. Les-groupes-d, Coding Experts Group : VCEG) et de l'ISO/IEC (Moving Picture Experts Group : MPEG) ont lancé un appel à proposition en janvier 2010 pour définir le futur standard de compression. Certaines des propositions ont permis, dans certains cas, de réduire le débit par deux par rapport à H.264 High Profile à même qualité visuelle, IEC ont donc lancé la standardisation du nouveau codeur « High Efficiency Video Coding : HEVC ». La norme de ce nouveau standard est prévue pour juillet 2012. Il est fort probable que certaines propositions testées sur le logiciel KTA [KTA11] soient reprises dans ce nouveau standard

. Haitsma, A watermarking scheme for digital cinema, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.587-489, 2001.
DOI : 10.1109/ICIP.2001.958534

. Hartung, Hartung (F.) et Girod (B.). ? Watermarking of Uncompressed and Compressed Video, Signal Processing, vol.98, issue.66, pp.283-301, 1998.

. Horiuchi, Noharaa (F.) et Tominaga (S.). ? Accurate Reversible Colorto-Gray Mapping Algorithm Without Distortion Conditions, Pattern Recognition Letters, vol.10, issue.15, p.31, 2010.

I. Iec, Information technology ? JPEG 2000 image coding system : Extensions. ? Rapport de recherche, ISO and ITU-T, pp.15444-15446, 2004.

[. Kta, Key Technical Areas) Software, téléchargeable à l'adresse http, 2011.

. Pevný, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, 12th International Conference, pp.161-177, 2010.
DOI : 10.1049/el:20070248

. Piva, ? The first BOWS Contest (Break Our Watermarking System) ? IS&T/SPIE 19th Annual Symposium on Electronic Imaging, Security, Steganography , and Watermarking of Multimedia Contents IX edited by, pp.1-10, 2007.

. Shahid, Fast protection of H.264/AVC by selective encryption of CABAC, 2009 IEEE International Conference on Multimedia and Expo, 2003.
DOI : 10.1109/ICME.2009.5202675

URL : https://hal.archives-ouvertes.fr/lirmm-00416013

M. Abomhara, O. Zakaria, O. Khalifa, A. Zaiden, and B. Zaiden, Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard, International Journal of Computer and Electrical Engineering, vol.2, issue.2, pp.223-229, 2010.
DOI : 10.7763/IJCEE.2010.V2.141

M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, Format-Preserving Encryption, Proc. 16th Annual International Workshop on Selected Areas in Cryptography, pp.295-312, 2009.
DOI : 10.1007/978-3-642-05445-7_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.2204

G. Bjontegaard and K. Lillevold, Context-Adaptive VLC Coding of Coefficients, JVT Document JVT-C028, 2002.

P. Carrillo, H. Kalva, and S. Magliveras, Compression Independent Reversible Encryption for Privacy in Video Surveillance, EURASIP Journal on Information Security, p.13, 2009.

H. Cheng and X. Li, Partial encryption of compressed images and videos, IEEE Transactions on Signal Processing, vol.48, issue.8, pp.2439-2445, 2000.
DOI : 10.1109/78.852023

J. Daemen and V. Rijmen, AES Proposal: The Rijndael Block Cipher, Proton World Int.l ESAT-COSIC, 2002.

M. V. Droogenbroeck and R. Benedett, Techniques for a Selective Encryption of Uncompressed and Compressed Images, Proc. of Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002, pp.90-97, 2002.

F. Dufaux and T. Ebrahimi, Scrambling for Privacy Protection in Video Surveillance Systems, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, issue.8, pp.1168-1174, 2008.
DOI : 10.1109/TCSVT.2008.928225

M. M. Fisch, H. Stgner, and A. Uhl, Layered Encryption Techniques for DCT-Coded Visual Data, Proc. 12 th European Signal Processing Conference, pp.821-824, 2004.

