François Cayre
53
Documents
Publications
- 16
- 20
- 6
- 4
- 4
- 1
- 1
- 1
|
Une implantation de la théorie de l'informationGRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images, GRETSI - Groupe de Recherche en Traitement du Signal et des Images, Aug 2023, Grenoble, France
Communication dans un congrès
hal-04256174v1
|
|
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small PatchesIWDW 2019 - 18th International Workshop on Digital-forensics and Watermarking, Nov 2019, Chengdu, China
Communication dans un congrès
hal-02335866v1
|
Complexity and Similarity for Sequences using LZ77-based conditional information measureISIT 2019 - IEEE International Symposium on Information Theory, Jul 2019, Paris, France. pp.2454-2458, ⟨10.1109/ISIT.2019.8849610⟩
Communication dans un congrès
hal-02346520v1
|
|
|
GRAFT : Adaptation non-supervisée au re-dimensionnement pour la détection de manipulation d'imageGRETSI 2019 - XXVIIème Colloque francophone de traitement du signal et des images, Aug 2019, Lille, France
Communication dans un congrès
hal-02335837v1
|
Clustering and causality inference using algorithmic complexityEUSIPCO 2017 - 25th European Signal Processing Conference, Aug 2017, Kos Island, Greece
Communication dans un congrès
hal-01655109v1
|
|
An effective histogram-based approach to JPEG-100 forensicsIPTA 2016 - 6th International Conference on Image Processing Theory, Tools and Applications (IPTA'16), Dec 2016, Oulu, Finland
Communication dans un congrès
hal-01406265v1
|
|
General-purpose image forensics using patch likelihood under image statistical modelsWIFS 2015 - 7th IEEE International Workshop on Information Forensics and Security (WIFS 2015), IEEE, Nov 2015, Rome, Italy. 6 p
Communication dans un congrès
hal-01240755v1
|
|
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statisticsIH&MMSEC 2013 - 1st ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2013), Jun 2013, Montpellier, France. pp.117-122
Communication dans un congrès
hal-00836438v1
|
|
|
Vers un modèle de canal réaliste pour l'analyse de la sécurité du processus d'authentification par code matriciel 2DGRETSI 2013 - XXIVème Colloque francophone de traitement du signal et des images, Sep 2013, Brest, France. pp.1-4
Communication dans un congrès
hal-00835273v1
|
Towards a realistic channel model for security analysis of authentication using graphical codesWIFS 2013 - IEEE International Workshop on Information Forensics and Security (WIFS'13), Nov 2013, Guangzhou, China. pp.1-5
Communication dans un congrès
hal-00863917v1
|
|
A variational approach to JPEG anti-forensicsICASSP 2013 - 38th IEEE International Conference on Acoustics, Speech and Signal Processing, May 2013, Vancouver, Canada. pp.3058-3062
Communication dans un congrès
hal-00836437v1
|
|
|
Practical Key Length of Watermarking SystemsICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00686813v1
|
|
2D Bar-Codes for Authentication: A Security ApproachEUSIPCO 2012 - 20th European Signal Processing Conference, Aug 2012, Bucarest, Romania. pp.1
Communication dans un congrès
hal-00709394v1
|
|
3D lighting-based image forgery detection using shape-from-shadingEUSIPCO 2012 - 20th European Signal Processing Conference, Aug 2012, Bucarest, Romania. pp.1777-1781
Communication dans un congrès
hal-00734749v1
|
|
Théorie du transport appliquée au tatouage sûr d'images naturellesGRETSI 2011 - XXIIIème Colloque francophone de traitement du signal et des images, Sep 2011, Bordeaux, France. pp.ID232
Communication dans un congrès
hal-00609187v1
|
|
Considering Security and Robustness Constraints for Watermark-based Tardos FingerprintingMMSP 2010 - IEEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. pp.46-51, ⟨10.1109/MMSP.2010.5661992⟩
Communication dans un congrès
hal-00537139v2
|
|
Security and Robustness Constraints for Spread-Spectrum Tardos FingerprintingWIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10), Dec 2010, Seattle, United States. pp.2010
Communication dans un congrès
hal-00541383v1
|
|
On security threats for robust perceptual hashingMedia Forensics and Security, Jan 2009, San Jose, United States. pp.id 807487, ⟨10.1117/12.807487⟩
Communication dans un congrès
hal-00371146v1
