S. S. Agaian, B. Rodriguez, and J. P. Perez, Stego sensitivity measure and multibit plane based steganography using different color models, Security, Steganography, and Watermarking of Multimedia Contents VIII
DOI : 10.1117/12.643691

B. H. Astrowsky, steganography " hidden images, a new challenge in the fight against child porn, UPDATE, vol.13, issue.2, 2000.

I. Avicibas¸, N. Avicibas¸, B. Memon, and . Sankur, Steganalysis based on image quality metrics, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.523-531, 2001.
DOI : 10.1109/MMSP.2001.962785

M. Backes and C. Cachin, Public-Key Steganography with Active Attacks, Proc. 2nd Theory of Cryptography Conference, pp.210-226, 2005.
DOI : 10.1007/978-3-540-30576-7_12

J. Barbier, Reconstruction des turbo-codes, 2003.

J. Barbier, Reconstruction of turbo-code encoders, Proc. SPIE Security and Defense, Space Communication Technologies Symposium, pp.463-473, 2005.

J. Barbier, La stéganographie moderne : d'Hérodotè a nos jours, Computer & Electronics Security Application Rendez-vous, 2007.

J. Barbier and S. Alt, Practical Insecurity for Effective Steganalysis, Proc. of 10th International Workshop on Information Hiding, 2008.
DOI : 10.1007/11922841_21

J. Barbier and P. E. Caillard, Procédés d'´ emission et de réception de données d ainsi que des données supplémentaires d ? et dispositifs associés, 2006.

J. Barbier and P. E. Caillard, Procédés d'´ emission et de réception d'un message numérique et dispositifs associés, 2006.

J. Barbier, Camion : Reconstruction de permutations, Proc. MAJECS- TIC'03, 2003.

]. J. Barbier, ´. E. Filiol, and K. Mayoura, New features for specific JPEG

]. J. Barbier, ´. E. Filiol, and K. Mayoura, Universal JPEG Steganalysis in the Compressed Frequency Domain, Proc. Digital Watermarking , 5th International Workshop, pp.253-267, 2006.
DOI : 10.1007/11922841_21

]. J. Barbier, ´. E. Filiol, and K. Mayoura, Universal Detection of JPEG Steganography, Journal of Multimedia, vol.2, issue.2, pp.1-9, 2007.
DOI : 10.4304/jmm.2.2.1-9

J. Barbier and K. Mayoura, Steganalysis of Multi Bit Plane Image Steganography, Proc. of Digital Watermarking, 6th International Workshop, 2007.
DOI : 10.1007/3-540-45496-9_21

J. Barbier, G. Sicot, and S. Houcke, Algebraic approach for the reconstruction of linear and convolutional error correcting codes, Proc. 3rd International Conference on Computer Science and Engineering CISE 2006, pp.66-71, 2006.

A. Barg, Handbook of coding theory, Complexity Issues in Coding Theory, vol.1, issue.7, pp.649-754, 1998.

G. Battail, C. Berrou, and A. Glavieux, Pseudo-random recursive convolutional coding for near-capacity performance, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference, pp.23-27, 1993.
DOI : 10.1109/GLOCOM.1993.318422

J. Bay, Attention, une image peut en cacher une autre. Lci, septembre, 2001.

G. Bégin, High-rate punctured convolutional codes: structure properties and construction technique, IEEE Transactions on Communications, vol.37, issue.12, pp.1381-1385, 1989.
DOI : 10.1109/26.44210

G. Bégin, D. Haccoun, and C. Paquin, Further results on high-rate punctured convolutional codes for Viterbi and sequential decoding, IEEE Transactions on Communications, vol.38, issue.11, p.38, 1990.
DOI : 10.1109/26.61470

M. Bellare, A. Desai, and E. Jokipii, Rogaway : A concrete security treatment of symmetric encryption : Analysis of the DES modes of operation, Proc. 38th Symposium on Foundations of Computer Science FOCS, 1997.

S. Benedetto and G. Montorsi, Design of parallel concatened convolutional codes, IEEE Transactions on Communications, COMM, issue.5, pp.44591-600, 1996.

