D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.
DOI : 10.1109/18.705568

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

W. Trappe, M. Wu, Z. Wang, and L. Liu, Anti-collusion fingerprinting for multimedia, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1069-1087, 2003.
DOI : 10.1109/TSP.2003.809378

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. He and M. Wu, Joint Coding and Embedding Techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.231-247, 2006.
DOI : 10.1109/TIFS.2006.873597

G. Tardos, Optimal Probabilistic Fingerprint Codes, Proc. ACM symposium on Theory of computing, pp.116-125, 2003.
DOI : 10.1145/1346330.1346335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.47, issue.3, pp.137-166, 2008.
DOI : 10.1007/s10623-007-9142-x

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606

W. Lin, S. He, and J. Bloom, Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.93-98, 2009.
DOI : 10.1145/1597817.1597834

I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

P. Moulin and J. O. Sullivan, Information-theoretic analysis of information hiding, IEEE Transactions on Information Theory, vol.49, issue.3, pp.563-593, 2003.
DOI : 10.1109/TIT.2002.808134

F. Hartung, J. Su, and B. Girod, Spread Spectrum Watermarking: Malicious Attacks and Counterattacks, Proc. SPIE: Security and Watermarking of Multimedia Contents, pp.147-158, 1999.
DOI : 10.1117/12.344665

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Lu, J. Chen, and K. Fan, Real-time frame-dependent video watermarking in VLC domain, Signal Processing: Image Communication, pp.624-642, 2005.
DOI : 10.1016/j.image.2005.03.012

G. Langelaar and R. Lagendijk, Optimal differential energy watermarking of DCT encoded images and video, IEEE Transactions on Image Processing, vol.10, issue.1, pp.148-158, 2001.
DOI : 10.1109/83.892451

F. Cérou, T. Furon, and A. Guyader, Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes, EURASIP Journal on Information Security, pp.1-12, 2008.