Teddy Furon
142
Documents
Publications
|
FBI: Fingerprinting models with Benign InputsIEEE Transactions on Information Forensics and Security, 2023, pp.1-18. ⟨10.1109/tifs.2023.3301268⟩
Article dans une revue
hal-04176514v1
|
|
Generating Adversarial Images in Quantized DomainsIEEE Transactions on Information Forensics and Security, inPress, ⟨10.1109/TIFS.2021.3138616⟩
Article dans une revue
hal-03467692v2
|
|
Rennes - une IA souveraine au service de la vie publiqueBulletin de l'Association Française pour l'Intelligence Artificielle, 2021
Article dans une revue
hal-03313161v1
|
|
Smooth adversarial examplesEURASIP Journal on Information Security, 2020, 2020 (1), ⟨10.1186/s13635-020-00112-z⟩
Article dans une revue
hal-03017171v1
|
|
Are Classification Deep Neural Networks Good for Blind Image Watermarking?Entropy, 2020, 22 (2), pp.198. ⟨10.3390/e22020198⟩
Article dans une revue
hal-04126160v1
|
|
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical EvidenceIEEE Transactions on Information Forensics and Security, 2020, 16, pp.1-12. ⟨10.1109/TIFS.2020.3023274⟩
Article dans une revue
hal-02938099v2
|
|
Walking on the Edge: Fast, Low-Distortion Adversarial ExamplesIEEE Transactions on Information Forensics and Security, 2020, 16, pp.701 - 713. ⟨10.1109/TIFS.2020.3021899⟩
Article dans une revue
hal-02931493v1
|
Extreme-value-theoretic estimation of local intrinsic dimensionalityData Mining and Knowledge Discovery, 2018, 32 (6), pp.1768-1805. ⟨10.1007/s10618-018-0578-6⟩
Article dans une revue
hal-01864580v1
|
|
|
Memory vectors for similarity search in high-dimensional spacesIEEE Transactions on Big Data, 2017, 4 (1), pp.65 - 77. ⟨10.1109/TBDATA.2017.2677964⟩
Article dans une revue
hal-01481220v1
|
|
Privacy-Preserving Outsourced Media SearchIEEE Transactions on Knowledge and Data Engineering, 2016, 28 (10), ⟨10.1109/TKDE.2016.2587258⟩
Article dans une revue
hal-01391444v1
|
|
Rotation and translation covariant match kernels for image retrievalComputer Vision and Image Understanding, 2015, pp.15. ⟨10.1016/j.cviu.2015.06.007⟩
Article dans une revue
hal-01168525v1
|
|
A New Measure of Watermarking Security: The Effective Key LengthIEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue
hal-00836404v1
|
|
Sequential Monte Carlo for rare event estimationStatistics and Computing, 2012, 22 (3), pp.795-908. ⟨10.1007/s11222-011-9231-6⟩
Article dans une revue
inria-00584352v1
|
|
Towards practical joint decoding of binary Tardos fingerprinting codesIEEE Transactions on Information Forensics and Security, 2012, 7 (4), pp.1168-1180. ⟨10.1109/TIFS.2012.2195655⟩
Article dans une revue
hal-00740964v1
|
Tracing pirated content on the Internet: Unwinding Ariadne's threadIEEE Security and Privacy Magazine, 2010, 8 (5), pp.69-71
Article dans une revue
inria-00505851v1
|
|
Décodage EM du code de Tardos pour le fingerprintingTraitement du Signal, 2010, 27 (2), pp.127 - 147. ⟨10.3166/ts.27.127-146⟩
Article dans une revue
hal-00704157v1
|
|
|
Experimental Assessment of the Reliability for Watermarking and Fingerprinting SchemesEURASIP Journal on Information Security, 2008, 2008 (1), pp.414962
Article dans une revue
hal-00784458v2
|
|
Broken ArrowsEURASIP Journal on Information Security, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩
Article dans une revue
hal-00335311v1
|
|
A constructive and unifying framework for zero-bit watermarkingIEEE Transactions on Information Forensics and Security, 2007, 2 (2), pp.149-163. ⟨10.1109/TIFS.2007.897272⟩
Article dans une revue
inria-00078445v2
|
|
Security of Lattice-Based Data Hiding Against the Known Message AttackIEEE Transactions on Information Forensics and Security, 2006, 1 (4), pp.421-439
Article dans une revue
inria-00580872v1
|
La stéganographie moderneMISC : multi-system & internet security cookbook, 2005, mars
Article dans une revue
inria-00580880v1
|
|
|