S. Benedetto and G. Montorsi, Unveiling turbo codes: some results on parallel concatenated coding schemes, IEEE Transactions on Information Theory, vol.42, issue.2, pp.42-409, 1996.
DOI : 10.1109/18.485713

E. R. Berlekamp, Algebraic Coding Theory, 1968.
DOI : 10.1142/9407

E. R. Berlekamp, R. J. Mceliece, and H. C. Van-tilborg, On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, p.24, 1978.
DOI : 10.1109/TIT.1978.1055873

C. Berrou, Codes and Turbocodes, 2007.
DOI : 10.1002/9780470612422.ch5

C. Berrou, A. Glavieux, and P. Thitimajshima, Near Shannon limit errorcorrecting coding and decoding : turbo-codes, Proc. of ICC 1993, 1993.
DOI : 10.1109/icc.1993.397441

C. Berrou, C. Langlais, and F. Seguin, New Directions in Statistical Signal Processing -From Systems to Brains., chapitre Turbo Processing, 2006.

P. Bilingsley, Probability and Measure. Probability and mathematical statistics, 1995.

C. W. Brown and B. J. Shepherd, Graphics File Formats, reference and guide. Manning, 1995.

D. Brown, Da Vinci Code, 2004.

D. Brown, Forteresse Digitale. Jean-Claude Lattès, février, 2007.

G. Burel and R. Gautier, Blind estimation of encoder and interleaver characteristics in a non cooperative context, Proc. IASTED International Conference on Communications, Internet and Information Technology, 2003.

C. Cachin, An information-theoretic model for steganography, Proc. Information Hiding, 2nd International Workshop, volume 1525 de Lecture Notes in Computer Science, pp.306-318, 1998.

C. Cachin, An information-theoretic model for steganography. Information and Computation, pp.41-56, 2004.

C. Cachin, Digital steganography ´ editeur : Encyclopedia of Cryptography and Security, 2005.

J. B. Cain, G. C. Clark, and J. M. Geist, Puntured convolutional codes of rate n?1 n and simplified maximum likehood decoding, IEEE Transactions on Information Theory, p.25, 1979.

A. Canteaut and F. Chabaud, A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, vol.44, issue.1, pp.44367-378, 1998.
DOI : 10.1109/18.651067

F. Chabaud, Recherche de performance dans l'algorithmique des corps finis. Applicationsàplications`plicationsà la cryptographie, Thèse de doctorat, ´ Ecole Polytechnique, 1996.

R. Chandramouli, Data hiding capacity in the presence of an imperfectly known channel, Proc. SPIE Security and Watermarking of Multimedia Contents II, 2001.

R. Chandramouli, Mathematical theory for steganalysis, Proc. SPIE Security and Watermarking of Multimedia Contents IV, 2002.

R. Chandramouli, M. Kharrazi, N. D. Memon, T. Kalker, I. J. Cox et al., Image Steganography and Steganalysis: Concepts and Practice, Proc. Digital Watermarking, Second International Workshop, IWDW 2003, pp.35-49, 2003.
DOI : 10.1007/978-3-540-24624-4_3

R. Chandramouli and N. D. Memon, Steganography capacity : A steganalysis perspective, Proc. SPIE, Security and Watermarking of Multimedia Contents V, pp.173-177, 2003.

M. Chapman, Hiding the hidden: A software system for concealing ciphertext as innocuous text, Thèse de doctorat, 1997.
DOI : 10.1007/BFb0028489

M. Cluzeau, Block code reconstruction using iterative decoding techniques, 2006 IEEE International Symposium on Information Theory, 2006.
DOI : 10.1109/ISIT.2006.261971

M. Cluzeau, Reconnaissance d'un code linéaire en bloc en utilisant un algorithme de décodage itératif, Journées Codage et Cryptographie, 2006.

M. Cluzeau, Reconnaissance d'un schéma de codage, Thèse de doctorat, ´ Ecole Polytechnique, 2006.

J. Clément, Arbres Digitaux et Sources Dynamiques, Thèse de doctorat, 2000.

J. Clément and P. Flajolet, Vallée : Dynamical sources in information theory : a general analysis of trie structures, 1999.

