Nombre de documents

89


Article dans une revue18 documents

  • Li Weng, Laurent Amsaleg, Teddy Furon. Privacy-Preserving Outsourced Media Search. IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers, 2016, 28 (10), <10.1109/TKDE.2016.2587258>. <hal-01391444>
  • Giorgos Tolias, Andrei Bursuc, Teddy Furon, Hervé Jégou. Rotation and translation covariant match kernels for image retrieval. Computer Vision and Image Understanding, Elsevier, 2015, pp.15. <10.1016/j.cviu.2015.06.007>. <hal-01168525>
  • Patrick Bas, Teddy Furon. A New Measure of Watermarking Security: The Effective Key Length. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2013, 8 (8), pp.1306 - 1317. <hal-00836404>
  • Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader. Sequential Monte Carlo for rare event estimation. Statistics and Computing, Springer Verlag (Germany), 2012, 22 (3), pp.795-908. <10.1007/s11222-011-9231-6>. <inria-00584352>
  • Peter Meerwald, Teddy Furon. Towards practical joint decoding of binary Tardos fingerprinting codes. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (4), pp.1168-1180. <10.1109/TIFS.2012.2195655>. <hal-00740964>
  • Teddy Furon, Gwenaël Doërr. Tracing pirated content on the Internet: Unwinding Ariadne's thread. IEEE Security & Privacy Magazine, 2010, 8 (5), pp.69-71. <inria-00505851>
  • Teddy Furon, Patrick Bas. Broken Arrows. EURASIP Journal on Information Security, Hindawi, 2008, 2008, pp.ID 597040. <10.1155/2008/597040>. <hal-00335311>
  • Frédéric Cérou, Teddy Furon, Arnaud Guyader. Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP Journal on Information Security, Hindawi, 2008, 2008 (Article ID 414962), 12 p. <http://www.hindawi.com/journals/is/2008/414962.html>. <10.1155/2008/414962>. <inria-00505896>
  • Frédéric Cérou, Teddy Furon, Arnaud Guyader. Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP Journal on Information Security, Hindawi, 2008, 2008 (1), pp.414962. <hal-00784458>
  • Teddy Furon. A constructive and unifying framework for zero-bit watermarking. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2007, 2 (2), pp.149-163. <10.1109/TIFS.2007.897272>. <inria-00078445v2>
  • Luis Pérez-Freire, Fernando Perez-Gonzalez, Teddy Furon, Pedro Comesana. Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2006, 1 (4), pp.421-439. <inria-00580872>
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. <inria-00088006>
  • Gaëtan Le Guelvouit, Teddy Furon. La stéganographie moderne. Multi-system & Internet Security Cookbook (MISC), Editions Diamond, 2005, mars. <inria-00580880>
  • Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl. SmartRight: A Copy Protection System for Digital Home Networks. IEEE Signal Processing Magazine, special issue on digital right management., IEEE, 2004, 21 (2), pp.100--108. <inria-00083200>
  • Thierry Maillard, Teddy Furon. Towards Digital Rights and Exemptions Management Systems. Computer Law and Security Report, 2004, 20 (4), pp.281--287. <inria-00083204>
  • Teddy Furon, Pierre Duhamel. An Asymmetric Watermarking Method. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2003, 51 (4), pp.981-995. <inria-00080829>
  • Mauro Barni, Franco Bartolini, Teddy Furon. A general framework for robust watermarking security. Signal Processing, Elsevier, 2003, 83 (10), pp.2069-2084. <inria-00080835>
  • Teddy Furon, Pierre Duhamel. Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copie. Traitement du Signal, Lavoisier, 2001, 18 (4). <inria-00083354>