Watermarking security: theory and practiceIEEE Transactions on Signal Processing, 2005, Supplement on secure media III, 53 (10), pp.3976-3987
Article dans une revue
inria-00088006v1
|
|
Towards Digital Rights and Exemptions Management SystemsComputer Law and Security Review, 2004, 20 (4), pp.281--287
Article dans une revue
inria-00083204v1
|
|
SmartRight: A Copy Protection System for Digital Home NetworksIEEE Signal Processing Magazine, 2004, 21 (2), pp.100--108
Article dans une revue
inria-00083200v1
|
|
An Asymmetric Watermarking MethodIEEE Transactions on Signal Processing, 2003, 51 (4), pp.981-995
Article dans une revue
inria-00080829v1
|
|
A general framework for robust watermarking securitySignal Processing, 2003, 83 (10), pp.2069-2084
Article dans une revue
inria-00080835v1
|
|
Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copieTraitement du Signal, 2001, 18 (4)
Article dans une revue
inria-00083354v1
|
|
Functional invariants to watermark large transformersICASSP 2024 - IEEE International Conference on Acoustics, Speech and Signal Processing, Apr 2024, Seoul, South Korea. pp.1-5
Communication dans un congrès
hal-04361026v1
|
|
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event SimulationSaTML 2024 - 2nd IEEE Conference on Secure and Trustworthy Machine Learning, Apr 2024, Toronto, Canada. pp.1-22
Communication dans un congrès
hal-04485197v1
|
|
Mixer: DNN Watermarking using Image MixupICASSP 2023 - IEEE International Conference on Acoustics, Speech and Signal Processing, Jun 2023, Ialyssos, Greece. pp.1-4, ⟨10.1109/icassp49357.2023.10095332⟩
Communication dans un congrès
hal-04112866v1
|
|
How to choose your best allies for a transferable attack?ICCV 2023 - International Conference on Computer Vision, Oct 2023, Paris, France. pp.1-13
Communication dans un congrès
hal-04395797v1
|
|
Model Fingerprinting with Benign InputsICASSP 2023 - IEEE International Conference on Acoustics, Speech and Signal Processing, Jun 2023, Ialyssos, Greece. pp.1-4, ⟨10.1109/ICASSP49357.2023.10094751⟩
Communication dans un congrès
hal-04112859v1
|
|
Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'InformationGRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images, Aug 2023, Grenoble, France. pp.1-4
Communication dans un congrès
hal-04149340v1
|
|
Three bricks to consolidate watermarks for large language modelsWIFS 2023 - IEEE International Workshop on Information Forensics and Security, Dec 2023, Nuremberg, Germany. pp.1-9
Communication dans un congrès
hal-04361015v1
|
|
Gradient-Informed Neural Network Statistical Robustness EstimationAISTATS 2023 - 26th International Conference on Artificial Intelligence and Statistics, Apr 2023, Valencia, Spain
Communication dans un congrès
hal-03987284v1
|
|
Active image indexingICLR 2023 - 11th International Conference on Learning Representation, May 2023, Kigali, Rwanda. pp.1-20
Communication dans un congrès
hal-03987326v1
|
|
The Stable Signature: Rooting Watermarks in Latent Diffusion ModelsICCV 2023 - International Conference on Computer Vision, Oct 2023, Paris, France
Communication dans un congrès
hal-04176523v1
|
|
Watermarking Images in Self-Supervised Latent SpacesICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, May 2022, Singapore, Singapore. pp.1-5
Communication dans un congrès
hal-03591396v1
|
|
Randomized Smoothing under Attack: How Good is it in Pratice?ICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, May 2022, Singapore, Singapore. pp.1-5
Communication dans un congrès
hal-03591421v1
|
|
Empreinte de réseaux avec des entrées authentiquesCAID 2022 - Conference on Artificial Intelligence for Defense, DGA Maîtrise de l'Information, Nov 2022, Rennes, France
Communication dans un congrès
hal-03879849v1
|
|
Tatouage Numérique d'Images dans l'Espace Latent de Réseaux Auto-SupervisésGRETSI 2022 - Colloque Francophone de Traitement du Signal et des Images, Sep 2022, Nancy, France. pp.1-4
Communication dans un congrès
hal-03696016v1
|
|