D. Coppersmith, Solving linear equations over GF(2): block Lanczos algorithm, Linear Algebra and its Applications, vol.192, pp.33-60, 1993.
DOI : 10.1016/0024-3795(93)90235-G

URL : http://doi.org/10.1016/0024-3795(93)90235-g

D. Coppersmith, Solving Homogeneous Linear Equations Over GF(2) via Block Wiedemann Algorithm, Mathematics of Computation, vol.62, issue.205, pp.333-350, 1994.
DOI : 10.2307/2153413

N. G. De-bruijn, Asymptotic Methods in Analysis, 1981.

N. Dedi´cdedi´c, G. Itkis, L. Reyzin, and S. , Upper and lower bounds on blackbox steganography, Proc. 2nd Theory of Cryptography Conference (TCC 2005), volume 3378 de Lecture Notes in Computer Science, 2005.

S. Dumitrescu, X. Wu, and Z. Wang, Detection of LSB steganography via sample pair analysis, Proc. Information Hiding, 5th International Workshop, volume 2578 de Lecture Notes in Computer Science, pp.355-372, 2002.

E. Cenelec, ETSI Joint Technical Committee Broadcast : Framing structure channel coding and modulation for terrestrial services. Specifications, pp.300-744

E. Cenelec, ETSI Joint Technical Committee Broadcast : Interaction channel for DVB-S RCS. Specifications, pp.300-958

E. Cenelec, ETSI Joint Technical Committee Broadcast : Interaction channel for DVB-T RCT. Specifications, pp.300-958

E. Cenelec, ETSI Joint Technical Committee Broadcast : Framing structure channel coding and modulation for satellites services. Specifications, pp.300-421, 1999.

P. Elias, Coding for noisy channels, IRE International Convention Record, pp.37-46, 1955.

H. Farid, Detecting hidden messages using higher-order statistical models, Proceedings. International Conference on Image Processing, pp.905-908, 2002.
DOI : 10.1109/ICIP.2002.1040098

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.8871

P. Flajolet, X. Gourdon, and P. Dumas, Mellin transforms and asymptotics: Harmonic sums, Theoretical Computer Science, vol.144, issue.1-2, pp.3-58, 1995.
DOI : 10.1016/0304-3975(95)00002-E

URL : https://hal.archives-ouvertes.fr/inria-00074307

C. Fontaine, ContributionàContribution`Contributionà la recherche de fonctions booléennes hautement non linéaires, et au marquage d'images en vue de la protection des droits d'auteur, Thèse de doctorat, 1998.

C. Fontaine and F. Galand, How can Reed-Solomon codes improve steganographic schemes, Proc. International Workshop on Information Hiding, IH'07, 2007.
DOI : 10.1007/978-3-540-77370-2_9

URL : https://hal.archives-ouvertes.fr/inria-00504247

J. Fridrich, Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, Lecture Notes in Computer Science, vol.3200, pp.67-81, 2004.
DOI : 10.1007/978-3-540-30114-1_6

J. Fridrich, M. Goljan, and R. Du, Detecting LSB steganography in color, and gray-scale images, IEEE Multimedia, vol.8, issue.4, pp.22-28, 2001.
DOI : 10.1109/93.959097

J. Fridrich, M. Goljan, and R. Du, Reliable detection of LSB steganography in color and grayscale images, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.27-30, 2001.
DOI : 10.1145/1232454.1232466

J. Fridrich, M. Goljan, and D. Hogea, Steganalysis of JPEG Images: Breaking the F5 Algorithm, Proc. Information Hiding, 5th International Workshop, pp.310-323, 2002.
DOI : 10.1007/3-540-36415-3_20

J. Fridrich, M. Goljan, and D. Hogea, New methodology for breaking steganographic techniques for JPEGs, Proc. SPIE, Security and Watermarking of Multimedia Contents V, pp.143-155, 2003.

