Accéder directement au contenu

Teddy Furon

142
Documents

Publications

Image document

FBI: Fingerprinting models with Benign Inputs

Thibault Maho , Teddy Furon , Erwan Le Merrer
IEEE Transactions on Information Forensics and Security, 2023, pp.1-18. ⟨10.1109/tifs.2023.3301268⟩
Article dans une revue hal-04176514v1
Image document

Generating Adversarial Images in Quantized Domains

Benoit Bonnet , Teddy Furon , Patrick Bas
IEEE Transactions on Information Forensics and Security, inPress, ⟨10.1109/TIFS.2021.3138616⟩
Article dans une revue hal-03467692v2
Image document

Rennes - une IA souveraine au service de la vie publique

Guillaume Gravier , Elisa Fromont , Nicolas Courty , Teddy Furon , Christine Guillemot
Bulletin de l'Association Française pour l'Intelligence Artificielle, 2021
Article dans une revue hal-03313161v1
Image document

Smooth adversarial examples

Hanwei Zhang , Yannis Avrithis , Teddy Furon , Laurent Amsaleg
EURASIP Journal on Information Security, 2020, 2020 (1), ⟨10.1186/s13635-020-00112-z⟩
Article dans une revue hal-03017171v1
Image document

Are Classification Deep Neural Networks Good for Blind Image Watermarking?

Vedran Vukotić , Vivien Chappelier , Teddy Furon
Entropy, 2020, 22 (2), pp.198. ⟨10.3390/e22020198⟩
Article dans une revue hal-04126160v1
Image document

High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence

Laurent Amsaleg , James Bailey , Amelie Barbe , Sarah Erfani , Teddy Furon
IEEE Transactions on Information Forensics and Security, 2020, 16, pp.1-12. ⟨10.1109/TIFS.2020.3023274⟩
Article dans une revue hal-02938099v2
Image document

Walking on the Edge: Fast, Low-Distortion Adversarial Examples

Hanwei Zhang , Yannis Avrithis , Teddy Furon , Laurent Amsaleg
IEEE Transactions on Information Forensics and Security, 2020, 16, pp.701 - 713. ⟨10.1109/TIFS.2020.3021899⟩
Article dans une revue hal-02931493v1

Extreme-value-theoretic estimation of local intrinsic dimensionality

Laurent Amsaleg , Oussama Chelly , Teddy Furon , Stéphane Girard , Michael E Houle
Data Mining and Knowledge Discovery, 2018, 32 (6), pp.1768-1805. ⟨10.1007/s10618-018-0578-6⟩
Article dans une revue hal-01864580v1
Image document

Memory vectors for similarity search in high-dimensional spaces

Ahmet Iscen , Teddy Furon , Vincent Gripon , Michael Rabbat , Hervé Jégou
IEEE Transactions on Big Data, 2017, 4 (1), pp.65 - 77. ⟨10.1109/TBDATA.2017.2677964⟩
Article dans une revue hal-01481220v1
Image document

Privacy-Preserving Outsourced Media Search

Li Weng , Laurent Amsaleg , Teddy Furon
IEEE Transactions on Knowledge and Data Engineering, 2016, 28 (10), ⟨10.1109/TKDE.2016.2587258⟩
Article dans une revue hal-01391444v1
Image document

Rotation and translation covariant match kernels for image retrieval

Giorgos Tolias , Andrei Bursuc , Teddy Furon , Hervé Jégou
Computer Vision and Image Understanding, 2015, pp.15. ⟨10.1016/j.cviu.2015.06.007⟩
Article dans une revue hal-01168525v1
Image document

A New Measure of Watermarking Security: The Effective Key Length

Patrick Bas , Teddy Furon
IEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue hal-00836404v1
Image document

Sequential Monte Carlo for rare event estimation

Frédéric Cérou , Pierre del Moral , Teddy Furon , Arnaud Guyader
Statistics and Computing, 2012, 22 (3), pp.795-908. ⟨10.1007/s11222-011-9231-6⟩
Article dans une revue inria-00584352v1
Image document

Towards practical joint decoding of binary Tardos fingerprinting codes

Peter Meerwald , Teddy Furon
IEEE Transactions on Information Forensics and Security, 2012, 7 (4), pp.1168-1180. ⟨10.1109/TIFS.2012.2195655⟩
Article dans une revue hal-00740964v1

Tracing pirated content on the Internet: Unwinding Ariadne's thread

Teddy Furon , Gwenaël Doërr
IEEE Security and Privacy Magazine, 2010, 8 (5), pp.69-71
Article dans une revue inria-00505851v1

Décodage EM du code de Tardos pour le fingerprinting

Ana Charpentier , Caroline Fontaine , Teddy Furon
Traitement du Signal, 2010, 27 (2), pp.127 - 147. ⟨10.3166/ts.27.127-146⟩
Article dans une revue hal-00704157v1
Image document

Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes

Frédéric Cérou , Teddy Furon , Arnaud Guyader
EURASIP Journal on Information Security, 2008, 2008 (1), pp.414962
Article dans une revue hal-00784458v2
Image document

Broken Arrows

Teddy Furon , Patrick Bas
EURASIP Journal on Information Security, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩
Article dans une revue hal-00335311v1
Image document

A constructive and unifying framework for zero-bit watermarking

Teddy Furon
IEEE Transactions on Information Forensics and Security, 2007, 2 (2), pp.149-163. ⟨10.1109/TIFS.2007.897272⟩
Article dans une revue inria-00078445v2
Image document

Security of Lattice-Based Data Hiding Against the Known Message Attack

Luis Pérez-Freire , Fernando Perez-Gonzalez , Teddy Furon , Pedro Comesana
IEEE Transactions on Information Forensics and Security, 2006, 1 (4), pp.421-439
Article dans une revue inria-00580872v1

La stéganographie moderne

Gaëtan Le Guelvouit , Teddy Furon
MISC : multi-system & internet security cookbook, 2005, mars
Article dans une revue inria-00580880v1
Image document

Watermarking security: theory and practice

Teddy Furon , François Cayre , Caroline Fontaine
IEEE Transactions on Signal Processing, 2005, Supplement on secure media III, 53 (10), pp.3976-3987
Article dans une revue inria-00088006v1
Image document

Towards Digital Rights and Exemptions Management Systems

Thierry Maillard , Teddy Furon
Computer Law and Security Review, 2004, 20 (4), pp.281--287
Article dans une revue inria-00083204v1
Image document

SmartRight: A Copy Protection System for Digital Home Networks

Jean-Pierre Andreaux , Alain Durand , Teddy Furon , Eric Diehl
IEEE Signal Processing Magazine, 2004, 21 (2), pp.100--108
Article dans une revue inria-00083200v1
Image document

An Asymmetric Watermarking Method

Teddy Furon , Pierre Duhamel
IEEE Transactions on Signal Processing, 2003, 51 (4), pp.981-995
Article dans une revue inria-00080829v1
Image document

A general framework for robust watermarking security

Mauro Barni , Franco Bartolini , Teddy Furon
Signal Processing, 2003, 83 (10), pp.2069-2084
Article dans une revue inria-00080835v1
Image document

Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copie

Teddy Furon , Pierre Duhamel
Traitement du Signal, 2001, 18 (4)
Article dans une revue inria-00083354v1
Image document

Functional invariants to watermark large transformers

Pierre Fernandez , Guillaume Couairon , Teddy Furon , Matthijs Douze
ICASSP 2024 - IEEE International Conference on Acoustics, Speech and Signal Processing, Apr 2024, Seoul, South Korea. pp.1-5
Communication dans un congrès hal-04361026v1
Image document

REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event Simulation

Quentin Le Roux , Kassem Kallas , Teddy Furon
SaTML 2024 - 2nd IEEE Conference on Secure and Trustworthy Machine Learning, Apr 2024, Toronto, Canada. pp.1-22
Communication dans un congrès hal-04485197v1
Image document

Mixer: DNN Watermarking using Image Mixup

Kassem Kallas , Teddy Furon
ICASSP 2023 - IEEE International Conference on Acoustics, Speech and Signal Processing, Jun 2023, Ialyssos, Greece. pp.1-4, ⟨10.1109/icassp49357.2023.10095332⟩
Communication dans un congrès hal-04112866v1
Image document

How to choose your best allies for a transferable attack?

Thibault Maho , Seyed-Mohsen Moosavi-Dezfooli , Teddy Furon
ICCV 2023 - International Conference on Computer Vision, Oct 2023, Paris, France. pp.1-13
Communication dans un congrès hal-04395797v1
Image document

Model Fingerprinting with Benign Inputs

Thibault Maho , Teddy Furon , Erwan Le Merrer
ICASSP 2023 - IEEE International Conference on Acoustics, Speech and Signal Processing, Jun 2023, Ialyssos, Greece. pp.1-4, ⟨10.1109/ICASSP49357.2023.10094751⟩
Communication dans un congrès hal-04112859v1
Image document

Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'Information

Patrick Bas , Gwenael Doerr , Teddy Furon , William Puech
GRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images, Aug 2023, Grenoble, France. pp.1-4
Communication dans un congrès hal-04149340v1
Image document

Three bricks to consolidate watermarks for large language models

Pierre Fernandez , Antoine Chaffin , Karim Tit , Vivien Chappelier , Teddy Furon
WIFS 2023 - IEEE International Workshop on Information Forensics and Security, Dec 2023, Nuremberg, Germany. pp.1-9
Communication dans un congrès hal-04361015v1
Image document