Communication dans un congrès65 documents

  • Ahmet Iscen, Teddy Furon. Group Testing for Identification with Privacy. ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain. <hal-01309032v2>
  • Raghavendran Balu, Teddy Furon. Differentially Private Matrix Factorization using Sketching Techniques. ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, Jun 2016, Vigo, Spain. <10.1145/2909827.2930793>. <hal-01317596>
  • Ahmet Iscen, Laurent Amsaleg, Teddy Furon. Scaling Group Testing Similarity Search. ACM International Conference on Multimedia Retrieval 2016 , Jun 2016, New York, United States. <10.1145/2911996.2912010>. <hal-01304287>
  • Ahmet Iscen, Michael Rabbat, Teddy Furon. Efficient Large-Scale Similarity Search Using Matrix Factorization. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jun 2016, Las Vegas, United States. <http://cvpr2016.thecvf.com/>. <hal-01294736>
  • Raghavendran Balu, Teddy Furon, Laurent Amsaleg. Sketching techniques for very large matrix factorization. ECIR 2016 - 38th European Conference on Information Retrieval , 2016, Padoue, Italy. <hal-01249621>
  • Laurent Amsaleg, Chelly Oussama, Teddy Furon, Stephane Girard, Michael E. Houle, et al.. Estimating Local Intrinsic Dimensionality. ACM. 21st Conf. on Knowledge Discovery and Data Mining, KDD2015, Aug 2015, Sidney, Australia. 2015, <http://www.kdd.org/kdd2015/>. <hal-01159217>
  • Giorgos Tolias, Teddy Furon, Hervé Jégou. Orientation covariant aggregation of local descriptors with embeddings. European Conference on Computer Vision, Sep 2014, Zurich, Switzerland. 2014. <hal-01020823v3>
  • Teddy Furon, Mathieu Desoubeaux. Tardos codes for real. IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States. IEEE, pp.7, 2014. <hal-01066043>
  • Raghavendran Balu, Teddy Furon, Sébastien Gambs. Challenging differential privacy: the case of non-interactive mechanisms. European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. Springer-Verlag, 8657, 2014, LNCS. <http://link.springer.com/chapter/10.1007%2F978-3-319-11212-1_9>. <10.1007/978-3-319-11212-1_9>. <hal-01011346>
  • Miaojing Shi, Teddy Furon, Hervé Jégou. A Group Testing Framework for Similarity Search in High-dimensional Spaces. ACM Multimedia, Nov 2014, Orlando, United States. 2014, <http://acmmm.org/2014/>. <10.1145/2647868.2654895>. <hal-01062531v3>
  • Josip Krapac, Florent Perronnin, Teddy Furon, Hervé Jégou. Instance classification with prototype selection. ICMR - ACM International Conference on Multimedia Retrieval, Apr 2014, Glasgow, United Kingdom. 2014. <hal-00942275>
  • Raghavendran Balu, Teddy Furon, Hervé Jégou. Beyond "project and sign" for cosine estimation with binary codes. ICASPP - International Conference on Acoustics, Speech, and Signal Processing, May 2014, Florence, Italy. 2014. <hal-00942075>
  • Binod Bhattarai, Alexis Mignon, Frédéric Jurie, Teddy Furon. Puzzling Face Verification Algorithms for Privacy Protection. Yan Lindsay Sun and Vicky H. Zhao. IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States. IEEE, 2014. <hal-01066070>
  • Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer. Recherche approximative de plus proches voisins efficace et sûre. GRETSI, Sep 2013, Brest, France. pp.ID238, 2013. <hal-00823879v2>
  • Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon. Fast and secure similarity search in high dimensional space. IEEE International Workshop on Information Forensics and Security, 2013, Guangzhou, China. 2013. <hal-00857570>
  • Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer. Secure and Efficient Approximate Nearest Neighbors Search. Andreas Uhl. 1st ACM Workshop on Information Hiding and Multimedia Security, Jun 2013, Montpellier, France. pp.175--180, 2013, IH & MMSec '13. <10.1145/2482513.2482539>. <hal-00817336v2>
  • Teddy Furon, Arnaud Guyader, Frédéric Cérou. Decoding Fingerprinting Using the Markov Chain Monte Carlo Method. WIFS - IEEE Workshop on Information Forensics and Security, Dec 2012, Tenerife, Spain. IEEE, 2012. <hal-00757152>
  • Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon. Enlarging hacker's toolbox: deluding image recognition by attacking keypoint orientations. ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan. IEEE, 2012. <hal-00686809>
  • Thanh-Toan Do, Laurent Amsaleg, Ewa Kijak, Teddy Furon. Security-Oriented Picture-In-Picture Visual Modifications. ICMR - ACM International Conference on Multimedia Retrieval, Jun 2012, Hong-Kong, China. 2012. <hal-00764431>
  • Patrick Bas, Teddy Furon. Key Length Estimation of Zero-Bit Watermarking Schemes. EUSIPCO - 20th European Signal Processing Conference, Aug 2012, Romania. pp.TBA, 2012. <hal-00728159>
  • Teddy Furon, Patrick Bas. A New Measure of Watermarking Security Applied on DC-DM QIM. IH - Information Hiding, May 2012, Berkeley, United States. pp.TBA, 2012. <hal-00702689v2>
  • Patrick Bas, Teddy Furon, François Cayre. Practical Key Length of Watermarking Systems. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Mar 2012, Kyoto, Japan. IEEE, Proceedings of ICASSP 2012, 2012. <hal-00686813>
  • Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs. Anti-sparse coding for approximate nearest neighbor search. ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan. 2012. <hal-00661591>
  • Peter Meerwald, Teddy Furon. Towards Joint Tardos Decoding: The 'Don~Quixote' Algorithm. T. Filler, T. Pevny, S. Craver, A. Ker. Information Hiding, May 2011, Prague, Czech Republic. Springer Berlin Heidelberg, pp.28-42, 2011, <http://link.springer.com/chapter/10.1007%2F978-3-642-24178-9_3>. <10.1007/978-3-642-24178-9_3>. <hal-01057832>
  • Peter Meerwald, Teddy Furon. Group testing meets traitor tracing. ICASSP, May 2011, Prague, Czech Republic. IEEE, 2011, <10.1109/ICASSP.2011.5947280>. <inria-00580899>
  • Peter Meerwald, Teddy Furon. Iterative single Tardos decoder with controlled probability of false positive. International Conference on Multimedia and Expo, Jul 2011, Barcelona, Spain. IEEE, 2011. <inria-00581159>
  • Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. Pevny, Tomas and Filler, Tomas. Information Hiding, May 2011, Prague, Czech Republic. Springer-Verlag, 2011. <inria-00581156v1>
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Deluding Image Recognition in SIFT-based CBIR Systems. ACM Multimedia in Forensics, Security and Intelligence, Oct 2010, Firenze, Italy. 2010. <inria-00505845>
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Challenging the Security of Content Based Image Retrieval Systems. IEEE. MMSP - EEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. 2010, <http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5661993>. <10.1109/MMSP.2010.5661993>. <inria-00505846>
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Understanding the Security and Robustness of SIFT. ACM. ACM Multimedia, Oct 2010, Firenze, Italy. 2010. <inria-00505843>
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Towards Robust and Secure Watermarking. ACM Multimedia and Security, Sep 2010, Roma, Italy. 2010. <inria-00505849>
  • Luis Pérez-Freire, Teddy Furon. BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES. IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom. 2009. <inria-00505890>
  • Teddy Furon, Luis Pérez-Freire. WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES. IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom. 2009. <inria-00505886>
  • Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon. Expectation Maximisation decoding of Tardos probabilistic fingerprinting code. IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States. SPIE, 7254, 2009, Proceedings of the SPIE. <inria-00504523>
  • Teddy Furon, Cyrille Jégourel, Arnaud Guyader, Frédéric Cérou. ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUE. IEEE International Conference on Digital Signal Processing, Jul 2009, Santorini, Greece. 2009. <inria-00505877>
  • Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou. Estimating the minimal length of Tardos code. Information Hiding, Jun 2009, Darmstadt, Germany. Springer Verlag, 5806, 2009, LNCS. <inria-00505882>
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. 2009. <inria-00504522>
  • Fuchun Xie, Caroline Fontaine, Teddy Furon. Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows ". Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. 2009. <inria-00504591>
  • Teddy Furon, Luis Pérez-Freire. EM Decoding of Tardos Traitor Tracing Codes. ACM Multimedia and Security, Sep 2009, Princeton, United States. 2009. <inria-00505875>
  • Teddy Furon. Le traçage de traîtres. Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2009, Rennes, France. 2009. <inria-00505885>
  • Teddy Furon. Les Mesures Techniques de Protection... autrement dit les DRM. Colloque PRIAM, Nov 2008, Grenoble, France. 2008. <inria-00505909>
  • Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader. Rare event simulation for a static distribution. International Workshop on Rare Event Simulation, Oct 2008, Rennes, France. 2008. <inria-00505919>
  • Teddy Furon, Arnaud Guyader, Frédéric Cérou. On the design and optimisation of Tardos probabilistic fingerprinting codes. Proc. of the 10th Information Hiding Workshop, 2008, Santa Barbara, United States. 2008. <inria-00504549>
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. On-Off Keying Modulation and Tardos Fingerprinting. Proc. ACM Multimedia and Security, 2008, Oxford, United Kingdom. 2008. <inria-00504606>
  • Gaëtan Le Guelvouit, Teddy Furon, François Cayre. The good, the bad and the ugly: three different approaches to break their watermarking system. Security, Steganography, and Watermarking of Multimedia Contents IX, EI120, 2007, San Jose, United States. SPIE, pp.6, 2007, 28 January-1 February 2007, San Jose, California, USA. <hal-00158014>
  • Ingemar Cox, Gwenaël Doërr, Teddy Furon. Watermarking is not cryptography. Springer-Verlag. Proc. Int. Work. on Digital Watermarking, inivited talk, 2006, Jeju island, South Korea. 2006, L.N.C.S. <inria-00504528>
  • Teddy Furon. Hermite Polynomials as Provably Good Functions to Watermark White Gaussian Hosts. Proc. ACM Multimedia and Security, 2006, Geneva, Switzerland. 2006. <inria-00504548>
  • Teddy Furon, Julie Josse, Sandrine Le Squin. Some theoretical aspects of watermarking detection. E. Delp and P. W. Wong. Security, Steganography, and Watermarking of Multimedia Contents VIII, Jan 2006, San Jose, CA, USA, United States. 6072, 2006, Proc. SPIE-IS\&T Electronic Imaging. <inria-00083370>
  • Luis Pérez-Freire, Fernando Perez-Gonzalez, Teddy Furon. On achievable security levels for lattice data hiding in the known message attack. Slava Voloshynovskiy. ACM Multimedia and Security, Sep 2006, Geneva, Switzerland. ACM, 2006. <inria-00580885>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. E. Delp and P. W. Wong. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. SPIE, 5681, pp.746--757, 2005, Proc. SPIE-IS\&T Electronic Imaging. <inria-00083329>
  • François Cayre, Caroline Fontaine, Teddy Furon. A theoretical study of watermarking security. ISIT 2005, 2005, IEEE, pp.1868-1872, 2005. <hal-00158005>
  • Teddy Furon. A survey of watermarking security. M. Barni, Ingemar Cox, T. Kalker, and Hyoung Joong Kim. International Workshop on Digital Watermarking, 2005, Siena, Italy, Springer-Verlag, 3710, pp.201--215, 2005, Lecture Notes in Computer Science. <inria-00083319>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part II: practice. E. Delp and P. W. Wong. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. SPIE, 5681, pp.758--767, 2005, Proc. SPIE-IS\&T Electronic Imaging. <inria-00083335>
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking attack: security of WSS techniques. Ingemar Cox, Ton Kalker, and Heung-Kyu Lee. International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. Springer-Verlag, 3304, pp.171--183, 2004, Lecture Notes in Computer Science. <inria-00083194>