J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, Writing on wet paper, Special issue " Supplement on Secure Media III, pp.3923-3935, 2005.
DOI : 10.1109/TSP.2005.855393

J. Fridrich and M. Goljan, Efficient Wet Paper Codes, Proc. 7th International Workshop on Information Hiding, pp.204-218, 2005.
DOI : 10.1007/11558859_16

J. Fridrich, M. Goljan, and D. Soukal, Wet Paper Codes With Improved Embedding Efficiency, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, pp.102-110, 2006.
DOI : 10.1109/TIFS.2005.863487

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.5982

J. Fridrich and T. Pevny, Multiclass blind steganalysis for JPEG images, Proc. SPIE, Security and Watermarking of Multimedia Contents VIII, 2006.

J. Fridrich and D. Soukal, Matrix embedding for large payloads, IEEE Transactions on Security and Forensics, vol.1, issue.3, pp.278-294, 2006.

F. Galand and G. Kabatiansky, Information hiding by coverings, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), pp.151-154, 2003.
DOI : 10.1109/ITW.2003.1216717

. G. Jr and . Forney, Convolutional codes I : Algebraic structure, IEEE Transactions on Information Theory, issue.16, pp.720-738, 1970.

. G. Jr and . Forney, Structural analysis of convolutional codes via dual codes, IEEE Transactions on Information Theory, IT, vol.19, pp.512-519, 1973.

. G. Jr and . Forney, The Viterbi algorithm, Proc. IEEE, pp.268-276, 1973.

. G. Jr and . Forney, Minimal bases of rational vector spaces with applications to multivariable linear systems, In SIAM J. Control, vol.13, pp.493-502, 1975.

E. N. Gilbert, Capacity of a Burst-Noise Channel, Bell System Technical Journal, vol.39, issue.5, pp.1253-1265, 1960.
DOI : 10.1002/j.1538-7305.1960.tb03959.x

A. Glavieux, Channel Coding in Communication Networks : From Theory to Turbo Codes. Digital Signal and Image Processing series, 2005.
DOI : 10.1002/9780470612422

I. Gohberg, T. Kailath, and V. Olshevsky, Fast Gaussian elimination with partial pivoting for matrices with displacement structure, Mathematics of Computation, vol.64, issue.212, pp.1557-1576, 1995.
DOI : 10.1090/S0025-5718-1995-1312096-X

I. Goldberg, Operator Theory : Advances and Applications, pp.31-88, 1986.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

J. Hagenauer, Rate compatible punctured convolutional codes and their applications, IEEE Transactions on Communications, p.36, 1988.
DOI : 10.1109/26.2763

J. J. Harmsen and W. A. Pearlman, Kernel Fisher discriminant for steganalysis of JPEG hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VI, 2005.
DOI : 10.1117/12.525996

N. J. Hopper, Toward a Theory of Steganography, 2004.

N. J. Hopper, On Steganographic Chosen Covertext Security, Proc. International Colloquium on Automata Languages and Programming, pp.311-323, 2005.
DOI : 10.1007/11523468_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.3397

N. J. Hopper, J. Langford, and L. Von-ahn, Provably Secure Steganography, Proc. Crypto, pp.77-92, 2002.
DOI : 10.1007/3-540-45708-9_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1450

W. C. Huffman and V. , Pless : Fundamentals of Error-Correcting Codes, 2003.

T. 8psk and R. Outer, Specifications, février 2000, IESS, issue.2, p.310

F. Jelinek, A fast sequential decoding algorithm using a stack. Rapport technique 13, IBM Res. Develop, 1969.

R. Johannesson and K. Sh, Zygangirov : Fundamentals of Convolutional Coding, 1999.

N. F. Johnson, Z. Duric, and S. Jajodia, Information Hinding -Steganography and watermarking -Attacks and countermeasures, Adavances in Information Security. Kluwer Academic. ISBN, pp.0-7923
DOI : 10.1007/978-1-4615-4375-6

N. F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, Computer, vol.31, issue.2, pp.26-34, 1998.
DOI : 10.1109/MC.1998.4655281

D. Kahn, The Codebreakers, 1967.

S. Katzenbeisser and F. A. , Petitcolas : Information Hiding. Techniques for steganography and digital watermarking, Computer Science. Artech House

S. Katzenbeisser and F. A. Petitcolas, Defining security in steganographic systems, Proc. SPIE Security and Watermarking of Multimedia contents IV, pp.50-56, 2002.

