Number of documents

107


Journal articles21 documents

  • Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stephane Girard, Michael Houle, et al.. Extreme-value-theoretic estimation of local intrinsic dimensionality. Data Mining and Knowledge Discovery, Springer, 2018, 32 (6), pp.1768-1805. ⟨10.1007/s10618-018-0578-6⟩. ⟨hal-01864580⟩
  • Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael Rabbat, Hervé Jégou. Memory vectors for similarity search in high-dimensional spaces. IEEE transactions on big data, IEEE, 2017, 4 (1), pp.65 - 77. ⟨10.1109/TBDATA.2017.2677964⟩. ⟨hal-01481220⟩
  • Li Weng, Laurent Amsaleg, Teddy Furon. Privacy-Preserving Outsourced Media Search . IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers, 2016, 28 (10), ⟨10.1109/TKDE.2016.2587258⟩. ⟨hal-01391444⟩
  • Giorgos Tolias, Andrei Bursuc, Teddy Furon, Hervé Jégou. Rotation and translation covariant match kernels for image retrieval. Computer Vision and Image Understanding, Elsevier, 2015, pp.15. ⟨10.1016/j.cviu.2015.06.007⟩. ⟨hal-01168525⟩
  • Patrick Bas, Teddy Furon. A New Measure of Watermarking Security: The Effective Key Length. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2013, 8 (8), pp.1306 - 1317. ⟨hal-00836404⟩
  • Peter Meerwald, Teddy Furon. Towards practical joint decoding of binary Tardos fingerprinting codes. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (4), pp.1168-1180. ⟨10.1109/TIFS.2012.2195655⟩. ⟨hal-00740964⟩
  • Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader. Sequential Monte Carlo for rare event estimation. Statistics and Computing, Springer Verlag (Germany), 2012, 22 (3), pp.795-908. ⟨10.1007/s11222-011-9231-6⟩. ⟨inria-00584352⟩
  • Teddy Furon, Gwenaël Doërr. Tracing pirated content on the Internet: Unwinding Ariadne's thread. IEEE Security & Privacy Magazine, 2010, 8 (5), pp.69-71. ⟨inria-00505851⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal, Lavoisier, 2010, 27 (2), pp.127 - 147. ⟨10.3166/ts.27.127-146 ⟩. ⟨hal-00704157⟩
  • Teddy Furon, Patrick Bas. Broken Arrows. EURASIP Journal on Information Security, Hindawi, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩. ⟨hal-00335311⟩
  • Frédéric Cérou, Teddy Furon, Arnaud Guyader. Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP Journal on Information Security, Hindawi, 2008, 2008 (Article ID 414962), 12 p. ⟨http://www.hindawi.com/journals/is/2008/414962.html⟩. ⟨10.1155/2008/414962⟩. ⟨inria-00505896⟩
  • Frédéric Cérou, Teddy Furon, Arnaud Guyader. Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP Journal on Information Security, Hindawi, 2008, 2008 (1), pp.414962. ⟨hal-00784458⟩
  • Teddy Furon. A constructive and unifying framework for zero-bit watermarking. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2007, 2 (2), pp.149-163. ⟨10.1109/TIFS.2007.897272⟩. ⟨inria-00078445v2⟩
  • Luis Pérez-Freire, Fernando Perez-Gonzalez, Teddy Furon, Pedro Comesana. Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2006, 1 (4), pp.421-439. ⟨inria-00580872⟩
  • Gaëtan Le Guelvouit, Teddy Furon. La stéganographie moderne. Multi-system & Internet Security Cookbook (MISC), Editions Diamond, 2005, mars. ⟨inria-00580880⟩
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. ⟨inria-00088006⟩
  • Thierry Maillard, Teddy Furon. Towards Digital Rights and Exemptions Management Systems. Computer Law and Security Report, 2004, 20 (4), pp.281--287. ⟨inria-00083204⟩
  • Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl. SmartRight: A Copy Protection System for Digital Home Networks. IEEE Signal Processing Magazine, special issue on digital right management., IEEE, 2004, 21 (2), pp.100--108. ⟨inria-00083200⟩
