J. Baudry, B. Delaigle, B. Sankur, H. Macq, and . Maitre, Analyses of error correction strategies for typical communication channels in watermarking, Signal Processing

Z. Zinger, H. Jin, B. Maitre, and . Sankur, Optimization of watermarking performances using error correcting codes and repetition, Communications and Multimedia Security Issues of the New Century

W. Abdul, P. Carré, and P. Gaborit, Error correcting codes for robust color wavelet watermarking, EURASIP Journal on Information Security

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography

U. Kohl, J. Lotspiech, and M. A. Kaplan, Safeguarding digital library contents and users, D-lib Magazine

J. Meng and S. Chang, Embedding visible video watermarks in the compressed domain, Image Processing,. ICIP. Proceedings. International Conference on

F. Cayre, P. Rondao-alface, F. Schmitt, B. Macq, and H. Ma?tre, Application of spectral decomposition to compression and watermarking of d triangle mesh geometry, Signal Processing : Image Communication

F. Cayre, O. Devillers, F. Schmitt, and H. Maître, Watermarking D triangle meshes for authentication and integrity, vol.INRIA
URL : https://hal.archives-ouvertes.fr/inria-00071257

P. R. Alface, B. Macq, and F. Cayre, Blind and robust watermarking of d models : How to withstand the cropping attack ?, Image Processing,. ICIP. IEEE International Conference on
URL : https://hal.archives-ouvertes.fr/hal-00158056

W. Yuan, H. Li, L. Li, X. Feng, J. Lu et al., A watermarking mechanism with high capacity for d mesh objects using integer planning, IEEE MultiMedia

J. P. Stern, G. Hachez, F. Koeune, and J. Quisquater, Robust object watermarking : Application to code, International Workshop on Information Hiding

A. B. Kahng, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker et al., Robust ip watermarking methodologies for physical design, Proceedings of the th annual Design Automation Conference

M. L. Miller, I. J. Cox, J. M. Linnartz, and T. Kalker, A review of watermarking principles and practices

R. Liu and T. Tan, An svd-based watermarking scheme for protecting rightful ownership, IEEE transactions on multimedia

Z. Chen, L. Li, H. Peng, Y. Liu, and Y. X. Yang, A novel digital watermarking based on general non-negative matrix factorization, IEEE Transactions on Multimedia

H. Lu, R. Shen, and F. Chung, Fragile watermarking scheme for image authentication, Electronics Letters

C. K. Ho and C. Li, Semi-fragile watermarking scheme for authentication of jpeg images, Information Technology : Coding and Computing,. Proceedings. ITCC. International Conference on

K. Maeno, Q. Sun, S. Chang, and M. Suto, New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Transactions on Multimedia

G. Depovere, T. Kalker, J. Haitsma, M. Maes, L. De et al., The viva project : digital watermarking for broadcast monitoring, Image Processing,. ICIP. Proceedings. International Conference on

A. Khan, A. Siddiqa, S. Munib, and S. A. Malik, A recent survey of reversible watermarking techniques, Information Sciences

M. M. Yeung and F. Mintzer, An invisible watermarking technique for image verification, Image Processing,. Proceedings., International Conference on

R. B. Wolfgang and E. J. Delp, Fragile watermarking using the vwwd watermark, Security and Watermarking of Multimedia Contents

A. Shehab, M. Elhoseny, K. Muhammad, A. K. Sangaiah, P. Yang et al., Secure and robust fragile watermarking scheme for medical images, IEEE Access

S. Bravo-solorio, F. Calderon, C. Li, and A. K. Nandi, Fast fragile watermark embedding and iterative mechanism with high self-restoration performance, Digital Signal Processing

M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Lossless generalized-lsb data embedding, IEEE transactions on image processing
DOI : 10.1109/tip.2004.840686

J. Fridrich, M. Goljan, and R. Du, Invertible authentication, Security and Watermarking of Multimedia contents III
DOI : 10.1117/12.435400