Gradient-Informed Neural Network Statistical Robustness Estimation

Karim Tit , Teddy Furon , Mathias Rousset
AISTATS 2023 - 26th International Conference on Artificial Intelligence and Statistics, Apr 2023, Valencia, Spain
Communication dans un congrès hal-03987284v1
Image document

Active image indexing

Pierre Fernandez , Matthijs Douze , Hervé Jégou , Teddy Furon
ICLR 2023 - 11th International Conference on Learning Representation, May 2023, Kigali, Rwanda. pp.1-20
Communication dans un congrès hal-03987326v1
Image document

The Stable Signature: Rooting Watermarks in Latent Diffusion Models

Pierre Fernandez , Guillaume Couairon , Hervé Jégou , Matthijs Douze , Teddy Furon
ICCV 2023 - International Conference on Computer Vision, Oct 2023, Paris, France
Communication dans un congrès hal-04176523v1
Image document

Watermarking Images in Self-Supervised Latent Spaces

Pierre Fernandez , Alexandre Sablayrolles , Teddy Furon , Hervé Jégou , Matthijs Douze
ICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, May 2022, Singapore, Singapore. pp.1-5
Communication dans un congrès hal-03591396v1
Image document

Randomized Smoothing under Attack: How Good is it in Pratice?

Thibault Maho , Teddy Furon , Erwan Le Merrer
ICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, May 2022, Singapore, Singapore. pp.1-5
Communication dans un congrès hal-03591421v1
Image document

Empreinte de réseaux avec des entrées authentiques

Thibault Maho , Teddy Furon , Erwan Le Merrer
CAID 2022 - Conference on Artificial Intelligence for Defense, DGA Maîtrise de l'Information, Nov 2022, Rennes, France
Communication dans un congrès hal-03879849v1
Image document

Tatouage Numérique d'Images dans l'Espace Latent de Réseaux Auto-Supervisés

Pierre Fernandez , Alexandre Sablayrolles , Teddy Furon , Hervé Jégou , Matthijs Douze
GRETSI 2022 - Colloque Francophone de Traitement du Signal et des Images, Sep 2022, Nancy, France. pp.1-4
Communication dans un congrès hal-03696016v1
Image document

Adversarial images with downscaling

Teddy Furon , Benoit Bonnet , Patrick Bas
ICIP 2022 - 29th IEEE International Conference on Image Processing, Oct 2022, Bordeaux, France. pp.1-5
Communication dans un congrès hal-03806425v1
Image document

RoSe: A RObust and SEcure Black-Box DNN Watermarking

Kassem Kallas , Teddy Furon
WIFS 2022 - IEEE 14th International Workshop on Information Forensics and Security, Dec 2022, Shanghai, China. pp.1-5
Communication dans un congrès hal-03806393v1
Image document

Efficient Statistical Assessment of Neural Network Corruption Robustness

Karim Tit , Teddy Furon , Mathias Rousset
NeurIPS 2021 - 35th Conference on Neural Information Processing Systems, Dec 2021, Sydney (virtual), Australia
Communication dans un congrès hal-03407011v2
Image document

Évaluation statistique efficace de la robustesse de classifieurs

Karim Tit , Teddy Furon , Mathias Rousset , Louis-Marie Traonouez
CAID 2021 - Conference on Artificial Intelligence for Defense, DGA, DGNUM, Ministère des Armées, Nov 2021, Rennes, France. pp.1-11
Communication dans un congrès hal-03462156v1

SurFree: a fast surrogate-free black-box attack

Thibault Maho , Teddy Furon , Erwan Le Merrer
CVPR 2021 - Conference on Computer Vision and Pattern Recognition, Jun 2021, Virtual, France. pp.10430--10439
Communication dans un congrès hal-03177639v1
Image document

Forensics Through Stega Glasses: the Case of Adversarial Images

Benoît Bonnet , Teddy Furon , Patrick Bas
ICPR-MMForWILD 2020 - Workshop MultiMedia FORensics in the WILD, Jan 2021, Milan, Italy. pp.1-17
Communication dans un congrès hal-03047954v1
Image document

Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks

Hanwei Zhang , Yannis Avrithis , Teddy Furon , Laurent Amsaleg
Trustworthy AI 2021 - 1st International Workshop on Trustworthy AI for Multimedia Computing, Oct 2021, Virtual, China. pp.1-10, ⟨10.1145/3475731.3484955⟩
Communication dans un congrès hal-03363999v1
Image document

Fooling an Automatic Image Quality Estimator

Benoit Bonnet , Teddy Furon , Patrick Bas
MediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès hal-03132891v1
Image document

Defending Adversarial Examples via DNN Bottleneck Reinforcement

Wenqing Liu , Miaojing Shi , Teddy Furon , Li Li
ACM Multimedia Conference 2020, Oct 2020, Seattle, United States. pp.1930-1938, ⟨10.1145/3394171.3413825⟩
Communication dans un congrès hal-02912189v1
Image document

What if Adversarial Samples were Digital Images?