  • Mauro Barni, Franco Bartolini, Teddy Furon. A general framework for robust watermarking security. Signal Processing, Elsevier, 2003, 83 (10), pp.2069-2084. ⟨inria-00080835⟩
  • Teddy Furon, Pierre Duhamel. An Asymmetric Watermarking Method. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2003, 51 (4), pp.981-995. ⟨inria-00080829⟩
  • Teddy Furon, Pierre Duhamel. Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copie. Traitement du Signal, Lavoisier, 2001, 18 (4). ⟨inria-00083354⟩

Conference papers79 documents

  • Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy. Aggregation and embedding for group membership verification. ICASSP 2019 - IEEE International Conference on Acoustics, Speech and Signal Processing, May 2019, Brighton, United Kingdom. pp.2592-2596, ⟨10.1109/ICASSP.2019.8682422⟩. ⟨hal-02091036v3⟩
  • Marzieh Gheisari, Teddy Furon, Laurent Amsaleg. Privacy Preserving Group Membership Verification and Identification. CVPR 2019 - Conference on Computer Vision and Pattern Recognition, Jun 2019, Long Beach, United States. pp.1-9. ⟨hal-02107442⟩
  • Teddy Furon. Watermarking error exponents in the presence of noise: The case of the dual hypercone detector. IH&MMSEC'19 - 7th ACM Workshop on Information Hiding and Multimedia Security, Jul 2019, Paris, France. pp.1-9. ⟨hal-02122206⟩
  • Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondřej Chum. Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. ACCV 2018 - Asian Conference on Computer Vision, Dec 2018, Perth, Australia. pp.1-16. ⟨hal-01909348v2⟩
  • Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondřej Chum. Fast Spectral Ranking for Similarity Search. CVPR 2018 - IEEE Computer Vision and Pattern Recognition Conference, Jun 2018, Salt Lake City, United States. pp.1-10. ⟨hal-01839744⟩
  • Vedran Vukotić, Vivien Chappelier, Teddy Furon. Are Deep Neural Networks good for blind image watermarking?. WIFS 2018 - International Workshop on Information Forensics and Security, Dec 2018, Hong-Kong, China. pp.1-7. ⟨hal-01936750⟩
  • Ronan Sicre, Ahmad Montaser Awal, Teddy Furon. Identity documents classification as an image classification problem. ICIAP 2017 - 19th International Conference on Image Analysis and Processing, Sep 2017, Catania, Italy. pp.602-613, ⟨10.1007/978-3-319-68548-9_55⟩. ⟨hal-01660500⟩
  • Ahmad-Montaser Awal, Nabil Ghanmi, Ronan Sicre, Teddy Furon. Complex Document Classification and Localization Application on Identity Document Images. ICDAR 2017 - The 14th IAPR International Conference on Document Analysis and Recognition, Nov 2017, Kyoto, Japan. pp.1-6. ⟨hal-01660504⟩
  • Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondřej Chum. Panorama to panorama matching for location recognition. ACM International Conference on Multimedia Retrieval (ICMR) 2017, Jun 2017, Bucharest, Romania. ⟨10.1145/3078971.3079033⟩. ⟨hal-01511793⟩
  • Teddy Furon. About zero bit watermarking error exponents. ICASSP2017 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2017, New Orleans, United States. ⟨hal-01512705⟩
  • Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondřej Chum. Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017, Honolulu, United States. ⟨hal-01505470⟩
  • Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie, et al.. Automatic discovery of discriminative parts as a quadratic assignment problem. ICCV Workshops -- CEFRL, Oct 2017, Venise, Italy. pp.1059-1068. ⟨hal-01623148⟩
  • Ahmet Iscen, Laurent Amsaleg, Teddy Furon. Scaling Group Testing Similarity Search. ACM International Conference on Multimedia Retrieval 2016 , Jun 2016, New York, United States. ⟨10.1145/2911996.2912010⟩. ⟨hal-01304287⟩