A. M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform, IEEE transactions on image processing

H. Heijmans and L. Kamstra, Reversible data embedding based on the haar wavelet decomposition, Proceeding of VIIth Digital Image Computing : Techniques and Applications

J. Stach and A. M. Alattar, A high-capacity invertible data-hiding algorithm using a generalized reversible integer transform, Security, Steganography, and Watermarking of Multimedia Contents VI
DOI : 10.1117/12.527173

Z. Ni, Y. Shi, N. Ansari, and W. Su, Reversible data hiding, IEEE Transactions on circuits and systems for video technology

M. Van-der-veen, F. Bruekers, A. Van-leest, and S. Cavin, High capacity reversible watermarking for audio, Security and Watermarking of Multimedia Contents V

B. Chen and G. W. Wornell, Quantization index modulation : A class of provably good methods for digital watermarking and information embedding, IEEE TRANS. ON INFORMATION THEORY
DOI : 10.1109/isit.2000.866336

R. Pickholtz, D. Schilling, and L. Milstein, Theory of spread-spectrum communicationsa tutorial, IEEE transactions on Communications
DOI : 10.1109/tcom.1982.1095533

URL : http://pdos.csail.mit.edu/decouto/papers/pickholtz82.pdf

I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE transactions on image processing
DOI : 10.1109/83.650120

F. Pérez-gonzález, C. Mosquera, M. Barni, and A. Abrardo, Rational dither modulation : A high-rate data-hiding method invariant to gain attacks, IEEE transactions on signal processing

. Bibliographie,

R. Zamir and M. Feder, On lattice quantization noise, Data Compression Conference
DOI : 10.1109/dcc.1994.305946

G. W. Brian-chen, Dither modulation : a new approach to digital watermarking and information embedding

P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE
DOI : 10.1109/jproc.2005.859599

J. J. Eggers, J. Su, and B. Girod, A blind watermarking scheme based on structured codebooks
DOI : 10.1049/ic:20000215

P. Bas, N. Le-bihan, and J. Chassery, Color image watermarking using quaternion fourier transform, Acoustics, Speech, and Signal Processing
DOI : 10.1109/icassp.2003.1199526

URL : https://hal.archives-ouvertes.fr/hal-00166554

, IEEE International Conference on, p.III

S. Wang and Y. Lin, Wavelet tree quantization for copyright protection watermarking, IEEE transactions on image processing
DOI : 10.1109/tip.2004.823822

J. C. Oostveen, T. Kalker, and M. Staring, Adaptive quantization watermarking, Security, Steganography, and Watermarking of Multimedia Contents VI
DOI : 10.1117/12.526586

Q. Li and I. J. Cox, Improved spread transform dither modulation using a perceptual model : robustness to amplitude scaling and jpeg compression, Acoustics, Speech and Signal Processing, p.II

A. B. Watson, Dct quantization matrices visually optimized for individual images, proc. SPIE

R. Hu, F. Chen, and H. Yu, Incorporating watson's perceptual model into patchwork watermarking for digital images, IEEE International Conference on Image Processing

I. J. Cox, G. Doërr, and T. Furon, Watermarking is not cryptography
URL : https://hal.archives-ouvertes.fr/inria-00504528

M. Barni, F. Bartolini, and T. Furon, A general framework for robust watermarking security, Signal Processing
URL : https://hal.archives-ouvertes.fr/inria-00080835

T. Kalker, Considerations on watermarking security, Multimedia Signal Processing

P. Bas and J. Hurri, Security of dm quantization watermarking schemes : a practical study for digital images, International Workshop on Digital Watermarking

L. Pérez-freire, P. Comesana, J. R. Troncoso-pastoriza, and F. Pérez-gonzález, Watermarking security : a survey, Transactions on Data Hiding and Multimedia Security I

P. Bas and F. Cayre, Achieving subspace or key security for woa using natural or circular watermarking, Proceedings of the th workshop on Multimedia and security
URL : https://hal.archives-ouvertes.fr/hal-00166575

