t??l??communications, vol.10, issue.3, pp.801-813, 2009.
DOI : 10.1007/s12243-009-0119-9

URL : https://hal.archives-ouvertes.fr/hal-00437864

P. Bas and A. Westfeld, Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009.
DOI : 10.1145/1597817.1597819

URL : https://hal.archives-ouvertes.fr/hal-00384058

F. Xie, T. Furon, and C. Fontaine, Better security levels for 'Broken Arrows, [IS&T/SPIE 22th Annual Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XII], p.7541, 2010.
DOI : 10.1117/12.838895

URL : https://hal.archives-ouvertes.fr/hal-00472982

P. Bas and G. Doërr, Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008.
DOI : 10.1145/1411328.1411366

URL : https://hal.archives-ouvertes.fr/hal-00325086

L. Pérez-freire and F. Pérez-gonzález, Exploiting security holes in lattice data hiding, " in [Information Hiding, Lecture Notes in Computer Science ], pp.159-173, 2007.

G. Tardos, Optimal Probabilistic Fingerprint Codes, [ACM symposium on Theory of computing, pp.116-125, 2003.

?. Skori´cskori´c, B. Vladimirova, T. U. Celik, M. U. Talstra, and J. , Tardos fingerprinting is better than we thought, IEEE Transactions on Information Theory, issue.8, pp.54-3663, 2008.

?. Skori´cskori´c, B. Katzenbeisser, S. Celik, and M. U. , Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

O. Blayer and T. Tassa, Improved versions of Tardos??? fingerprinting scheme, Designs, Codes and Cryptography, vol.46, issue.3, pp.79-103, 2008.
DOI : 10.1007/s10623-008-9200-z