J. Kelley, Terror groups hide behind Web encryption, USA Today, 2001.

J. Kelley, Terrorist instructions hidden online, USA Today, 2001.

A. D. Ker, Improved Detection of LSB Steganography in Grayscale Images, Proc. Information Hiding, 6th International Workshop, pp.97-115, 2004.
DOI : 10.1007/978-3-540-30114-1_8

A. D. Ker, The ultimate steganalysis benchmark?, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, pp.141-148, 2007.
DOI : 10.1145/1288869.1288889

G. C. Kessler, Steganography : Implications for the prosecutor and computer forensics examiner. Rapport technique, American Prosecutors Research Institute, 2004.

G. Kipper, Investigator's guide to steganography. Information Security, 2004.

K. J. Larsen, Short convolutional codes with maximal free distance for rates 1 2

A. Lauder and K. Paterson, Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/, IEEE Transactions on Information Theory, vol.49, issue.1, pp.49273-280, 2003.
DOI : 10.1109/TIT.2002.806136

G. S. Lauer, Some optimal partial-unit-memory codes (Corresp.), IEEE Transactions on Information Theory, vol.25, issue.2, pp.240-243, 1979.
DOI : 10.1109/TIT.1979.1056014

J. , S. Lee, and L. E. Miller, CDMA Systems Engineering Handbook. Mobile Communications

P. J. Lee and E. F. Brickell, An Observation on the Security of McEliece???s Public-Key Cryptosystem, Advances in Cryptology -EUROCRYPT'88, pp.275-280, 1988.
DOI : 10.1007/3-540-45961-8_25

J. S. Leon, A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988.
DOI : 10.1109/18.21270

T. V. Levan and K. Kurosawa, Efficient public key steganography secure against adaptative chosen stegotext attacks, Proc.Information Hiding, 8th International Workshop, 2006.

N. Levinson, The Wiener (Root Mean Square) Error Criterion in Filter Design and Prediction, Journal of Mathematics and Physics, vol.25, issue.1-4, pp.261-278, 1947.
DOI : 10.1002/sapm1946251261

R. Lidl, Niederreiter : Finite Fields, 1983.

G. S. Lin, C. H. Yeh, and C. C. Kuo, Data hiding domain classification for blind image steganalysis, Proc. ICME, pp.907-910, 2004.

P. Lu, X. Luo, Q. Tang, and L. Shen, An Improved Sample Pairs Method for Detection of LSB Embedding, Proc. Information Hiding, 6th International Workshop, pp.116-127, 2004.
DOI : 10.1007/978-3-540-30114-1_9

S. Lyu and H. Farid, Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Proc. Information Hiding, 5th International Workshop, pp.340-354, 2002.
DOI : 10.1007/3-540-36415-3_22

S. Lyu and H. Farid, Steganalysis using color wavelet statistics and one-class support vector machines, Security, Steganography, and Watermarking of Multimedia Contents VI, 2004.
DOI : 10.1117/12.526012

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.945

S. Lyu and H. Farid, Steganalysis Using Higher-Order Image Statistics, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, 2006.
DOI : 10.1109/TIFS.2005.863485

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.1418

F. J. Macwilliams and N. J. Sloane, The theory of error-correcting codes, 1977.

J. L. Massey, Threshold decoding, 1963.

J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969.
DOI : 10.1109/TIT.1969.1054260

J. L. Massey and M. K. , Sain : Inverses of linear sequential circuits, IEEE Transactions on Computers, COM, vol.17, pp.330-337, 1968.