P. Bas and G. Doërr, Practical security analysis of dirty paper trellis watermarking, International Workshop on Information Hiding
URL : https://hal.archives-ouvertes.fr/hal-00166690

P. Bas and T. Furon, A new measure of watermarking security : the effective key length, IEEE Transactions on Information Forensics and Security
URL : https://hal.archives-ouvertes.fr/hal-00836404

P. Bas, T. Furon, F. Cayre, G. Doërr, and B. Mathon, Watermarking Security : Fundamentals, Secure Designs and Attacks

M. Kesal, M. K. Mihcak, R. Koetter, and P. Moulin, Iteratively decodable codes for watermarking applications, Proc. nd Int. Symp. on Turbo Codes and Related Topics

F. R. Kschischang, B. J. Frey, and H. A. Loeliger, Factor graphs and the sum-product algorithm, IEEE Transactions on Information Theory

O. Al-askary, Iterative decoding of product codes. PhD thesis, Signaler, sensorer och system

J. Darbon, B. Sankur, and H. Maitre, Error correcting code performance for watermark protection, Security and Watermarking of Multimedia Contents III

F. J. Macwilliams and N. J. Sloane, The theory of error-correcting codes

C. Hsieh and Y. Wu, Digital image multiresolution watermark based on human visual system using error correcting code

P. W. Chan, M. R. Lyu, and R. T. Chin, A novel scheme for hybrid digital video watermarking : approach, evaluation and experimentation, IEEE Transactions on Circuits and Systems for Video Technology

P. Chan and M. R. Lyu, A dwt-based digital video watermarking scheme with error correcting code, International Conference on Information and Communications Security

S. Liu and S. D. Lin, Bch code-based robust audio watermarking in the cepstrum domain, Journal of Information Science and Engineering

F. Zhang, X. Zhang, and Z. Chen, Digital image authentication based on errorcorrection codes, International Conference on Computational and Information Science

C. Chan and C. Chang, An efficient image authentication method based on hamming code, Pattern Recognition

H. G. Schaathun, On error-correcting fingerprinting codes for use with watermarking, Multimedia Systems

A. Viterbi, Error bounds for convolutional codes and an asymptotically optimum decoding algorithm, IEEE Transactions on Information Theory

J. R. Hernandez, J. Delaigle, and B. M. Macq, Improving data hiding by using convolutional codes and soft-decision decoding, Security and Watermarking of Multimedia Contents II

R. Lancini, F. Mapelli, and S. Tubaro, A robust video watermarking technique in the spatial domain, International Symposium on VIPromCom Video/Image Processing and Multimedia Communications

C. Berrou, A. Glavieux, and P. Thitimajshima, Near shannon limit error-correcting coding and decoding : Turbo-codes. ," in Communications, Conference Record, IEEE International Conference on

F. Baldo, F. P. González, and S. Scalise, Turbo coding for sample-level watermarking in the dct domain, ICIP, p.pp

C. Rey, K. Amis, J. Dugelay, R. Pyndiah, and A. Picart, Enhanced robustness in image watermarking using turbo codes, Security and Watermarking of Multimedia Contents V
URL : https://hal.archives-ouvertes.fr/hal-02129093

J. Dugelay, S. Roche, C. Rey, and G. Doërr, Still-image watermarking robust to local geometric distortions, IEEE transactions on image processing

C. Chemak, J. C. Lapayre, and M. S. Bouhlel, A new scheme of image watermarking based on // wavelet decomposition and turbo-code, WSEAS Transactions on Biology and Biomedicine

G. Doërr, C. Rey, and J. Dugelay, Watermark resynchronization based on elastic graph matching, Proc. Int. Conf. Sciences of Electronic, Technologies of Information and Telecommunications

J. J. Eggers, J. K. Su, and B. Girod, Robustness of a blind image watermarking scheme, Proceedings. International Conference on