  • Raghavendran Balu, Teddy Furon, Laurent Amsaleg. Sketching techniques for very large matrix factorization . ECIR 2016 - 38th European Conference on Information Retrieval , 2016, Padoue, Italy. ⟨hal-01249621⟩
  • Ahmet Iscen, Teddy Furon. Group Testing for Identification with Privacy. ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain. ⟨hal-01309032v2⟩
  • Ahmet Iscen, Michael Rabbat, Teddy Furon. Efficient Large-Scale Similarity Search Using Matrix Factorization. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jun 2016, Las Vegas, United States. ⟨hal-01294736⟩
  • Raghavendran Balu, Teddy Furon. Differentially Private Matrix Factorization using Sketching Techniques. ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain. ⟨10.1145/2909827.2930793⟩. ⟨hal-01317596⟩
  • Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stephane Girard, Michael E. Houle, et al.. Estimating Local Intrinsic Dimensionality. 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'15, ACM, Aug 2015, Sidney, Australia. pp.29-38 ⟨10.1145/2783258.2783405⟩. ⟨hal-01159217⟩
  • Raghavendran Balu, Teddy Furon, Sébastien Gambs. Challenging differential privacy: the case of non-interactive mechanisms. European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩. ⟨hal-01011346⟩
  • Josip Krapac, Florent Perronnin, Teddy Furon, Hervé Jégou. Instance classification with prototype selection. ICMR - ACM International Conference on Multimedia Retrieval, Apr 2014, Glasgow, United Kingdom. ⟨hal-00942275⟩
  • Raghavendran Balu, Teddy Furon, Hervé Jégou. Beyond "project and sign" for cosine estimation with binary codes. ICASPP - International Conference on Acoustics, Speech, and Signal Processing, IEEE, May 2014, Florence, Italy. ⟨hal-00942075⟩
  • Binod Bhattarai, Alexis Mignon, Frédéric Jurie, Teddy Furon. Puzzling Face Verification Algorithms for Privacy Protection. IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States. ⟨hal-01066070⟩
  • Teddy Furon, Mathieu Desoubeaux. Tardos codes for real. IEEE Workshop on Information Forensics and Security, Yan Lindsay Sun and Vicky H. Zhao, Dec 2014, Atlanta, United States. pp.7. ⟨hal-01066043⟩
  • Giorgos Tolias, Teddy Furon, Hervé Jégou. Orientation covariant aggregation of local descriptors with embeddings. European Conference on Computer Vision, Sep 2014, Zurich, Switzerland. ⟨hal-01020823v3⟩
  • Miaojing Shi, Teddy Furon, Hervé Jégou. A Group Testing Framework for Similarity Search in High-dimensional Spaces. ACM Multimedia, Nov 2014, Orlando, United States. ⟨10.1145/2647868.2654895⟩. ⟨hal-01062531v3⟩
  • Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer. Secure and Efficient Approximate Nearest Neighbors Search. 1st ACM Workshop on Information Hiding and Multimedia Security, Jun 2013, Montpellier, France. pp.175--180, ⟨10.1145/2482513.2482539⟩. ⟨hal-00817336v2⟩
  • Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer. Recherche approximative de plus proches voisins efficace et sûre. GRETSI, Sep 2013, Brest, France. pp.ID238. ⟨hal-00823879v2⟩
  • Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon. Fast and secure similarity search in high dimensional space. IEEE International Workshop on Information Forensics and Security, 2013, Guangzhou, China. ⟨hal-00857570⟩
  • Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon. Enlarging hacker's toolbox: deluding image recognition by attacking keypoint orientations. ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan. IEEE, 2012. 〈hal-00686809〉