M. Grangetto, E. Magli, and G. Olmo, Multimedia Selective Encryption by Means of Randomized Arithmetic Coding, IEEE Transactions on Multimedia, vol.8, issue.5, pp.905-917, 2006.
DOI : 10.1109/TMM.2006.879919

URL : http://porto.polito.it/1669594/1/01703505.pdf

G. Jakimoski and K. Subbalakshmi, Cryptanalysis of Some Multimedia Encryption Schemes, IEEE Transactions on Multimedia, vol.10, issue.3, pp.330-338, 2008.
DOI : 10.1109/TMM.2008.917355

W. Jiangtao, K. Hyungjin, and J. Villasenor, Binary arithmetic coding with key-based interval splitting, IEEE Signal Processing Letters, vol.13, issue.2, pp.69-72, 2006.
DOI : 10.1109/LSP.2005.861589

C. Li, X. Zhou, and Y. Zong, NAL Level Encryption for Scalable Video Coding, Lecture notes in Computer Science, vol.6072, issue.5, pp.496-505, 2008.
DOI : 10.1007/s11042-007-0150-7

S. Lian, Z. Liu, Z. Ren, Z. S. Wang, Z. Lian et al., Selective Video Encryption Based on Advanced Video Coding Lecture notes Commutative Encryption and Watermarking in Video Compression, IEEE Transactions on Circuits and Systems for Video Technology, pp.774-778, 2007.

E. Lin, A. Eskicioglu, R. Lagendijk, and E. Delp, Advances in Digital Video Content Protection, Proc. of the IEEE, pp.171-183, 2005.
DOI : 10.1109/JPROC.2004.839623

T. Lookabaugh and D. Sicker, Selective encryption for consumer applications, IEEE Communications Magazine, vol.42, issue.5, pp.124-129, 2004.
DOI : 10.1109/MCOM.2004.1299355

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.6914

R. Lukac and K. Plataniotis, Bit-level based secret sharing for image encryption, Pattern Recognition, vol.38, issue.5, pp.767-772, 2005.
DOI : 10.1016/j.patcog.2004.11.010

D. Marpe, H. Schwarz, and T. Wiegand, Context-based adaptive binary arithmetic coding in the H.264/AVC video compression standard, IEEE Transactions on Circuits and Systems for Video Technology, pp.620-636, 2003.
DOI : 10.1109/TCSVT.2003.815173

K. Martin, R. Lukac, and K. Plataniotis, Efficient encryption of wavelet-based coded color images, Pattern Recognition, vol.38, issue.7, pp.1111-1115, 2005.
DOI : 10.1016/j.patcog.2005.01.002

I. Moccagatta and K. Ratakonda, A Performance Comparison of CABAC and VCL-Based Entropy Coders for SD and HD Sequences, Joint Video Team (JVT), Doc. JVT-E079r2, 2002.

S. Ou, H. Chung, and W. Sung, Improving the compression and encryption of images using FPGA-based cryptosystems, Multimedia Tools and Applications, pp.5-22, 2006.
DOI : 10.1007/s11042-006-5117-6

W. Puech and J. Rodrigues, A New Crypto-Watermarking Method for Medical Images Safe Transfer, Proc. 12 th European Signal Processing Conference, 2004.
URL : https://hal.archives-ouvertes.fr/lirmm-00108801

J. Rodrigues, W. Puech, and A. Bors, A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher, Proc. European Conference on Colour in Graphics, Imaging and Vision (CGIV'06), pp.34-39, 2006.
URL : https://hal.archives-ouvertes.fr/lirmm-00122734

A. Said, Measuring the Strength of Partial Encryption Scheme, Proc. IEEE Int. Conf. on Image Processing, pp.1126-1129, 2005.