S. Burgett, E. Koch, and J. Zhao, Copyright labeling of digitized image data, IEEE Communications Magazine

J. Dugelay and C. Rey, Method of marking a multimedia document having improved robustness, Pending Patent EP

N. Cvejic, D. Tujkovic, and T. Seppanen, Increasing robustness of an audio watermark using turbo codes, Proceedings. International Conference on, p.I

M. Lades, J. C. Vorbruggen, J. Buhmann, J. Lange, C. Von-der-malsburg et al., Distortion invariant object recognition in the dynamic link architecture, IEEE Transactions on computers

A. Maeeni, F. Kalbat, and H. Al-ahmad, Logo embedding in grayscale images using turbo product codes, Information and Communication Technology Research (ICTRC), International Conference on

R. C. Bose and D. K. Ray-chaudhuri, On a class of error correcting binary group codes, Information and control

I. S. Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the society for industrial and applied mathematics

R. W. Hamming, Error detecting and error correcting codes, Bell Labs Technical Journal

D. V. Sarwate and N. R. Shanbhag, High-speed architectures for reed-solomon decoders, IEEE Transactions on Very Large Scale Integration (VLSI) Systems

J. S. Plank and Y. Ding, Note : Correction to the tutorial on reed-solomon coding, Software : Practice and Experience

H. Chang and C. Shung, A reed-solomon product-code (rs-pc) decoder for dvd applications, Solid-State Circuits Conference

H. Chang, C. B. Shung, and C. Lee, A reed-solomon product-code (rs-pc) decoder chip for dvd applications, IEEE Journal of Solid-State Circuits

. Bibliographie,

D. Silva and F. R. Kschischang, On metrics for error correction in network coding, IEEE Transactions on Information Theory

M. Gabidulin, A. Paramonov, and O. Tretjakov, Ideals over a non-commutative ring and their application in cryptology, Workshop on the Theory and Application of Cryptographic Techniques

P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor, New results for rank-based cryptography, International Conference on Cryptology in Africa
URL : https://hal.archives-ouvertes.fr/hal-01261421

P. Delsarte, Bilinear forms over a finite field, with applications to coding theory, Journal of Combinatorial Theory, Series A

M. Gabidulin, Theory of codes with maximum rank distance, Problemy Peredachi Informatsii

M. Gabidulin, A fast matrix decoding algorithm for rank-error-correcting codes

P. Loidreau and . Welch, Berlekamp Like Algorithm for Decoding Gabidulin Codes
URL : https://hal.archives-ouvertes.fr/hal-00459611

F. Hartung and M. Kutter, Multimedia watermarking techniques, Proceedings of the IEEE

M. D. Swanson, B. Zhu, and A. H. Tewfik, Transparent robust image watermarking, Image Processing,. Proceedings., International Conference on

M. D. Swanson, B. Zhu, and A. H. Tewfik, Robust data hiding for images, Digital Signal Processing Workshop Proceedings

M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on image processing

N. D. Jessica-fridrich and M. Goljan, Further attacks on yeung-mintzer fragile watermarking scheme

B. Fridrich and M. Goljan, Protection of digital images using self embedding

A. Aggarwal and M. Singla, Robust watermarking of color images under noise and cropping attacks in spatial domain, image

K. A. Khalid, M. M. Deris, and K. M. Mohamad, Anti-cropping digital image watermarking using sudoku, International Journal of Grid and Utility Computing

S. Saneie and A. Naghsh, Introducing a new method of robust digital image watermarking against cropping and salt & pepper noise using sudoku, Majlesi Journal of Multimedia Processing

M. S. Goli and A. Naghsh, Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku, Pattern Recognition and Image Analysis (IPRIA), rd International Conference on

B. Felgenhauer and F. Jarvis, Mathematics of sudoku i, Mathematical Spectrum

E. Russell and F. Jarvis, Mathematics of sudoku ii, Mathematical Spectrum

M. Kutter, Watermarking resistance to translation, rotation, and scaling, International Society for Optics and Photonics

P. Bas, J. Chassery, and B. Macq, Geometrically invariant watermarking using feature points, IEEE transactions on image Processing
URL : https://hal.archives-ouvertes.fr/hal-00166590