  • Patrick Bas, Teddy Furon, François Cayre. Practical Key Length of Watermarking Systems. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2012), Mar 2012, Kyoto, Japan. ⟨hal-00686813⟩
  • Teddy Furon, Arnaud Guyader, Frédéric Cérou. Decoding Fingerprinting Using the Markov Chain Monte Carlo Method. WIFS - IEEE Workshop on Information Forensics and Security, Dec 2012, Tenerife, Spain. ⟨hal-00757152⟩
  • Patrick Bas, Teddy Furon. Key Length Estimation of Zero-Bit Watermarking Schemes. EUSIPCO - 20th European Signal Processing Conference, Aug 2012, Romania. pp.TBA. ⟨hal-00728159⟩
  • Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs. Anti-sparse coding for approximate nearest neighbor search. ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan. 2012. 〈hal-00661591〉
  • Patrick Bas, Teddy Furon. Are 128 Bits Long Keys Possible in Watermarking?. 13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩. ⟨hal-01540890⟩
  • Teddy Furon, Patrick Bas. A New Measure of Watermarking Security Applied on DC-DM QIM. IH - Information Hiding, May 2012, Berkeley, United States. pp.TBA. ⟨hal-00702689v2⟩
  • Thanh-Toan Do, Laurent Amsaleg, Ewa Kijak, Teddy Furon. Security-Oriented Picture-In-Picture Visual Modifications. ICMR - ACM International Conference on Multimedia Retrieval, Jun 2012, Hong-Kong, China. ⟨hal-00764431⟩
  • Peter Meerwald, Teddy Furon. Group testing meets traitor tracing. ICASSP, May 2011, Prague, Czech Republic. ⟨10.1109/ICASSP.2011.5947280⟩. ⟨inria-00580899⟩
  • Peter Meerwald, Teddy Furon. Iterative single Tardos decoder with controlled probability of false positive. International Conference on Multimedia and Expo, Jul 2011, Barcelona, Spain. ⟨inria-00581159⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar Cox. An Asymmetric Fingerprinting Scheme based on Tardos Codes. IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. ⟨10.1007/978-3-642-24178-9_4⟩. ⟨inria-00581156v2⟩
  • Peter Meerwald, Teddy Furon. Towards Joint Tardos Decoding: The 'Don~Quixote' Algorithm. Information Hiding, May 2011, Prague, Czech Republic. pp.28-42, ⟨10.1007/978-3-642-24178-9_3⟩. ⟨hal-01057832⟩
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Challenging the Security of Content Based Image Retrieval Systems. MMSP - EEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. ⟨10.1109/MMSP.2010.5661993⟩. ⟨inria-00505846⟩
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Deluding Image Recognition in SIFT-based CBIR Systems. ACM Multimedia in Forensics, Security and Intelligence, ACM, Oct 2010, Firenze, Italy. ⟨inria-00505845⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Towards Robust and Secure Watermarking. ACM Multimedia and Security, Sep 2010, Roma, Italy. ⟨inria-00505849⟩
  • Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg. Understanding the Security and Robustness of SIFT. ACM Multimedia, Oct 2010, Firenze, Italy. ⟨inria-00505843⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. Better security levels for "Broken Arrows". Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States. ⟨hal-00472982⟩
  • Ana Charpentier, Caroline Fontaine, Teddy Furon. Décodage EM du code de Tardos pour le fingerprinting. Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. ⟨inria-00504522⟩
  • Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon. Expectation Maximisation decoding of Tardos probabilistic fingerprinting code. IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States. ⟨inria-00504523⟩
  • Fuchun Xie, Caroline Fontaine, Teddy Furon. Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows ". Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France. ⟨inria-00504591⟩