B. Schneier, Applied cryptography, 1995.

Z. Shahid, M. Chaumont, and W. Puech, Fast Protection of H.264/AVC by Selective Encryption Fast Protection of H.264/AVC by Selective Encryption of CABAC for I & P frames, SinFra 2009, Singaporean-French IPAL Symposium Proc. 17 th European Signal Processing Conference (EUSIPCO'09), pp.2201-2205, 2009.
URL : https://hal.archives-ouvertes.fr/lirmm-00416013

D. R. Stinson, Cryptography: Theory and Practice, (Discrete Mathematics and Its Applications), 2005.

L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, Proceedings of the fourth ACM international conference on Multimedia , MULTIMEDIA '96, pp.219-229, 1996.
DOI : 10.1145/244130.244209

Z. Wang, A. Bovik, H. Sheikh, and E. Simoncelli, Image Quality Assessment: From Error Visibility to Structural Similarity, IEEE Transactions on Image Processing, vol.13, issue.4, pp.600-612, 2004.
DOI : 10.1109/TIP.2003.819861

J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin, A Format-Compliant Configurable Encryption Framework for Access Control of Video, IEEE Transactions on Circuits and Systems for Video Technology, pp.545-557, 2002.

T. Wiegand, G. J. Sullivan, G. Bjontegaard, and A. Luthra, Overview of the h, AVC video coding standard IEEE Transactions on Circuits and Systems for Video Technology, pp.560-576, 2003.

C. Wu and C. Kuo, Design of Integrated Multimedia Compression and Encryption Systems, IEEE Transactions on Multimedia, vol.7, pp.828-839, 2005.

K. Yabuta, H. Kitazawa, and T. Tanaka, A New Concept of Security Camera Monitoring with Privacy Protection by Masking Moving Objects, Proc. Advances in Multimedia Information Processing, pp.831-842, 2005.
DOI : 10.1007/11581772_73

W. Zeng and S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia, vol.5, issue.1, pp.118-129, 2003.
DOI : 10.1109/TMM.2003.808817

S. Ziauddin, I. U. Haq, and M. A. Khan, Method and System for Fast Context based Adaptive Binary Arithmetic Coding, 2007.

A. M. Alattar, E. T. Lin, and M. U. Celik, Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.8, pp.787-800, 2003.
DOI : 10.1109/TCSVT.2003.815958

R. Chandramouli and N. Memon, Analysis of LSB based image steganography techniques, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205), pp.1019-1022, 2001.
DOI : 10.1109/ICIP.2001.958299

C. Chen, J. Ni, and J. Huang, Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping, IWDW '09: Proceedings of the 8th International Workshop on Digital Watermarking, pp.81-95, 2009.
DOI : 10.1109/TMM.2007.906580

Y. Chung, P. Wang, X. Chen, C. Bae, A. Otoom et al., A Performance Comparison of High Capacity Digital Watermarking Systems, In: KES, vol.1, pp.1193-1198, 2005.
DOI : 10.1007/11552413_170

I. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, issue.12, pp.1673-1687, 1997.
DOI : 10.1109/83.650120

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9444

R. D. Cox, C. J. Henri, and P. M. Bret, CD-based image archival and management on a hybrid radiology intranet. Can, J. Med. Radiat. Technol, vol.28, issue.3, 1997.

Y. Dai, L. Zhang, and Y. Yang, A new method of MPEG video watermarking technology, Proceedings of International Conference on Communication Technology, pp.1845-1847, 2003.

F. Deguillaume, G. Csurka, J. O-'ruanaidh, and T. Pun, Robust 3D DFT video watermarking, SPIE, vol.3657, pp.113-124, 1999.

M. Ejima and A. Miyazaki, A wavelet-based watermarking for digital images and video, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), pp.678-681, 2000.
DOI : 10.1109/ICIP.2000.899545

X. Gong and H. Lu, Towards Fast and Robust Watermarking Scheme for H.264 Video, 2008 Tenth IEEE International Symposium on Multimedia, pp.649-653, 2008.
DOI : 10.1109/ISM.2008.16

H. Draft and I. , Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264 ISO/IEC 14496-10 AVC), Doc. JVT-G050, 2003.

F. Hartung and B. Girod, Watermarking of uncompressed and compressed video, Signal Processing, vol.66, issue.3, pp.283-333, 1998.
DOI : 10.1016/S0165-1684(98)00011-5

D. He, Q. Sun, and Q. Tian, A semi-fragile object based video authentication system, Proceedings of International Symposium on Circuits and Systems, pp.814-817, 2003.