Adversarial images with downscalingICIP 2022 - 29th IEEE International Conference on Image Processing, Oct 2022, Bordeaux, France. pp.1-5
Communication dans un congrès
hal-03806425v1
|
|
RoSe: A RObust and SEcure Black-Box DNN WatermarkingWIFS 2022 - IEEE 14th International Workshop on Information Forensics and Security, Dec 2022, Shanghai, China. pp.1-5
Communication dans un congrès
hal-03806393v1
|
|
Efficient Statistical Assessment of Neural Network Corruption RobustnessNeurIPS 2021 - 35th Conference on Neural Information Processing Systems, Dec 2021, Sydney (virtual), Australia
Communication dans un congrès
hal-03407011v2
|
|
Évaluation statistique efficace de la robustesse de classifieursCAID 2021 - Conference on Artificial Intelligence for Defense, DGA, DGNUM, Ministère des Armées, Nov 2021, Rennes, France. pp.1-11
Communication dans un congrès
hal-03462156v1
|
SurFree: a fast surrogate-free black-box attackCVPR 2021 - Conference on Computer Vision and Pattern Recognition, Jun 2021, Virtual, France. pp.10430--10439
Communication dans un congrès
hal-03177639v1
|
|
|
Forensics Through Stega Glasses: the Case of Adversarial ImagesICPR-MMForWILD 2020 - Workshop MultiMedia FORensics in the WILD, Jan 2021, Milan, Italy. pp.1-17
Communication dans un congrès
hal-03047954v1
|
|
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial AttacksTrustworthy AI 2021 - 1st International Workshop on Trustworthy AI for Multimedia Computing, Oct 2021, Virtual, China. pp.1-10, ⟨10.1145/3475731.3484955⟩
Communication dans un congrès
hal-03363999v1
|
|
Fooling an Automatic Image Quality EstimatorMediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès
hal-03132891v1
|
|
Defending Adversarial Examples via DNN Bottleneck ReinforcementACM Multimedia Conference 2020, Oct 2020, Seattle, United States. pp.1930-1938, ⟨10.1145/3394171.3413825⟩
Communication dans un congrès
hal-02912189v1
|
|
What if Adversarial Samples were Digital Images?IH&MMSEC 2020 - 8th ACM Workshop on Information Hiding and Multimedia Security, Jun 2020, Denver, France. pp.1-11, ⟨10.1145/3369412.3395062⟩
Communication dans un congrès
hal-02553006v2
|
|
Joint Learning of Assignment and Representation for Biometric Group MembershipICASSP 2020 - 45th International Conference on Acoustics, Speech, and Signal Processing, May 2020, Barcelona, Spain
Communication dans un congrès
hal-02490005v1
|
|
Et si les images adverses étaient des images ?Actes de la conférence CAID 2020, Nov 2020, Rennes, France
Communication dans un congrès
hal-03619035v1
|
|
Privacy Preserving Group Membership Verification and IdentificationCVPR 2019 - IEEE Conference on Computer Vision and Pattern Recognition, Jun 2019, Long Beach, United States. pp.1-9
Communication dans un congrès
hal-02107442v1
|
|
Aggregation and embedding for group membership verificationICASSP 2019 - IEEE International Conference on Acoustics, Speech and Signal Processing, May 2019, Brighton, United Kingdom. pp.2592-2596, ⟨10.1109/ICASSP.2019.8682422⟩
Communication dans un congrès
hal-02091036v3
|
|
Watermarking error exponents in the presence of noise: The case of the dual hypercone detectorIH&MMSEC'19 - 7th ACM Workshop on Information Hiding and Multimedia Security, Jul 2019, Paris, France. pp.173-181, ⟨10.1145/3335203.3335731⟩
Communication dans un congrès
hal-02122206v1
|
|
Group Membership Verification with Privacy: Sparse or Dense?WIFS 2019 - IEEE International Workshop on Information Forensics and Security, Dec 2019, Delft, Netherlands. pp.1-6
Communication dans un congrès
hal-02489991v2
|
|
Fast Spectral Ranking for Similarity SearchCVPR 2018 - IEEE Computer Vision and Pattern Recognition Conference, Jun 2018, Salt Lake City, United States. pp.1-10
Communication dans un congrès
hal-01839744v1
|
|
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold RankingACCV 2018 - Asian Conference on Computer Vision, Dec 2018, Perth, Australia. pp.1-16
Communication dans un congrès