K. Mayoura, Analyse stéganographique d'une image JPEG, 2004.

W. Meier, E. Pasalic, and C. Carlet, Algebraic Attacks and Decomposition of Boolean Functions, Proc. Eurocrypt 2004, numéro 3027 de Lecture Notes in Computer Science, pp.474-491, 2004.
DOI : 10.1007/978-3-540-24676-3_28

P. L. Montgomery, A Block Lanczos Algorithm for Finding Dependencies over GF(2), Advances in Cryptology -EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, pp.106-120, 1995.
DOI : 10.1007/3-540-49264-X_9

P. Mühlethaler, 11 et les réseaux sans fils. Editions Eyrolles, pp.802-804, 2002.

B. C. Nguyen, S. M. Yoon, and H. Lee, Multi Bit Plane Image Steganography, Proc. Digital Watermarking, 5th International Workshop, pp.61-70, 2006.
DOI : 10.1007/11922841_6

C. O. Donoghue and C. Burkley, New algorithm to identify rate k n catastrophic punctured convolutional encoders, Proc. of the Workshop in Coding and Cryptography 99, 1999.

J. K. Omura, On the Viterbi decoding algorithm, IEEE Transactions on Information Theory, vol.15, issue.1, pp.177-179, 1969.
DOI : 10.1109/TIT.1969.1054239

E. Paaske, Short binary convolutional codes with maximal free distance for rates 2/3 and 3/4 (Corresp.), IEEE Transactions on Information Theory, vol.20, issue.5, pp.683-688, 1974.
DOI : 10.1109/TIT.1974.1055264

B. Pfitzmann, Information hiding terminology, Proceedings of the Workshop on Information Hiding, numéro 1174, pp.347-350, 1996.

G. Planquette, Identification de trains binaires codés, Thèse de doctorat, 1996.

N. Provos, Defending against statistical steganalysis, 10th USENIX Security Symposium, 2001.

N. Provos and P. Honeyman, Detecting steganographic content on the internet, Proc. ISOC NDSS'02, 2002.

S. Raudys, Statistical and Neural Classifiers : An Integrated Approach to Design Advances in Pattern Recognition, 2001.
DOI : 10.1007/978-1-4471-0359-2

E. Renold, S. J. Creighton, C. Atkinson, and J. Carr, Images of abuse : A review of the evidence on child pornography. Rapport technique, National Society for the Prevention of Cruelty to, Children, 2003.

B. Rice, Determining the parameters of a rate 1 n convolutional encoder over GF(q)

A. Salagean, On the Computation of the Linear Complexity and the<tex>$k$</tex>-Error Linear Complexity of Binary Sequences With Period a Power of Two, IEEE Transactions on Information Theory, vol.51, issue.3, pp.1145-1150, 2005.
DOI : 10.1109/TIT.2004.842769

L. Schiff and A. Chockalingam, Wireless Networks 6, chapitre Design and system operation of Globalstar versus IS-95 CDMA -Similarities and differences, pp.47-57, 2000.

B. Schneier, Description of a new variable-length key, 64-bit block cipher (Blowfish), Proc. Fast Software Encryption, pp.191-204, 1993.
DOI : 10.1007/3-540-58108-1_24

D. Schönefeld and A. Winkler, Embedding with syndrome coding based on BCH codes, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.214-223, 2006.
DOI : 10.1145/1161366.1161405

D. Schönefeld and A. Winkler, Reducing the Complexity of Syndrome Coding for Embedding, Proc. International Workshop on Information Hiding, IH'07, 2007.
DOI : 10.1007/11558859_16

R. Sedgewick and P. Flajolet, IntroductionàIntroduction`Introductionà l'analyse d'algorithme, chapitre Cha??nesCha??nes et arbres digitaux, Thomson publisher, 1996.

C. E. Shannon and W. Weaver, The Mathematical Theory of Communication, 1949.

G. Sicot and S. Houcke, Blind detection of interleaver parameters, Proc. ICASSP 2005, 2005.

G. Sicot and S. Houcke, Etude statistique du seuil dans la détection d'entrelaceur, Proc. GRESTSI 2005, 2005.

G. Sicot and S. Houcke, Theorical study of the performance of a blind interleaver estimator, Proc. ISIVC, 2006.

D. Sieberg, Bin Laden exploits technology to suit his needs. CNN, septembre, 2001.

H. J. Smith, On systems of linear indeterminate equations and congruences, Philos. Trans. Roy. Soc. London, issue.151, pp.293-326

M. Stamp and C. Martin, An algorithm for the k-error linear complexity of binary sequences with period 2/sup n/, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1398-1401, 1993.
DOI : 10.1109/18.243455

J. Stern, G. Cohen, and J. Wolfmann, A method for finding codewords of small weight, Proc. Coding Theory and Applications, numéro 388 de Lecture Notes in Computer Science, pp.106-113, 1989.
DOI : 10.1007/BFb0019850

P. Sun, Similarity of discrete Gilbert-Elliot and Polya channel models to continuous Rayleigh fading channel model, 2002.