Benoît Bonnet , Teddy Furon , Patrick Bas
IH&MMSEC 2020 - 8th ACM Workshop on Information Hiding and Multimedia Security, Jun 2020, Denver, France. pp.1-11, ⟨10.1145/3369412.3395062⟩
Communication dans un congrès hal-02553006v2
Image document

Joint Learning of Assignment and Representation for Biometric Group Membership

Marzieh Gheisari , Teddy Furon , Laurent Amsaleg
ICASSP 2020 - 45th International Conference on Acoustics, Speech, and Signal Processing, May 2020, Barcelona, Spain
Communication dans un congrès hal-02490005v1
Image document

Et si les images adverses étaient des images ?

Teddy Furon , Benoit Bonnet , Patrick Bas
Actes de la conférence CAID 2020, Nov 2020, Rennes, France
Communication dans un congrès hal-03619035v1
Image document

Privacy Preserving Group Membership Verification and Identification

Marzieh Gheisari , Teddy Furon , Laurent Amsaleg
CVPR 2019 - IEEE Conference on Computer Vision and Pattern Recognition, Jun 2019, Long Beach, United States. pp.1-9
Communication dans un congrès hal-02107442v1
Image document

Aggregation and embedding for group membership verification

Marzieh Gheisari , Teddy Furon , Laurent Amsaleg , Behrooz Razeghi , Slava Voloshynovskiy
ICASSP 2019 - IEEE International Conference on Acoustics, Speech and Signal Processing, May 2019, Brighton, United Kingdom. pp.2592-2596, ⟨10.1109/ICASSP.2019.8682422⟩
Communication dans un congrès hal-02091036v3
Image document

Watermarking error exponents in the presence of noise: The case of the dual hypercone detector

Teddy Furon
IH&MMSEC'19 - 7th ACM Workshop on Information Hiding and Multimedia Security, Jul 2019, Paris, France. pp.173-181, ⟨10.1145/3335203.3335731⟩
Communication dans un congrès hal-02122206v1
Image document

Group Membership Verification with Privacy: Sparse or Dense?

Marzieh Gheisari , Teddy Furon , Laurent Amsaleg
WIFS 2019 - IEEE International Workshop on Information Forensics and Security, Dec 2019, Delft, Netherlands. pp.1-6
Communication dans un congrès hal-02489991v2
Image document

Fast Spectral Ranking for Similarity Search

Ahmet Iscen , Yannis Avrithis , Giorgos Tolias , Teddy Furon , Ondřej Chum
CVPR 2018 - IEEE Computer Vision and Pattern Recognition Conference, Jun 2018, Salt Lake City, United States. pp.1-10
Communication dans un congrès hal-01839744v1
Image document

Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking

Ahmet Iscen , Yannis Avrithis , Giorgos Tolias , Teddy Furon , Ondřej Chum
ACCV 2018 - Asian Conference on Computer Vision, Dec 2018, Perth, Australia. pp.1-16
Communication dans un congrès hal-01909348v2
Image document

Are Deep Neural Networks good for blind image watermarking?

Vedran Vukotić , Vivien Chappelier , Teddy Furon
WIFS 2018 - International Workshop on Information Forensics and Security, Dec 2018, Hong-Kong, China. pp.1-7
Communication dans un congrès hal-01936750v1
Image document

Automatic discovery of discriminative parts as a quadratic assignment problem

Ronan Sicre , Julien Rabin , Yannis Avrithis , Teddy Furon , Frédéric Jurie
ICCV Workshops -- CEFRL, Oct 2017, Venise, Italy. pp.1059-1068
Communication dans un congrès hal-01623148v1
Image document

Complex Document Classification and Localization Application on Identity Document Images

Ahmad-Montaser A.M. Awal , Nabil Ghanmi , Ronan Sicre , Teddy Furon
ICDAR 2017 - The 14th IAPR International Conference on Document Analysis and Recognition, Nov 2017, Kyoto, Japan. pp.1-6
Communication dans un congrès hal-01660504v1
Image document

Identity documents classification as an image classification problem

Ronan Sicre , Ahmad Montaser Awal , Teddy Furon
ICIAP 2017 - 19th International Conference on Image Analysis and Processing, Sep 2017, Catania, Italy. pp.602-613, ⟨10.1007/978-3-319-68548-9_55⟩
Communication dans un congrès hal-01660500v1
Image document