|
|
Optimization of Natural Watermarking Using Transportation TheoryACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8
Communication dans un congrès
hal-00437902v1
|
|
Compromis sécurité / robustesse en resynchronisation pour le tatouageCORESA 2009 - Journées d´Etudes et d´Echanges COmpression et REprésentation des Signaux Audiovisuels, Mar 2009, Toulouse, France
Communication dans un congrès
hal-00365823v1
|
|
TSAR: Secure Transfer OF High Resolution Art ImagesEVA 2008 - Electronic imaging and the Visual Art, Jul 2008, London, United Kingdom. pp.1-6
Communication dans un congrès
hal-00320836v1
|
|
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-HidingIH 2008 - Information Hiding: 10th International Workshop, Jun 2008, Santa-Barbara, United States
Communication dans un congrès
hal-00325080v1
|
The good, the bad and the ugly: three different approaches to break their watermarking systemSPIE 2007 - Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents IX, Jan 2007, San Jose, United States. pp.6, ⟨10.1117/12.703968⟩
Communication dans un congrès
hal-00158014v1
|
|
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?ICIP 2007 - 14th IEEE International Conference on Image Processing, Sep 2007, San Antonio, Texas, United States
Communication dans un congrès
hal-00158056v1
|
|
|
Techniques sûres de tatouage pour l'imageCORESA 2007 - 12èmes Journées d´Etudes et d´Echanges COmpression et REprésentation des Signaux Audiovisuels, Nov 2007, Montpellier, France. pp.electronic version
Communication dans un congrès
hal-00166725v1
|
|
Practical Performance Analysis of Secure Modulations for WOA Spread-Spectrum based Image WatermarkingACM Multimedia and Security Workshop 2007, Sep 2007, Dallas, United States. pp.electronic version
Communication dans un congrès
hal-00166726v1
|
|
Achieving subspace or key security for WOA using Natural or Circular WatermarkingACM Multimedia and Security Workshop, Sep 2006, Geneva, Switzerland. pp.digital version
Communication dans un congrès
hal-00166575v1
|
|
Natural Watermarking: a secure spread spectrum technique for WOAInformation Hiding 2006, Jul 2006, Alexandria, United States. pp.digital version
Communication dans un congrès
hal-00166574v1
|
Natural Watermarking: a secure spread spectrum technique for WOAInformation Hiding Workshop (IH06), Jul 2006, Alexandria, United States. pp.digital version
Communication dans un congrès
hal-00166572v1
|
|
|
Watermarking security part I: theorySecurity, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757
Communication dans un congrès
inria-00083329v1
|
A theoretical study of watermarking securityISIT 2005, 2005, pp.1868-1872
Communication dans un congrès
hal-00158005v1
|
|
|
Watermarking security part II: practiceSecurity, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767
Communication dans un congrès
inria-00083335v1
|
|
Watermarking attack: security of WSS techniquesInternational Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183
Communication dans un congrès
inria-00083194v1
|
Tatouage d'images par ondelettes et application à la couleurSep 2001
Communication dans un congrès
hal-00143772v1
|
Proceedings of the 9th Information Hiding WorkshopTeddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. Springer Verlag, 4567, pp.1--391, 2007
Ouvrages
inria-00504303v1
|
Watermarking SecurityNedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9
Chapitre d'ouvrage
inria-00580838v1
|
Natural Watermarking: a secure spread spectrum technique for WOA2007, pp.8
Autre publication scientifique
hal-00157965v1
|
|
Achieving subspace or key security for WOA using natural or circular watermarkingProceeding of the 8th workshop on Multimedia and security, 2006, pp.80-88
Autre publication scientifique
hal-00157995v1
|
|
SALZA: Practical Algorithmic Information Theory and Sharper Universal String Similarity2020
Pré-publication, Document de travail
hal-03010529v1
|
|
Watermarking 3D triangle meshes for authentication and integrity[Research Report] RR-5223, INRIA. 2004
Rapport
inria-00071257v1
|
|
Contributions au tatouage des maillages surfaciques 3DModélisation et simulation. Télécom ParisTech, 2003. Français. ⟨NNT : ⟩
Thèse
tel-00005731v1
|