hal-01909348v2
|
|
Are Deep Neural Networks good for blind image watermarking?WIFS 2018 - International Workshop on Information Forensics and Security, Dec 2018, Hong-Kong, China. pp.1-7
Communication dans un congrès
hal-01936750v1
|
|
Automatic discovery of discriminative parts as a quadratic assignment problemICCV Workshops -- CEFRL, Oct 2017, Venise, Italy. pp.1059-1068
Communication dans un congrès
hal-01623148v1
|
|
Complex Document Classification and Localization Application on Identity Document ImagesICDAR 2017 - The 14th IAPR International Conference on Document Analysis and Recognition, Nov 2017, Kyoto, Japan. pp.1-6
Communication dans un congrès
hal-01660504v1
|
|
Identity documents classification as an image classification problemICIAP 2017 - 19th International Conference on Image Analysis and Processing, Sep 2017, Catania, Italy. pp.602-613, ⟨10.1007/978-3-319-68548-9_55⟩
Communication dans un congrès
hal-01660500v1
|
|
Panorama to panorama matching for location recognitionACM International Conference on Multimedia Retrieval (ICMR) 2017, Jun 2017, Bucharest, Romania. ⟨10.1145/3078971.3079033⟩
Communication dans un congrès
hal-01511793v1
|
|
About zero bit watermarking error exponentsICASSP2017 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2017, New Orleans, United States
Communication dans un congrès
hal-01512705v1
|
|
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017, Honolulu, United States
Communication dans un congrès
hal-01505470v1
|
Sketching techniques for very large matrix factorizationECIR 2016 - 38th European Conference on Information Retrieval , 2016, Padoue, Italy
Communication dans un congrès
hal-01249621v1
|
|
|
Group Testing for Identification with PrivacyACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain
Communication dans un congrès
hal-01309032v2
|
|
Efficient Large-Scale Similarity Search Using Matrix Factorization2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jun 2016, Las Vegas, United States
Communication dans un congrès
hal-01294736v1
|
|
Scaling Group Testing Similarity SearchACM International Conference on Multimedia Retrieval 2016 , Jun 2016, New York, United States. ⟨10.1145/2911996.2912010⟩
Communication dans un congrès
hal-01304287v1
|
|
Differentially Private Matrix Factorization using Sketching TechniquesACM Workshop on Information Hiding and Multimedia Security, Jun 2016, Vigo, Spain. ⟨10.1145/2909827.2930793⟩
Communication dans un congrès
hal-01317596v1
|
Estimating Local Intrinsic Dimensionality21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'15, ACM, Aug 2015, Sidney, Australia. pp.29-38 ⟨10.1145/2783258.2783405⟩
Communication dans un congrès
hal-01159217v1
|
|
|
Beyond "project and sign" for cosine estimation with binary codesICASPP - International Conference on Acoustics, Speech, and Signal Processing, IEEE, May 2014, Florence, Italy
Communication dans un congrès
hal-00942075v1
|
|
Challenging differential privacy: the case of non-interactive mechanismsEuropean Symposium on Research in Computer Security, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-11212-1_9⟩
Communication dans un congrès
hal-01011346v1
|
|
Tardos codes for realIEEE Workshop on Information Forensics and Security, Yan Lindsay Sun and Vicky H. Zhao, Dec 2014, Atlanta, United States. pp.7
Communication dans un congrès
hal-01066043v1
|
|
Instance classification with prototype selectionICMR - ACM International Conference on Multimedia Retrieval, Apr 2014, Glasgow, United Kingdom
Communication dans un congrès
hal-00942275v1
|
|
Puzzling Face Verification Algorithms for Privacy ProtectionIEEE Workshop on Information Forensics and Security, Dec 2014, Atlanta, United States
Communication dans un congrès
hal-01066070v1
|
|
Orientation covariant aggregation of local descriptors with embeddingsEuropean Conference on Computer Vision, Sep 2014, Zurich, Switzerland
Communication dans un congrès