Panorama to panorama matching for location recognition

Ahmet Iscen , Giorgos Tolias , Yannis Avrithis , Teddy Furon , Ondřej Chum
ACM International Conference on Multimedia Retrieval (ICMR) 2017, Jun 2017, Bucharest, Romania. ⟨10.1145/3078971.3079033⟩
Communication dans un congrès hal-01511793v1
Image document

About zero bit watermarking error exponents

Teddy Furon
ICASSP2017 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2017, New Orleans, United States
Communication dans un congrès hal-01512705v1
Image document

Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations

Ahmet Iscen , Giorgos Tolias , Yannis Avrithis , Teddy Furon , Ondřej Chum
2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017, Honolulu, United States
Communication dans un congrès hal-01505470v1

Sketching techniques for very large matrix factorization

Raghavendran Balu , Teddy Furon , Laurent Amsaleg
ECIR 2016 - 38th European Conference on Information Retrieval , 2016, Padoue, Italy
Communication dans un congrès hal-01249621v1
Image document

Group Testing for Identification with Privacy

Ahmet Iscen , Teddy Furon
ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain
Communication dans un congrès hal-01309032v2
Image document

Efficient Large-Scale Similarity Search Using Matrix Factorization

Ahmet Iscen , Michael Rabbat , Teddy Furon
2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jun 2016, Las Vegas, United States
Communication dans un congrès hal-01294736v1
Image document

Scaling Group Testing Similarity Search

Ahmet Iscen , Laurent Amsaleg , Teddy Furon
ACM International Conference on Multimedia Retrieval 2016 , Jun 2016, New York, United States. ⟨10.1145/2911996.2912010⟩
Communication dans un congrès hal-01304287v1
Image document

Differentially Private Matrix Factorization using Sketching Techniques

Raghavendran Balu , Teddy Furon
ACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain. ⟨10.1145/2909827.2930793⟩
Communication dans un congrès hal-01317596v1

Estimating Local Intrinsic Dimensionality

Laurent Amsaleg , Oussama Chelly , Teddy Furon , Stéphane Girard , Michael E. Houle
21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'15, ACM, Aug 2015, Sidney, Australia. pp.29-38 ⟨10.1145/2783258.2783405⟩
Communication dans un congrès hal-01159217v1
Image document

Beyond "project and sign" for cosine estimation with binary codes

Raghavendran Balu , Teddy Furon , Hervé Jégou
ICASPP - International Conference on Acoustics, Speech, and Signal Processing, IEEE, May 2014, Florence, Italy
Communication dans un congrès hal-00942075v1
Image document

Challenging differential privacy: the case of non-interactive mechanisms

Raghavendran Balu , Teddy Furon , Sébastien Gambs
European Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩
Communication dans un congrès hal-01011346v1
Image document

Tardos codes for real

Teddy Furon , Mathieu Desoubeaux
IEEE Workshop on Information Forensics and Security, Yan Lindsay Sun and Vicky H. Zhao, Dec 2014, Atlanta, United States. pp.7
Communication dans un congrès hal-01066043v1
Image document

Instance classification with prototype selection

Josip Krapac , Florent Perronnin , Teddy Furon , Hervé Jégou
ICMR - ACM International Conference on Multimedia Retrieval, Apr 2014, Glasgow, United Kingdom
Communication dans un congrès hal-00942275v1
Image document

Puzzling Face Verification Algorithms for Privacy Protection

Binod Bhattarai , Alexis Mignon , Frédéric Jurie , Teddy Furon
IEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States
Communication dans un congrès hal-01066070v1
Image document

Orientation covariant aggregation of local descriptors with embeddings

Giorgos Tolias , Teddy Furon , Hervé Jégou
European Conference on Computer Vision, Sep 2014, Zurich, Switzerland
Communication dans un congrès hal-01020823v3
Image document

A Group Testing Framework for Similarity Search in High-dimensional Spaces

Miaojing Shi , Teddy Furon , Hervé Jégou
ACM Multimedia, Nov 2014, Orlando, United States. ⟨10.1145/2647868.2654895⟩
Communication dans un congrès hal-01062531v3
Image document

Fast and secure similarity search in high dimensional space

Teddy Furon , Hervé Jégou , Laurent Amsaleg , Benjamin Mathon
IEEE International Workshop on Information Forensics and Security, 2013, Guangzhou, China
Communication dans un congrès hal-00857570v1
Image document

Recherche approximative de plus proches voisins efficace et sûre

Benjamin Mathon , Teddy Furon , Laurent Amsaleg , Julien Bringer
GRETSI, Sep 2013, Brest, France. pp.ID238
Communication dans un congrès hal-00823879v2
Image document

Secure and Efficient Approximate Nearest Neighbors Search

Benjamin Mathon , Teddy Furon , Laurent Amsaleg , Julien Bringer
1st ACM Workshop on Information Hiding and Multimedia Security, Jun 2013, Montpellier, France. pp.175--180, ⟨10.1145/2482513.2482539⟩
Communication dans un congrès hal-00817336v2
Image document

Are 128 Bits Long Keys Possible in Watermarking?