X. Kang, J. Huang, Y. Shi, and Y. Lin, A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.8, pp.776-786, 2003.
DOI : 10.1109/TCSVT.2003.815957

S. Kapotas, E. Varsaki, and A. Skodras, Data Hiding in H. 264 Encoded Video Sequences, 2007 IEEE 9th Workshop on Multimedia Signal Processing, 2007.
DOI : 10.1109/MMSP.2007.4412894

S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, 2000.

S. Kim, S. Kim, Y. Hong, and C. Won, Data Hiding on H.264/AVC Compressed Video, Image Analysis and Recognition Lecture Notes in Computer Science, pp.698-707, 2007.
DOI : 10.1007/978-3-540-74260-9_62

G. Langelaar and R. Lagendijk, Optimal differential energy watermarking of DCT encoded images and video, IEEE Transactions on Image Processing, vol.10, issue.1, pp.148-158, 2001.
DOI : 10.1109/83.892451

P. Lee and M. Chen, Robust error concealment algorithm for video decoder, IEEE Trans. Consumer Electron, vol.45, issue.3, pp.851-859, 1999.

J. Li, H. Liu, J. Huang, and Y. Zhang, A Robust Watermarking Scheme for H.264, Digital Watermarking, pp.1-15, 2009.
DOI : 10.1109/79.733497

K. Li and X. Zhang, Reliable adaptive watermarking scheme integrated with JPEG2000, Proceedings of 3rd International Symposium on Image and Signal Processing and Analysis, 2003.

Q. Li and I. Cox, Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.127-139, 2007.
DOI : 10.1109/TIFS.2007.897266

C. Lu, J. Chen, and K. Fan, Real-time frame-dependent video watermarking in VLC domain. Signal Process, Image Commun, vol.20, issue.7, pp.624-642, 2005.

H. Malvar, A. Hallapuro, M. Karczewicz, and L. Kerofsky, Low-complexity transform and quantization in H.264/AVC, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.7, pp.598-603, 2003.
DOI : 10.1109/TCSVT.2003.814964

M. Miller, G. Doerr, and I. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

B. Mobasseri and Y. Raikar, Authentication of H.264 streams by direct watermarking of CAVLC blocks, Security, Steganography, and Watermarking of Multimedia Contents IX, 2007.
DOI : 10.1117/12.703369

M. Noorkami and R. Mersereau, Compressed-domain video watermarking for H.264, IEEE International Conference on Image Processing 2005, pp.890-893, 2005.
DOI : 10.1109/ICIP.2005.1530199

M. Noorkami and R. Mersereau, Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase, IEEE Transactions on Information Forensics and Security, vol.3, issue.3, pp.441-455, 2008.
DOI : 10.1109/TIFS.2008.923825

J. Oostveen, T. Kalker, and J. Haitsma, Visual hashing of digital video: applications and techniques, Proceedings of SPIE, Applications of Digital Image Processing XXIV, pp.121-131, 2009.

D. Pröfrock, M. Schlauweg, and E. Müller, A new uncompresseddomain video watermarking approach robust to H.264/AVC compression, Proceedings of IASTED International Conference on Signal Processing, Pattern Recognition, and Applications, pp.99-104, 2006.

G. Qiu, P. Marziliano, A. T. Ho, D. He, and Q. Sun, A hybrid watermarking scheme for h, Pattern Recognition, International Conference on 4, pp.865-869, 2004.