G. Technical-specification-group and . Edge, Access Network : Channel coding (release 1999). Specifications, 3rd Generation Partenership Project

E. Thomé, Subquadratic Computation of Vector Generating Polynomials and Improvement of the Block Wiedemann Algorithm, Journal of Symbolic Computation, vol.33, issue.5, pp.757-775, 2002.
DOI : 10.1006/jsco.2002.0533

A. Valembois, Detection and recognition of a binary linear code, Discrete Applied Mathematics, vol.111, issue.1-2, pp.199-218, 2001.
DOI : 10.1016/S0166-218X(00)00353-X

A. J. Viterbi, Error bounds for convolutional codes and asymptotically optimum decoding algorithm, IEEE Transactions on Information Theory, issue.13, pp.260-269, 1967.

L. Von-ahn and N. J. Hopper, Public-Key Steganography, C. Cachin et J. Camenisch Proc. Eurocrypt, pp.323-341, 2004.
DOI : 10.1007/978-3-540-24676-3_20

B. Vucetic and J. Yuan, Turbo Codes : Principles and Applications, 2000.
DOI : 10.1007/978-1-4615-4469-2

P. Wayner, Disappearing cryptography -Information Hiding : steganography & watermarking, 2002.

A. Westfeld, F5???A Steganographic Algorithm, 1999.
DOI : 10.1007/3-540-45496-9_21

A. Westfeld, F5???A Steganographic Algorithm, Proc. Information Hiding, 4th International Workshop, pp.289-302, 2001.
DOI : 10.1007/3-540-45496-9_21

A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, A. Pfitzmann , ´ editeur : Proc. Information Hiding, Third International Workshop, IH'99, volume 1768 de Lecture Notes in Computer Science, pp.61-76, 1999.
DOI : 10.1007/10719724_5

D. H. Wiedemann, Solving sparse linear equations over finite fields, IEEE Transactions on Information Theory, vol.32, issue.1, pp.54-62, 1986.
DOI : 10.1109/TIT.1986.1057137

R. Wong, Asymptotic Approximations of Integrals, 1989.
DOI : 10.1137/1.9780898719260

J. M. Wozencraft, Reiffen : Sequential decoding, 1961.

Y. Yasuda, K. Kashiki, and Y. , Hirata : High-rate punctured convolutional codes for soft decision Viterbi decoding, IEEE Transactions on Communications, p.32, 1984.
DOI : 10.1109/tcom.1984.1096047

J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke et al., Modeling the Security of Steganographic Systems, Proc. Information Hiding. Second International Workshop, IH'98, volume 1525 de Lecture Notes in Computer Science, pp.344-354, 1998.
DOI : 10.1007/3-540-49380-8_24

A. Analyse-des, 65 2.3.1 Canal sans erreur, p.69

.. Algorithmes-de-reconstruction, 94 3.2.1 Canal sans erreur, p.104

A. Analyse-des, 105 3.3.1 Canal sans erreur

.. Algorithmes-de-reconstruction, 120 4.2.1 Canal sans erreur, p.123

A. Analyse-des, 126 4.3.1 Canal sans erreur, p.127

.. Stéganographie-dans-le-domaine-spatial, 144 5.1.1 Les images non compressées, 144 5.1.2 Stéganographie dans des plans de bits multiples . . . . . . . . . . . . 145

J. Le-format, 151 5.2.1 Changement de l'espace des couleurs, 151 5.2.2 Transformation DCT (Discrete Cosinus Transform) . . . . . . . . . . 152