  • Luis Pérez-Freire, Teddy Furon. BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES. IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom. ⟨inria-00505890⟩
  • Teddy Furon. Le traçage de traîtres. Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2009, Rennes, France. ⟨inria-00505885⟩
  • Teddy Furon, Cyrille Jégourel, Arnaud Guyader, Frédéric Cérou. ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUE. IEEE International Conference on Digital Signal Processing, Jul 2009, Santorini, Greece. ⟨inria-00505877⟩
  • Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou. Estimating the minimal length of Tardos code. Information Hiding, Jun 2009, Darmstadt, Germany. ⟨inria-00505882⟩
  • Teddy Furon, Luis Pérez-Freire. WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES. IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom. ⟨inria-00505886⟩
  • Teddy Furon, Luis Pérez-Freire. EM Decoding of Tardos Traitor Tracing Codes. ACM Multimedia and Security, Sep 2009, Princeton, United States. ⟨inria-00505875⟩
  • Teddy Furon, Arnaud Guyader, Frédéric Cérou. On the design and optimisation of Tardos probabilistic fingerprinting codes. Proc. of the 10th Information Hiding Workshop, 2008, Santa Barbara, United States. ⟨inria-00504549⟩
  • Fuchun Xie, Teddy Furon, Caroline Fontaine. On-Off Keying Modulation and Tardos Fingerprinting. Proc. ACM Multimedia and Security, ACM, 2008, Oxford, United Kingdom. ⟨inria-00504606⟩
  • Teddy Furon. Les Mesures Techniques de Protection... autrement dit les DRM. Colloque PRIAM, Nov 2008, Grenoble, France. ⟨inria-00505909⟩
  • Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader. Rare event simulation for a static distribution. International Workshop on Rare Event Simulation, Oct 2008, Rennes, France. ⟨inria-00505919⟩
  • Gaëtan Le Guelvouit, Teddy Furon, François Cayre. The good, the bad and the ugly: three different approaches to break their watermarking system. Security, Steganography, and Watermarking of Multimedia Contents IX, EI120, 2007, San Jose, United States. pp.6. ⟨hal-00158014⟩
  • Luis Pérez-Freire, Fernando Perez-Gonzalez, Teddy Furon. On achievable security levels for lattice data hiding in the known message attack. ACM Multimedia and Security, Sep 2006, Geneva, Switzerland. ⟨inria-00580885⟩
  • Teddy Furon, Julie Josse, Sandrine Le Squin. Some theoretical aspects of watermarking detection. Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, Jan 2006, San Jose, CA, USA, United States. ⟨inria-00083370⟩
  • Teddy Furon. Hermite Polynomials as Provably Good Functions to Watermark White Gaussian Hosts. Proc. ACM Multimedia and Security, ACM, 2006, Geneva, Switzerland. ⟨inria-00504548⟩
  • Ingemar Cox, Gwenaël Doërr, Teddy Furon. Watermarking is not cryptography. Proc. Int. Work. on Digital Watermarking, inivited talk, 2006, Jeju island, South Korea. ⟨inria-00504528⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. A theoretical study of watermarking security. ISIT 2005, 2005, pp.1868-1872. ⟨hal-00158005⟩
  • Teddy Furon. A survey of watermarking security. International Workshop on Digital Watermarking, 2005, Siena, Italy, pp.201--215. ⟨inria-00083319⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part II: practice. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767. ⟨inria-00083335⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757. ⟨inria-00083329⟩
  • François Cayre, Caroline Fontaine, Teddy Furon. Watermarking attack: security of WSS techniques. International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183. ⟨inria-00083194⟩