hal-01020823v3
|
|
A Group Testing Framework for Similarity Search in High-dimensional SpacesACM Multimedia, Nov 2014, Orlando, United States. ⟨10.1145/2647868.2654895⟩
Communication dans un congrès
hal-01062531v3
|
|
Fast and secure similarity search in high dimensional spaceIEEE International Workshop on Information Forensics and Security, 2013, Guangzhou, China
Communication dans un congrès
hal-00857570v1
|
|
Recherche approximative de plus proches voisins efficace et sûreGRETSI, Sep 2013, Brest, France. pp.ID238
Communication dans un congrès
hal-00823879v2
|
|
Secure and Efficient Approximate Nearest Neighbors Search1st ACM Workshop on Information Hiding and Multimedia Security, Jun 2013, Montpellier, France. pp.175--180, ⟨10.1145/2482513.2482539⟩
Communication dans un congrès
hal-00817336v2
|
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès
hal-01540890v1
|
|
Practical Key Length of Watermarking SystemsICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00686813v1
|
|
Security-Oriented Picture-In-Picture Visual ModificationsICMR - ACM International Conference on Multimedia Retrieval, Jun 2012, Hong-Kong, China
Communication dans un congrès
hal-00764431v1
|
|
Anti-sparse coding for approximate nearest neighbor searchICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00661591v1
|
|
Key Length Estimation of Zero-Bit Watermarking SchemesEUSIPCO - 20th European Signal Processing Conference, Aug 2012, Romania. pp.TBA
Communication dans un congrès
hal-00728159v1
|
|
A New Measure of Watermarking Security Applied on DC-DM QIMIH - Information Hiding, May 2012, Berkeley, United States. pp.TBA
Communication dans un congrès
hal-00702689v2
|
|
Decoding Fingerprinting Using the Markov Chain Monte Carlo MethodWIFS - IEEE Workshop on Information Forensics and Security, Dec 2012, Tenerife, Spain
Communication dans un congrès
hal-00757152v1
|
|
Enlarging hacker's toolbox: deluding image recognition by attacking keypoint orientationsICASSP - 37th International Conference on Acoustics, Speech, and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00686809v1
|
|
Group testing meets traitor tracingICASSP, May 2011, Prague, Czech Republic. ⟨10.1109/ICASSP.2011.5947280⟩
Communication dans un congrès
inria-00580899v1
|
|
An Asymmetric Fingerprinting Scheme based on Tardos CodesIH'11 - 13th International Conference Information Hiding, May 2011, Prague, Czech Republic. ⟨10.1007/978-3-642-24178-9_4⟩
Communication dans un congrès
inria-00581156v2
|
Iterative single Tardos decoder with controlled probability of false positiveInternational Conference on Multimedia and Expo, Jul 2011, Barcelona, Spain
Communication dans un congrès
inria-00581159v1
|
|
|
Towards Joint Tardos Decoding: The 'Don~Quixote' AlgorithmInformation Hiding, May 2011, Prague, Czech Republic. pp.28-42, ⟨10.1007/978-3-642-24178-9_3⟩
Communication dans un congrès
hal-01057832v1
|
|
Towards Robust and Secure WatermarkingACM Multimedia and Security, Sep 2010, Roma, Italy
Communication dans un congrès
inria-00505849v1
|
|
Challenging the Security of Content Based Image Retrieval SystemsMMSP - EEE International Workshop on Multimedia Signal Processing, Oct 2010, Saint-Malo, France. ⟨10.1109/MMSP.2010.5661993⟩
Communication dans un congrès
inria-00505846v1
|
Better security levels for "Broken Arrows"Proceedings of the SPIE : International Symposium on Electronic Imaging 2010 : Media Forensics and Security XII, Jan 2010, San Jose, United States
Communication dans un congrès
hal-00472982v1
|
|
|
Deluding Image Recognition in SIFT-based CBIR SystemsACM Multimedia in Forensics, Security and Intelligence, ACM, Oct 2010, Firenze, Italy
Communication dans un congrès
inria-00505845v1
|
|
Understanding the Security and Robustness of SIFTACM Multimedia, Oct 2010, Firenze, Italy
Communication dans un congrès
inria-00505843v1
|
|
Décodage EM du code de Tardos pour le fingerprintingProc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès
inria-00504522v1
|
|
Le traçage de traîtresSymposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2009, Rennes, France
Communication dans un congrès
inria-00505885v1
|
|
ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUEIEEE International Conference on Digital Signal Processing, Jul 2009, Santorini, Greece
Communication dans un congrès
inria-00505877v1
|
|
BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODESIEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom
Communication dans un congrès
inria-00505890v1
|
|
WORST CASE ATTACKS AGAINST BINARY PROBABILISTIC TRAITOR TRACING CODESIEEE International Workshop on Information Forensics and Security, Dec 2009, London, United Kingdom
Communication dans un congrès
inria-00505886v1
|
|
Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage " Broken Arrows "Proc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès
inria-00504591v1
|
|
Estimating the minimal length of Tardos codeInformation Hiding, Jun 2009, Darmstadt, Germany
Communication dans un congrès
inria-00505882v1
|
|
Expectation Maximisation decoding of Tardos probabilistic fingerprinting codeIS\&T/SPIE International Symposium on Electronic Imaging 2009, 2009, San Jose, United States
Communication dans un congrès
inria-00504523v1
|
|
EM Decoding of Tardos Traitor Tracing CodesACM Multimedia and Security, Sep 2009, Princeton, United States
Communication dans un congrès
inria-00505875v1
|
|
Les Mesures Techniques de Protection... autrement dit les DRMColloque PRIAM, Nov 2008, Grenoble, France
Communication dans un congrès
inria-00505909v1
|
|
On the design and optimisation of Tardos probabilistic fingerprinting codesProc. of the 10th Information Hiding Workshop, 2008, Santa Barbara, United States
Communication dans un congrès
inria-00504549v1
|
|
Rare event simulation for a static distributionInternational Workshop on Rare Event Simulation, Oct 2008, Rennes, France
Communication dans un congrès
inria-00505919v1
|
|
On-Off Keying Modulation and Tardos FingerprintingProc. ACM Multimedia and Security, ACM, 2008, Oxford, United Kingdom
Communication dans un congrès
inria-00504606v1
|
The good, the bad and the ugly: three different approaches to break their watermarking systemSPIE 2007 - Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents IX, Jan 2007, San Jose, United States. pp.6, ⟨10.1117/12.703968⟩
Communication dans un congrès
hal-00158014v1
|
|
|
Some theoretical aspects of watermarking detectionSecurity, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, Jan 2006, San Jose, CA, USA, United States
Communication dans un congrès
inria-00083370v1
|
|
Hermite Polynomials as Provably Good Functions to Watermark White Gaussian HostsProc. ACM Multimedia and Security, ACM, 2006, Geneva, Switzerland
Communication dans un congrès
inria-00504548v1
|
On achievable security levels for lattice data hiding in the known message attackACM Multimedia and Security, Sep 2006, Geneva, Switzerland
Communication dans un congrès
inria-00580885v1
|
|
|
Watermarking is not cryptographyProc. Int. Work. on Digital Watermarking, inivited talk, 2006, Jeju island, South Korea
Communication dans un congrès
inria-00504528v1
|
A theoretical study of watermarking securityISIT 2005, 2005, pp.1868-1872
Communication dans un congrès
hal-00158005v1
|
|
|
Watermarking security part II: practiceSecurity, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.758--767
Communication dans un congrès
inria-00083335v1
|
|
A survey of watermarking securityInternational Workshop on Digital Watermarking, 2005, Siena, Italy, pp.201--215
Communication dans un congrès
inria-00083319v1
|
|
Watermarking security part I: theorySecurity, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757
Communication dans un congrès
inria-00083329v1
|
|
Watermarking attack: security of WSS techniquesInternational Workshop on Digital Watermarking, Oct 2004, Seoul, South Corea, South Korea. pp.171--183