Patrick Bas , Teddy Furon
13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès hal-01540890v1
Image document

Practical Key Length of Watermarking Systems

Patrick Bas , Teddy Furon , François Cayre
ICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès hal-00686813v1
Image document

Security-Oriented Picture-In-Picture Visual Modifications

Thanh-Toan Do , Laurent Amsaleg , Ewa Kijak , Teddy Furon
ICMR - ACM International Conference on Multimedia Retrieval, Jun 2012, Hong-Kong, China
Communication dans un congrès hal-00764431v1
Image document

Anti-sparse coding for approximate nearest neighbor search

Hervé Jégou , Teddy Furon , Jean-Jacques Fuchs
ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès hal-00661591v1
Image document

Key Length Estimation of Zero-Bit Watermarking Schemes

Patrick Bas , Teddy Furon
EUSIPCO - 20th European Signal Processing Conference, Aug 2012, Romania. pp.TBA
Communication dans un congrès hal-00728159v1
Image document

A New Measure of Watermarking Security Applied on DC-DM QIM

Teddy Furon , Patrick Bas
IH - Information Hiding, May 2012, Berkeley, United States. pp.TBA
Communication dans un congrès hal-00702689v2
Image document

Decoding Fingerprinting Using the Markov Chain Monte Carlo Method

Teddy Furon , Arnaud Guyader , Frédéric Cérou
WIFS - IEEE Workshop on Information Forensics and Security, Dec 2012, Tenerife, Spain
Communication dans un congrès hal-00757152v1
Image document

Enlarging hacker's toolbox: deluding image recognition by attacking keypoint orientations

Thanh-Toan Do , Ewa Kijak , Laurent Amsaleg , Teddy Furon
ICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès hal-00686809v1
Image document

Group testing meets traitor tracing

Peter Meerwald , Teddy Furon
ICASSP, May 2011, Prague, Czech Republic. ⟨10.1109/ICASSP.2011.5947280⟩
Communication dans un congrès inria-00580899v1
Image document

An Asymmetric Fingerprinting Scheme based on Tardos Codes

Ana Charpentier , Caroline Fontaine , Teddy Furon , Ingemar Cox
IH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. ⟨10.1007/978-3-642-24178-9_4⟩
Communication dans un congrès inria-00581156v2

Iterative single Tardos decoder with controlled probability of false positive

Peter Meerwald , Teddy Furon
International Conference on Multimedia and Expo, Jul 2011, Barcelona, Spain
Communication dans un congrès inria-00581159v1
Image document

Towards Joint Tardos Decoding: The 'Don~Quixote' Algorithm

Peter Meerwald , Teddy Furon
Information Hiding, May 2011, Prague, Czech Republic. pp.28-42, ⟨10.1007/978-3-642-24178-9_3⟩
Communication dans un congrès hal-01057832v1
Image document

Towards Robust and Secure Watermarking

Fuchun Xie , Teddy Furon , Caroline Fontaine
ACM Multimedia and Security, Sep 2010, Roma, Italy
Communication dans un congrès inria-00505849v1
Image document

Challenging the Security of Content Based Image Retrieval Systems

Thanh-Toan Do , Ewa Kijak , Teddy Furon , Laurent Amsaleg
MMSP - EEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. ⟨10.1109/MMSP.2010.5661993⟩
Communication dans un congrès inria-00505846v1

Better security levels for "Broken Arrows"

Fuchun Xie , Teddy Furon , Caroline Fontaine
Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States
Communication dans un congrès hal-00472982v1
Image document

Deluding Image Recognition in SIFT-based CBIR Systems

Thanh-Toan Do , Ewa Kijak , Teddy Furon , Laurent Amsaleg
ACM Multimedia in Forensics, Security and Intelligence, ACM, Oct 2010, Firenze, Italy
Communication dans un congrès inria-00505845v1
Image document

Understanding the Security and Robustness of SIFT

Thanh-Toan Do , Ewa Kijak , Teddy Furon , Laurent Amsaleg
ACM Multimedia, Oct 2010, Firenze, Italy
Communication dans un congrès inria-00505843v1
Image document

Décodage EM du code de Tardos pour le fingerprinting

Ana Charpentier , Caroline Fontaine , Teddy Furon
Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès inria-00504522v1
Image document

Le traçage de traîtres

Teddy Furon
Symposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2009, Rennes, France
Communication dans un congrès inria-00505885v1
Image document

ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUE

Teddy Furon , Cyrille Jégourel , Arnaud Guyader , Frédéric Cérou
IEEE International Conference on Digital Signal Processing, Jul 2009, Santorini, Greece
Communication dans un congrès inria-00505877v1
Image document

BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES

Luis Pérez-Freire , Teddy Furon
IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom
Communication dans un congrès inria-00505890v1
Image document

WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODES

Teddy Furon , Luis Pérez-Freire
IEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom
Communication dans un congrès inria-00505886v1
Image document

Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows "

Fuchun Xie , Caroline Fontaine , Teddy Furon
Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès inria-00504591v1
Image document

Estimating the minimal length of Tardos code

Teddy Furon , Luis Pérez-Freire , Arnaud Guyader , Frédéric Cérou
Information Hiding, Jun 2009, Darmstadt, Germany
Communication dans un congrès inria-00505882v1
Image document

Expectation Maximisation decoding of Tardos probabilistic fingerprinting code

Ana Charpentier , Fuchun Xie , Caroline Fontaine , Teddy Furon
IS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States
Communication dans un congrès inria-00504523v1
Image document

EM Decoding of Tardos Traitor Tracing Codes

Teddy Furon , Luis Pérez-Freire
ACM Multimedia and Security, Sep 2009, Princeton, United States
Communication dans un congrès inria-00505875v1
Image document

Les Mesures Techniques de Protection... autrement dit les DRM

Teddy Furon
Colloque PRIAM, Nov 2008, Grenoble, France
Communication dans un congrès inria-00505909v1
Image document

On the design and optimisation of Tardos probabilistic fingerprinting codes

Teddy Furon , Arnaud Guyader , Frédéric Cérou
Proc. of the 10th Information Hiding Workshop, 2008, Santa Barbara, United States
Communication dans un congrès inria-00504549v1
Image document

Rare event simulation for a static distribution

Frédéric Cérou , Pierre del Moral , Teddy Furon , Arnaud Guyader
International Workshop on Rare Event Simulation, Oct 2008, Rennes, France
Communication dans un congrès inria-00505919v1
Image document

On-Off Keying Modulation and Tardos Fingerprinting

Fuchun Xie , Teddy Furon , Caroline Fontaine
Proc. ACM Multimedia and Security, ACM, 2008, Oxford, United Kingdom
Communication dans un congrès inria-00504606v1

The good, the bad and the ugly: three different approaches to break their watermarking system

Gaëtan Le Guelvouit , Teddy Furon , François Cayre
SPIE 2007 - Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents IX, Jan 2007, San Jose, United States. pp.6, ⟨10.1117/12.703968⟩
Communication dans un congrès hal-00158014v1
Image document

Some theoretical aspects of watermarking detection

Teddy Furon , Julie Josse , Sandrine Le Squin
Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, Jan 2006, San Jose, CA, USA, United States
Communication dans un congrès inria-00083370v1
Image document

Hermite Polynomials as Provably Good Functions to Watermark White Gaussian Hosts

Teddy Furon
Proc. ACM Multimedia and Security, ACM, 2006, Geneva, Switzerland
Communication dans un congrès inria-00504548v1

On achievable security levels for lattice data hiding in the known message attack

Luis Pérez-Freire , Fernando Perez-Gonzalez , Teddy Furon
ACM Multimedia and Security, Sep 2006, Geneva, Switzerland
Communication dans un congrès inria-00580885v1
Image document

Watermarking is not cryptography

Ingemar Cox , Gwenaël Doërr , Teddy Furon
Proc. Int. Work. on Digital Watermarking, inivited talk, 2006, Jeju island, South Korea
Communication dans un congrès inria-00504528v1

A theoretical study of watermarking security

François Cayre , Caroline Fontaine , Teddy Furon
ISIT 2005, 2005, pp.1868-1872
Communication dans un congrès hal-00158005v1
Image document

Watermarking security part II: practice

François Cayre , Caroline Fontaine , Teddy Furon
Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767
Communication dans un congrès inria-00083335v1
Image document

A survey of watermarking security

Teddy Furon
International Workshop on Digital Watermarking, 2005, Siena, Italy, pp.201--215
Communication dans un congrès inria-00083319v1
Image document

Watermarking security part I: theory

François Cayre , Caroline Fontaine , Teddy Furon
Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757
Communication dans un congrès inria-00083329v1
Image document

Watermarking attack: security of WSS techniques

François Cayre , Caroline Fontaine , Teddy Furon
International Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183
Communication dans un congrès inria-00083194v1

Application of Side-Informed Embedding and Polynomial Detection to Audio Watermarking

Mark Mullarkey , Neil Hurley , Guénolé Silvestre , Teddy Furon
Int. Conf. on Multimedia and Expo, IEEE, Jul 2003, Baltimore, MY, USA, United States
Communication dans un congrès inria-00083363v1
Image document

