[The H.264 Advanced Video Compression Standard, 2010. ,
DOI : 10.1002/9780470989418
Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T REC. H.264 ISO/IEC 14496-10 AVC), tech. rep., Joint Video Team, 2003. ,
Broken Arrows, EURASIP Journal on Information Security, vol.2008, issue.1, pp.1-313, 2008. ,
DOI : 10.1145/272991.272995
URL : https://hal.archives-ouvertes.fr/hal-00335311
Security issue and collusion attacks in video watermarking, 2005. ,
Authentication of H.264 streams by direct watermarking of CAVLC blocks, Security, Steganography, and Watermarking of Multimedia Contents IX, p.6505, 2007. ,
DOI : 10.1117/12.703369
Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997. ,
DOI : 10.1109/83.650120
Robust digital video watermarking scheme for H.264 advanced video coding standard, Journal of Electronic Imaging, vol.16, issue.4, 2007. ,
DOI : 10.1117/1.2816054
Fast Protection of H.264/AVC by Selective Encryption of CABAC For I & P Frames, " in [The 17th European Signal Processing Conference, 2009. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00416013
AVC substitution watermarking: a CAVLC example, [Media Forensics and Security I, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, p.7254, 2009. ,
Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004. ,
DOI : 10.1109/TIP.2003.821551
Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.441-455, 2008. ,
DOI : 10.1109/TIFS.2008.923825
Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007. ,
DOI : 10.1109/TIFS.2007.897266
Video watermark technique in motion vector, [Proceedings of the 14th Brazilian Symposium on Computer Graphics and Image Processing, pp.179-182, 2001. ,
MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video, [Proceedings 5th European Symposium on Research in Computer Security, pp.1485-221, 1998. ,
DOI : 10.1007/BFb0055866
Watermarking of uncompressed and compressed video, Signal Processing, vol.66, issue.3, pp.283-301, 1998. ,
DOI : 10.1016/S0165-1684(98)00011-5
A watermarking scheme for digital cinema, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.587-489, 2001. ,
DOI : 10.1109/ICIP.2001.958534
Towards Fast and Robust Watermarking Scheme for H.264 Video, 2008 Tenth IEEE International Symposium on Multimedia, pp.649-653, 2008. ,
DOI : 10.1109/ISM.2008.16
Robust 3D DFT Video Watermarking, [Security and Watermarking of Multimedia Contents, Part of IS&T/SPIE 12th Annual Symposium on Electronic Imaging, pp.113-124, 1999. ,
On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008. ,
DOI : 10.1145/1411328.1411347
URL : https://hal.archives-ouvertes.fr/inria-00504606
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, [8th International Workshop on Digital Watermarking, pp.81-95, 2009. ,
DOI : 10.1109/TMM.2007.906580
Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video, 2010 IEEE International Conference on Image Processing, 2010. ,
DOI : 10.1109/ICIP.2010.5652607
URL : https://hal.archives-ouvertes.fr/lirmm-00839379
La Cryptographie Militaire, Journal des Sciences Militaires IX, pp.5-38, 1883. ,
Watermarking security: theory and practice, special issue " Supplement on Secure Media III, pp.3976-3987, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Watermarking Security: A Survey, IEEE Transactions on Data Hiding and Multimedia Security, vol.1, issue.4300, pp.41-72, 2006. ,
DOI : 10.1007/11926214_2
A guide tour of video watermarking, Signal Processing: Image Communication, vol.18, issue.4, pp.263-282, 2003. ,
DOI : 10.1016/S0923-5965(02)00144-3
Comparison of secure spread-spectrum modulations applied to still image watermarking, annals of telecommunications - annales des t??l??communications, vol.10, issue.3, pp.801-813, 2009. ,
DOI : 10.1007/s12243-009-0119-9
URL : https://hal.archives-ouvertes.fr/hal-00437864
Two key estimation techniques for the broken arrows watermarking scheme, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.1-8, 2009. ,
DOI : 10.1145/1597817.1597819
URL : https://hal.archives-ouvertes.fr/hal-00384058
Better security levels for 'Broken Arrows, [IS&T/SPIE 22th Annual Symposium on Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XII], p.7541, 2010. ,
DOI : 10.1117/12.838895
URL : https://hal.archives-ouvertes.fr/hal-00472982
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.227-232, 2008. ,
DOI : 10.1145/1411328.1411366
URL : https://hal.archives-ouvertes.fr/hal-00325086
Exploiting security holes in lattice data hiding, " in [Information Hiding, Lecture Notes in Computer Science ], pp.159-173, 2007. ,
Optimal Probabilistic Fingerprint Codes, [ACM symposium on Theory of computing, pp.116-125, 2003. ,
Tardos fingerprinting is better than we thought, IEEE Transactions on Information Theory, issue.8, pp.54-3663, 2008. ,
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008. ,
DOI : 10.1007/s10623-007-9142-x
Improved versions of Tardos??? fingerprinting scheme, Designs, Codes and Cryptography, vol.46, issue.3, pp.79-103, 2008. ,
DOI : 10.1007/s10623-008-9200-z