  • Teddy Furon, Pierre Duhamel. Robustness of an asymmetric technique. IEEE Int. Conf. on Image Processing, IEEE, Sep 2003, Vancouver, Canada. ⟨inria-00080811⟩
  • Mark Mullarkey, Neil Hurley, Guénolé Silvestre, Teddy Furon. Application of Side-Informed Embedding and Polynomial Detection to Audio Watermarking. Int. Conf. on Multimedia and Expo, IEEE, Jul 2003, Baltimore, MY, USA, United States. ⟨inria-00083363⟩
  • Pierre Guillon, Teddy Furon, Pierre Duhamel. Applied public-key steganography. Security and Watermarking of Multimedia Contents IV, SPIE, 2002, San Jose, CA, United States. ⟨inria-00080818⟩
  • Teddy Furon, Guénolé Silvestre, Neil Hurley. Watermark detector based on Nth order statistics. SPIE conference, Jul 2002, Seattle, United States. ⟨inria-00580891⟩
  • Jonathan Delhumeau, Teddy Furon, Guénolé Silvestre, Neil Hurley. Improved Polynomial Detectors for Side-Informed Watermarking. Security and Watermarking of Multimedia Contents IV, SPIE, Jan 2002, San José, CA, USA, United States. pp.311-321. ⟨inria-00080827⟩
  • Teddy Furon, Benoît Macq, Guénolé Silvestre, Neil Hurley. JANIS: Just Another N-order side-Informed watermarking Scheme. IEEE International Conference on Image Processing, IEEE, 2002, Rochester, NY, United States. pp.153-156. ⟨inria-00080826⟩
  • Guénolé Silvestre, Neil Hurley, Teddy Furon. Robustness and efficiency of non-linear side-informed watermarking. Information Hiding Workshop, Oct 2002, Noordwijkerhout, The Netherlands, Netherlands. pp.106--118. ⟨inria-00083358⟩
  • Teddy Furon, Ilaria Venturini, Pierre Duhamel. An unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, SPIE, 2001, San Jose, CA, United States. ⟨inria-00080814⟩
  • Teddy Furon, Pierre Duhamel. Copy protection of distributed contents: an application of watermarking techniques. Friendly Exchanging throught the Net, Mar 2000, Bordeaux, France, France. ⟨inria-00083343⟩
  • Teddy Furon, Nicolas Moreau, Pierre Duhamel. Audio asymmetric watermarking technique. Int. Conf. on Audio, Speech and Signal Processing, IEEE, Jun 2000, Istanbul, Turkey. ⟨inria-00001126⟩
  • Teddy Furon, Pierre Duhamel. An Asymmetric Public Detection Watermarking Technique. third Int. Workshop on Information Hiding, Sep 1999, Dresden, Germany. pp.88-100. ⟨inria-00001125⟩

Book sections4 documents

  • Teddy Furon. Watermarking security. Information hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5. ⟨hal-01275880⟩
  • Teddy Furon. Chapitre V: Les mesures techniques de protection - Une brève introduction. Daniel Le Métayer. Les technologies de l'information au service des droits : opportunités, défis, limites, 32, Bruylant, pp.85-90, 2010, Cahiers du Centre de recherches informatique et droit, 978-2-8027-2960-0. ⟨inria-00538241⟩
  • Teddy Furon, François Cayre, Caroline Fontaine. Watermarking Security. Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9. ⟨inria-00580838⟩
  • Teddy Furon. Tatouage asymétrique. F. Davoine et S. Pateux. Tatouage de documents audiovisuels numériques, Hermès Science, pp.215--227, 2004, Traité IC2 Information-Commande-Communication, série Traitement du Signal et de l'Image, ISBN-2-7462-0816-4. ⟨inria-00083368⟩

Directions of work or proceedings2 documents

  • Teddy Furon, Carmela Troncoso. Proceedings of IEEE Workshop on Information Forensics and Security, WIFS 2017. Teddy Furon; Carmela Troncoso. Dec 2017, Rennes, France. 2017. ⟨hal-01842021⟩
  • Teddy Furon, Gwenaël Doërr, Patrick Bas, François Cayre. Proceedings of the 9th Information Hiding Workshop. Teddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. 4567, Springer Verlag, pp.1--391, 2007. ⟨inria-00504303⟩

Other publications1 document