M. Ramkumar and A. Akansu, Robust protocols for proving ownership of images, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), pp.22-27, 2000.
DOI : 10.1109/ITCC.2000.844178

Q. Wang, D. Zhao, S. Ma, Y. Lu, Q. Huang et al., Contextbased 2D-VLC for video coding, Proceedings of IEEE International Conference on Multimedia and Expo, pp.89-92, 2004.

A. Watson, DCT quantization matrices visually optimized for individual images, Proceedings of SPIE Society of Photo-Optical Instrumentation Engineers, pp.202-216, 1993.

T. Wiegand, G. Sullivan, G. Bjntegaard, and A. Luthra, Overview of the H.264/AVC video coding standard, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.7, pp.560-576, 2003.
DOI : 10.1109/TCSVT.2003.815165

C. Wu, Y. Zheng, W. Ip, C. Chan, K. Yung et al., A fexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based Dither modulation, AEU Int. J. Electron. Commun, 2010.

G. Wu, Y. Wang, and W. Hsu, Robust watermark embedding/detection algorithm for H.264 video, J. Electron. Imaging, vol.14, issue.1, 2005.

F. Xie, T. Furon, and C. Fontaine, On-off keying modulation and tardos fingerprinting, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.101-106, 2008.
DOI : 10.1145/1411328.1411347

URL : https://hal.archives-ouvertes.fr/inria-00504606

D. Zou and J. Bloom, H.264/AVC stream replacement technique for video watermarking, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1749-1752, 2008.
DOI : 10.1109/ICASSP.2008.4517968

URL : https://hal.archives-ouvertes.fr/pasteur-00823211

B. Chen and G. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on Information Theory, vol.47, issue.4, pp.1423-1443, 2001.
DOI : 10.1109/18.923725

J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.1003-1019, 2003.
DOI : 10.1109/TSP.2003.809366

M. Miller, G. Doerr, and I. Cox, Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark, IEEE Transactions on Image Processing, vol.13, issue.6, pp.792-807, 2004.
DOI : 10.1109/TIP.2003.821551

D. Taubman and M. Marcellin, JPEG2000 image compression fundamentals standards and practice. Kluwer Academic, 2002.

I. Wg1, JPEG2000 part II final committee draft version 1, 2000.

M. Costa, Writing on dirty paper (Corresp.), IEEE Transactions on Information Theory, vol.29, issue.3, pp.439-441, 1983.
DOI : 10.1109/TIT.1983.1056659

F. Dufaux, S. Wee, J. Apostolopoulos, and T. Ebrahimi, JPSEC for secure imaging in JPEG2000. SPIE application of digital image processing, Proc. SPIE, pp.319-330, 2004.

Y. Fan and H. Tsao, A dual pyramid watermarking for JPEG-2000, International Journal of High Performance Computing and Networking, vol.5, issue.1/2, pp.84-96, 2007.
DOI : 10.1504/IJHPCN.2007.015767

Y. Fan, A. Chiang, and J. Shen, ROI-based Watermarking Scheme for JPEG 2000, Circuits, Systems & Signal Processing, vol.2, issue.3, pp.763-774, 2008.
DOI : 10.1007/s00034-008-9055-6

K. Li and X. Zhang, Reliable adaptive watermarking scheme integrated with JPEG2000, Proc. ISPA 2003, pp.117-122, 2003.

P. Meerwald, Quantization watermarking in the JPEG2000 coding pipeline. 5th joint working conference on communications and multimedia security, communications and multimedia security issues of the new century, Proc. IFIP TC6/TC11, pp.69-79, 2001.

