C. Fontaine, How to protect multimedia pieces of content, from their creation to their distribution, 2011.

F. Chaabane, M. Charfeddine, and C. Amar, A survey on digital tracing traitors schemes, 9th International Conference on Information Assurance and Security, IAS 2013, pp.85-90, 2013.

C. Byung-ho-cha and . Kuo, Design and analysis of high-capacity anti-collusion hiding codes, Circuits, Systems & Signal Processing, vol.27, pp.195-211, 2008.

A. Barg and G. Kabatiansky, Robust parent-identifying codes and combinatorial arrays, IEEE Transactions on Information Theory, vol.59, issue.2, pp.994-1003, 2013.

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998.

G. Tardos, Optimal probabilistic fingerprint codes, STOC, pp.116-125, 2003.

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, IACR Cryptology ePrint Archive, p.41, 2007.

N. Akashi, M. Kuribayashi, and M. Morii, Hierarchical construction of Tardos code, Information Theory and Its Applications, pp.1-6, 2008.

M. Kuribayashi and M. Morii, Systematic generation of Tardos's fingerprint codes, IEICE Transactions, vol.93, issue.2, pp.508-515, 2010.

M. Desoubeaux, W. Gaetan-le-guelvouit, and . Puech, Fast detection of Tardos codes with boneh-shaw types, Proc. SPIE 8303, Media Watermarking, Security, and Forensics, 2012.

M. Charfeddine, M. Elarbi, M. Koubaa, and C. Amar, Dct based blind audio watermarking scheme, SIGMAP, pp.139-144, 2010.

, 23rd European Signal Processing Conference