M. Kutter, F. D. Jordan, and F. Bossen, Digital signature of color images using amplitude modulation

P. Yu, H. Tsai, and J. Lin, Digital watermarking based on neural networks for color images, Special section on Digital Signal Processing for Multimedia

G. Voyatzis and I. Pitas, Digital image watermarking using mixing systems, Computer & Graphics

H. Kim, H. Lee, H. Lee, and Y. Ha, Digital watermarking based on color differences

A. Abadpour and S. Kasaei, Color pca eigenimages and their application to compression and watermarking, Image and Vision Computing

G. Chareyron, B. Macq, and A. Tremeau, Watermarking of color images based on segmentation of the xyz color space, Conference on Colour in Graphics, Imaging, and Vision

D. Coltuc and P. Bolon, Robust watermarking by histogram specification, Image Processing,. ICIP. Proceedings. International Conference on

. Bibliographie,

G. Chareyron and A. Trémeau, Color images watermarking based on minimization of color differences, Int. Workshop on Multimedia Content, Representation, Classification and Security
URL : https://hal.archives-ouvertes.fr/hal-00375701

C. R. Rao and M. V. Prasad, Color Image Watermarking Techniques Based on Magic Square and Ridgelets

J. Li, Q. Lin, C. Yu, X. Ren, and P. Li, A qdct-and svd-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram

A. Parisis, P. Carre, C. Fernandez-maloigne, and N. Laurent, Color image watermarking with adaptive strength of insertion, Acoustics, Speech, and Signal Processing, p.iii

D. Alleysson and D. Méary, Neurogeometry of color vision, J Physiol Paris
URL : https://hal.archives-ouvertes.fr/hal-00927594

Q. Li and I. J. Cox, Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking, IEEE Transactions on Information Forensics and Security

J. Petitot, The neurogeometry of pinwheels as a sub-riemannian contact structure, Journal of Physiology-Paris

J. Petitot, Neurogéométrie de la vision : modeles mathematiques et physiques des architectures fonctionnelles, Editions Ecole Polytechnique

J. Koenderink, W. Van-de-grind, and M. Bouman, Models of retinal signal processing at high luminances, Kybernetik

E. Zrenner, A. Stett, and S. Weiss, Can microphotodiode arrays replace degenerated retinal photoreceptors to restore vision, Vision Res

D. Alleysson and J. Hérault, Differential thresholds in colour perception : a consequence of retinal processing and photoreceptor nonlinearities, Perception ECVP abstract

D. Alleysson and J. Hérault, Variability in color discrimination data explained by a generic model with nonlinear and adaptive processing, Color Research and Application, issue.SS, pp.SSSS-SSSS

D. Alleysson, Le traitement du signal chromatique dans la rétine : un mod ?le de base pour la perception humaine des couleurs

D. L. Macadam, Visual sensitivities to color differences in daylight *, J. Opt. Soc. Am

P. Loidreau, Metrique rang et cryptographie
URL : https://hal.archives-ouvertes.fr/tel-00200407

C. Faure, Etudes de systèmes cryptographiques construits à l'aide de codes correcteurs, en métrique de Hamming et en métrique rang

G. Murat, Résultants de polynômes de Ore et Cryptosystèmes de McEliece sur des Codes Rang faiblement structurés

O. Ore, Theory of non-commutative polynomials

O. Ore, On a special class of polynomials, Transactions of the American Mathematical Society

O. Ore, Contributions to the theory of finite fields, Transactions of the American Mathematical Society

D. Silva and F. R. Kschischang, Fast encoding and decoding of gabidulin codes, IEEE International Symposium on

A. Wachter-zeh, V. Afanassiev, and V. Sidorenko, Fast decoding of gabidulin codes, codes and cryptography
URL : https://hal.archives-ouvertes.fr/hal-00785122

W. Stein, The Sage Development Team, Sage Mathematics Software