M. Schlauweg, D. Profrock, and E. Muller, JPEG2000-based secure image authentication, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.62-67, 2006.
DOI : 10.1145/1161366.1161378

A. Ouled-zaid, A. Makhloufi, and C. Olivier, Improved QIM-based watermarking integrated to JPEG2000 coding scheme, Signal, Image and Video Processing, vol.2, issue.1, pp.197-207, 2009.
DOI : 10.1007/s11760-008-0094-z

URL : https://hal.archives-ouvertes.fr/hal-00581067

M. Marcellin and T. Fischer, Trellis coded quantization of memoryless and Gauss-Markov sources, IEEE Transactions on Communications, vol.38, issue.1, pp.82-93, 1990.
DOI : 10.1109/26.46532

G. Forney and . Jr, The viterbi algorithm, Proceedings of the IEEE, vol.61, issue.3, pp.268-278, 1973.
DOI : 10.1109/PROC.1973.9030

S. Braci, R. Boyer, and C. Delpha, Security evaluation of informed watermarking schemes, 2009 16th IEEE International Conference on Image Processing (ICIP), pp.117-120, 2009.
DOI : 10.1109/ICIP.2009.5414122

URL : https://hal.archives-ouvertes.fr/hal-00445555

O. Zaid, A. Makhloufi, A. Bouallegue, and A. , Wavelet domain watermark embedding strategy using TTCQ quantization, Int J Comput Sci Netw Secur (IJCSNS), vol.7, issue.6, pp.165-170, 2007.

G. Le-guelvouit, Trellis-coded quantization for public-key watermarking, speech and signal processing (ICASSP 2005), see the website http, 2005.

J. Chou, S. Pradhan, and K. Ramchandran, On the duality between data hiding and distributed source coding. Annual Asilomar conference on signals systems and computers, Proc. AACSSC 1999, pp.1503-1507, 1999.

E. Esen and A. Alatan, Data hiding using trellis coded quantization, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.59-62, 2004.
DOI : 10.1109/ICIP.2004.1418689

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.2035

X. Wang and X. Zhang, Generalized Trellis Coded Quantization for Data Hiding, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '07, pp.269-272, 2007.
DOI : 10.1109/ICASSP.2007.366224

T. Fischer and M. Wang, Entropy-constrained trellis-coded quantization, IEEE Transactions on Information Theory, vol.38, issue.2, pp.415-426, 1992.
DOI : 10.1109/18.119697

L. Schuchman, Dither Signals and Their Effect on Quantization Noise, IEEE Transactions on Communications, vol.12, issue.4, pp.162-165, 1994.
DOI : 10.1109/TCOM.1964.1088973

L. Pérez-freire and F. Pérez-gonzalez, Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.593-610, 2008.
DOI : 10.1109/TIFS.2008.2002938

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

M. Chaumont and W. Puech, A 8-Bit-Grey-Level Image Embedding its 512 Color Palette, " in [The 16th European Signal Processing Conference, p.5, 2008.

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data-hiding, " in [IBM Syst, J. ], vol.35, issue.3, pp.313-336, 1996.

C. D. Vleeschouwer, J. Delaigle, and B. Macq, Circular interpretation of histogram for reversible watermarking, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.345-350, 2001.
DOI : 10.1109/MMSP.2001.962758

J. Fridrich, M. Goljan, and R. Du, Invertible Authentication, [IS&T/SPIE Annual Symposium on Electronic Imaging, Security Watermarking Multimedia Contents, pp.197-208, 2001.

M. U. Celik, G. Sharma, and A. M. Tekalp, Lossless watermarking for image authentication: a new framework and an implementation, IEEE Transactions on Image Processing, vol.15, issue.4, 2006.
DOI : 10.1109/TIP.2005.863053

J. Tian, Reversible data embedding using a difference expansion, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, issue.8, pp.890-896, 2003.
DOI : 10.1109/TCSVT.2003.815962

A. Van-leest, M. Van-der-veen, and A. Bruekers, Reversible Watermarking for Images, [IS&T/SPIE Annual Symposium on Electronic Imaging, Security Watermarking Multimedia Contents, p.5306, 2004.