Communication dans un congrès
inria-00083194v1
|
Application of Side-Informed Embedding and Polynomial Detection to Audio WatermarkingInt. Conf. on Multimedia and Expo, IEEE, Jul 2003, Baltimore, MY, USA, United States
Communication dans un congrès
inria-00083363v1
|
|
|
Robustness of an asymmetric techniqueIEEE Int. Conf. on Image Processing, IEEE, Sep 2003, Vancouver, Canada
Communication dans un congrès
inria-00080811v1
|
Robustness and efficiency of non-linear side-informed watermarkingInformation Hiding Workshop, Oct 2002, Noordwijkerhout, The Netherlands, Netherlands. pp.106--118
Communication dans un congrès
inria-00083358v1
|
|
|
Improved Polynomial Detectors for Side-Informed WatermarkingSecurity and Watermarking of Multimedia Contents IV, SPIE, Jan 2002, San José, CA, USA, United States. pp.311-321
Communication dans un congrès
inria-00080827v1
|
Watermark detector based on Nth order statisticsSPIE conference, Jul 2002, Seattle, United States
Communication dans un congrès
inria-00580891v1
|
|
|
Applied public-key steganographySecurity and Watermarking of Multimedia Contents IV, SPIE, 2002, San Jose, CA, United States
Communication dans un congrès
inria-00080818v1
|
|
JANIS: Just Another N-order side-Informed watermarking SchemeIEEE International Conference on Image Processing, IEEE, 2002, Rochester, NY, United States. pp.153-156
Communication dans un congrès
inria-00080826v1
|
|
An unified approach of asymmetric watermarking schemesSecurity and Watermarking of Multimedia Contents III, SPIE, 2001, San Jose, CA, United States
Communication dans un congrès
inria-00080814v1
|
|
Audio asymmetric watermarking techniqueInt. Conf. on Audio, Speech and Signal Processing, IEEE, Jun 2000, Istanbul, Turkey
Communication dans un congrès
inria-00001126v1
|
Copy protection of distributed contents: an application of watermarking techniquesFriendly Exchanging throught the Net, Mar 2000, Bordeaux, France, France
Communication dans un congrès
inria-00083343v1
|
|
|
An Asymmetric Public Detection Watermarking Techniquethird Int. Workshop on Information Hiding, Sep 1999, Dresden, Germany. pp.88-100
Communication dans un congrès
inria-00001125v1
|
Traitor tracingMultimedia security, 2022
Chapitre d'ouvrage
hal-03886523v1
|
|
Deep Neural Network Attacks and Defense: The Case of Image ClassificationMultimedia Security 1, 1, Wiley, 2022, Multimedia Security 1: Authentication and Data Hiding, 9781789450262. ⟨10.1002/9781119901808.ch2⟩
Chapitre d'ouvrage
hal-03852749v1
|
|
Traçage de traîtresWilliam Puech. Sécurité multimédia. Authentification et insertion de données cachées, 1, ISTE, pp.201-228, 2021, 978-1-78948-026-9
Chapitre d'ouvrage
hal-03501336v1
|
|
Attaques et défenses de réseaux de neurones profonds : le cas de la classification d'imagesISTE. Sécurité multimédia 1. Authentification et insertion de données cachées, 2021, 978-1-78949-026-8
Chapitre d'ouvrage
hal-03430025v1
|
|
|
Watermarking securityInformation hiding, Artech House, 2016, Information security and privacy series, 978-1-60807-928-5
Chapitre d'ouvrage
hal-01275880v1
|
Chapitre V: Les mesures techniques de protection - Une brève introductionDaniel Le Métayer. Les technologies de l'information au service des droits : opportunités, défis, limites, 32, Bruylant, pp.85-90, 2010, Cahiers du Centre de recherches informatique et droit, 978-2-8027-2960-0
Chapitre d'ouvrage
inria-00538241v1
|
|
Watermarking SecurityNedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9
Chapitre d'ouvrage
inria-00580838v1
|
|
|
Tatouage asymétriqueF. Davoine et S. Pateux. Tatouage de documents audiovisuels numériques, Hermès Science, pp.215--227, 2004, Traité IC2 Information-Commande-Communication, série Traitement du Signal et de l'Image, ISBN-2-7462-0816-4
Chapitre d'ouvrage
inria-00083368v1
|
|
Watermarking for alternative requirements2005
Autre publication scientifique
inria-00084268v1
|