Robustness of an asymmetric technique

Teddy Furon , Pierre Duhamel
IEEE Int. Conf. on Image Processing, IEEE, Sep 2003, Vancouver, Canada
Communication dans un congrès inria-00080811v1

Robustness and efficiency of non-linear side-informed watermarking

Guénolé Silvestre , Neil Hurley , Teddy Furon
Information Hiding Workshop, Oct 2002, Noordwijkerhout, The Netherlands, Netherlands. pp.106--118
Communication dans un congrès inria-00083358v1
Image document

Improved Polynomial Detectors for Side-Informed Watermarking

Jonathan Delhumeau , Teddy Furon , Guénolé Silvestre , Neil Hurley
Security and Watermarking of Multimedia Contents IV, SPIE, Jan 2002, San José, CA, USA, United States. pp.311-321
Communication dans un congrès inria-00080827v1

Watermark detector based on Nth order statistics

Teddy Furon , Guénolé Silvestre , Neil Hurley
SPIE conference, Jul 2002, Seattle, United States
Communication dans un congrès inria-00580891v1
Image document

Applied public-key steganography

Pierre Guillon , Teddy Furon , Pierre Duhamel
Security and Watermarking of Multimedia Contents IV, SPIE, 2002, San Jose, CA, United States
Communication dans un congrès inria-00080818v1
Image document

JANIS: Just Another N-order side-Informed watermarking Scheme

Teddy Furon , Benoît Macq , Guénolé Silvestre , Neil Hurley
IEEE International Conference on Image Processing, IEEE, 2002, Rochester, NY, United States. pp.153-156
Communication dans un congrès inria-00080826v1
Image document

An unified approach of asymmetric watermarking schemes

Teddy Furon , Ilaria Venturini , Pierre Duhamel
Security and Watermarking of Multimedia Contents III, SPIE, 2001, San Jose, CA, United States
Communication dans un congrès inria-00080814v1
Image document

Audio asymmetric watermarking technique

Teddy Furon , Nicolas Moreau , Pierre Duhamel
Int. Conf. on Audio, Speech and Signal Processing, IEEE, Jun 2000, Istanbul, Turkey
Communication dans un congrès inria-00001126v1

Copy protection of distributed contents: an application of watermarking techniques

Teddy Furon , Pierre Duhamel
Friendly Exchanging throught the Net, Mar 2000, Bordeaux, France, France
Communication dans un congrès inria-00083343v1
Image document

An Asymmetric Public Detection Watermarking Technique

Teddy Furon , Pierre Duhamel
third Int. Workshop on Information Hiding, Sep 1999, Dresden, Germany. pp.88-100
Communication dans un congrès inria-00001125v1

Traitor tracing

Teddy Furon
Multimedia security, 2022
Chapitre d'ouvrage hal-03886523v1

Deep Neural Network Attacks and Defense: The Case of Image Classification

Hanwei Zhang , Teddy Furon , Laurent Amsaleg , Yannis Avrithis
Multimedia Security 1, 1, Wiley, 2022, Multimedia Security 1: Authentication and Data Hiding, 9781789450262. ⟨10.1002/9781119901808.ch2⟩
Chapitre d'ouvrage hal-03852749v1

Traçage de traîtres

Teddy Furon
William Puech. Sécurité multimédia. Authentification et insertion de données cachées, 1, ISTE, pp.201-228, 2021, 978-1-78948-026-9
Chapitre d'ouvrage hal-03501336v1

Attaques et défenses de réseaux de neurones profonds : le cas de la classification d'images

Hanwei Zhang , Teddy Furon , Laurent Amsaleg , Yannis Avrithis
ISTE. Sécurité multimédia 1. Authentification et insertion de données cachées, 2021, 978-1-78949-026-8
Chapitre d'ouvrage hal-03430025v1
Image document

Watermarking security

Teddy Furon
Information hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5
Chapitre d'ouvrage hal-01275880v1

Chapitre V: Les mesures techniques de protection - Une brève introduction

Teddy Furon
Daniel Le Métayer. Les technologies de l'information au service des droits : opportunités, défis, limites, 32, Bruylant, pp.85-90, 2010, Cahiers du Centre de recherches informatique et droit, 978-2-8027-2960-0
Chapitre d'ouvrage inria-00538241v1

Watermarking Security

Teddy Furon , François Cayre , Caroline Fontaine
Nedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9
Chapitre d'ouvrage inria-00580838v1
Image document

Tatouage asymétrique

Teddy Furon
F. Davoine et S. Pateux. Tatouage de documents audiovisuels numériques, Hermès Science, pp.215--227, 2004, Traité IC2 Information-Commande-Communication, série Traitement du Signal et de l'Image, ISBN-2-7462-0816-4
Chapitre d'ouvrage inria-00083368v1