  • Teddy Furon, Pierre Duhamel. Robustness of an asymmetric technique. IEEE Int. Conf. on Image Processing, Sep 2003, Vancouver, Canada, 2003. <inria-00080811>
  • Mark Mullarkey, Neil Hurley, Guénolé Silvestre, Teddy Furon. Application of Side-Informed Embedding and Polynomial Detection to Audio Watermarking. Int. Conf. on Multimedia and Expo, Jul 2003, Baltimore, MY, USA, United States. 2003. <inria-00083363>
  • Teddy Furon, Benoît Macq, Guénolé Silvestre, Neil Hurley. JANIS: Just Another N-order side-Informed watermarking Scheme. IEEE International Conference on Image Processing, 2002, Rochester, NY, United States. 2, pp.153-156, 2002. <inria-00080826>
  • Pierre Guillon, Teddy Furon, Pierre Duhamel. Applied public-key steganography. P. W. Wong and E. Delp. Security and Watermarking of Multimedia Contents IV, 2002, San Jose, CA, United States. 2002. <inria-00080818>
  • Guénolé Silvestre, Neil Hurley, Teddy Furon. Robustness and efficiency of non-linear side-informed watermarking. T. Kalker. Information Hiding Workshop, Oct 2002, Noordwijkerhout, The Netherlands, Netherlands. Springer-Verlag, 2578, pp.106--118, 2002, Lecture Notes in Computer Science. <inria-00083358>
  • Teddy Furon, Guénolé Silvestre, Neil Hurley. Watermark detector based on Nth order statistics. SPIE conference, Jul 2002, Seattle, United States. SPIE, 4790, 2002, Proc. of SPIE. <inria-00580891>
  • Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil Hurley. Improved Polynomial Detectors for Side-Informed Watermarking. P. W. Wong and E. Delp. Security and Watermarking of Multimedia Contents IV, Jan 2002, San José, CA, USA, United States. pp.311-321, 2002. <inria-00080827>
  • Teddy Furon, Ilaria Venturini, Pierre Duhamel. An unified approach of asymmetric watermarking schemes. P. W. Wong and E. Delp. Security and Watermarking of Multimedia Contents III, 2001, San Jose, CA, United States. 2001. <inria-00080814>
  • Teddy Furon, Nicolas Moreau, Pierre Duhamel. Audio asymmetric watermarking technique. Int. Conf. on Audio, Speech and Signal Processing, Jun 2000, Istanbul, Turkey, 2000. <inria-00001126>
  • Teddy Furon, Pierre Duhamel. Copy protection of distributed contents: an application of watermarking techniques. Friendly Exchanging throught the Net, Mar 2000, Bordeaux, France, France. 2000, Proc. of COST 254. <inria-00083343>
  • Teddy Furon, Pierre Duhamel. An Asymmetric Public Detection Watermarking Technique. A. Pfitzmann. third Int. Workshop on Information Hiding, Sep 1999, Dresden, Germany. Springer-Verlag, 1768 (1768), pp.88-100, 1999, Lecture Notes in Computer Science. <inria-00001125>

Chapitre d'ouvrage4 documents

  • Teddy Furon. Watermarking security. Information hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5. <hal-01275880>
  • Teddy Furon. Chapitre V: Les mesures techniques de protection - Une brève introduction. Daniel Le Métayer. Les technologies de l'information au service des droits : opportunités, défis, limites, 32, Bruylant, pp.85-90, 2010, Cahiers du Centre de recherches informatique et droit, 978-2-8027-2960-0. <inria-00538241>
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking Security. Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9. <inria-00580838>
  • Teddy Furon. Tatouage asymétrique. F. Davoine et S. Pateux. Tatouage de documents audiovisuels numériques, Hermès Science, pp.215--227, 2004, Traité IC2 Information-Commande-Communication, série Traitement du Signal et de l'Image, ISBN-2-7462-0816-4. <inria-00083368>

Direction d'ouvrage, Proceedings1 document

  • Teddy Furon, Gwenaël Doërr, Patrick Bas, François Cayre. Proceedings of the 9th Information Hiding Workshop. Teddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. 4567, Springer Verlag, pp.1--391, 2007. <inria-00504303>

Autre publication1 document