Z. Ni, Y. Shi, N. Ansari, and W. Su, Reversible Data Hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, 2006.

D. Coltuc, Improved Capacity Reversible Watermarking, 2007 IEEE International Conference on Image Processing, 2007.
DOI : 10.1109/ICIP.2007.4379293

P. Campisi, D. Kundur, D. Hatzinakos, and A. Neri, Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.2, pp.152-163, 2002.
DOI : 10.1155/S1110865702000550

Y. Zhao, P. Campisi, and D. Kundur, Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images, IEEE Transactions on Image Processing, vol.13, issue.3, pp.430-448, 2004.
DOI : 10.1109/TIP.2003.821552

R. De-queiroz and K. Braun, Color to gray and back: color embedding into textured gray images, IEEE Transactions on Image Processing, vol.15, issue.6, pp.1464-1470, 2006.
DOI : 10.1109/TIP.2006.871181

M. Chaumont and W. Puech, A fast and efficient method to protect color images, Visual Communications and Image Processing 2007, 2007.
DOI : 10.1117/12.702741

URL : https://hal.archives-ouvertes.fr/lirmm-00130160

M. Chaumont and W. Puech, A Grey-Level Image Embedding its Color Palette, 2007 IEEE International Conference on Image Processing, 2007.
DOI : 10.1109/ICIP.2007.4378973

URL : https://hal.archives-ouvertes.fr/lirmm-00198526

J. Shi and J. Malik, Normalized Cuts and Image Segmentation, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, issue.8, pp.888-905, 2000.

L. Laboratory and U. Cnrs, University of Montpellier II 161

F. Dornaika and J. Ahlberg, Fast and Reliable Active Appearance Model Search for 3-D Face Tracking, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.34, issue.4, pp.1838-1853, 2004.
DOI : 10.1109/TSMCB.2004.829135

T. F. Cootes, G. Edwards, and C. Taylor, Active Appearance Models, IEEE Transactions on Pattern Analysis and Machine Intelligence, pp.681-685, 2001.

M. L. Cascia, S. Sclaroff, and V. Athitsos, Fast, reliable head tracking under varying illumination: an approach based on registration of texture-mapped 3D models, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, issue.4, pp.322-336, 2000.
DOI : 10.1109/34.845375

L. Vacchetti, V. Lepetit, and P. Fua, Stable real-time 3D tracking using online and offline information, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.26, issue.10, pp.1385-1391, 2004.
DOI : 10.1109/TPAMI.2004.92

F. Dornaika and F. Davoine, Simultaneous facial action tracking and expression recognition using a particle filter, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1, pp.1838-1853, 2005.
DOI : 10.1109/ICCV.2005.225

URL : https://hal.archives-ouvertes.fr/hal-00019035

M. Chaumont and B. Beaumesnil, Robust and real-time 3D-face model extraction, IEEE International Conference on Image Processing 2005, pp.461-464, 2005.
DOI : 10.1109/ICIP.2005.1530428

URL : https://hal.archives-ouvertes.fr/lirmm-00106488

J. Ahlberg, CANDIDE-3 -Un Updated Parameterised Face, 2001.

J. Ahlberg, Real-Time Facial Feature Tracking Using an Active Model With Fast Image Warping, International Workshop on Very Low Bitrate Video, pp.39-43, 2001.

S. Pateux, G. Marquant, and D. Chavira-martinez, Object Mosaicking via Meshes and Crack-Lines Technique . Application to Low Bit-Rate Video Coding, Picture Coding Symposium, PCS'2001, 2001.

M. Yang, D. Kriegman, and N. Ahuja, Detecting Faces in Images: A Survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, pp.34-58, 2002.

R. Lienhart and J. Maydt, An extended set of Haar-like features for rapid object detection, Proceedings. International Conference on Image Processing, pp.900-903, 2002.
DOI : 10.1109/ICIP.2002.1038171

I. M. Scott, T. F. Cootes, and C. Taylor, Improving Appearance Model Matching Using Local Image Structure, Information Processing in Medical Imaging, IPMI'2003, pp.258-269, 2003.
DOI : 10.1007/978-3-540-45087-0_22