


Остановите войну!
for scientists:
Teddy Furon
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j23]Benoît Bonnet
, Teddy Furon
, Patrick Bas
:
Generating Adversarial Images in Quantized Domains. IEEE Trans. Inf. Forensics Secur. 17: 373-385 (2022) - [c86]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing Under Attack: How Good is it in Practice? ICASSP 2022: 3014-3018 - [c85]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. ICASSP 2022: 3054-3058 - [i29]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing under Attack: How Good is it in Pratice? CoRR abs/2204.14187 (2022) - [i28]Marzieh Gheisari, Javad Amirian, Teddy Furon, Laurent Amsaleg:
AggNet: Learning to Aggregate Faces for Group Membership Verification. CoRR abs/2206.08683 (2022) - [i27]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. CoRR abs/2206.11024 (2022) - 2021
- [j22]Hanwei Zhang
, Yannis Avrithis
, Teddy Furon
, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. IEEE Trans. Inf. Forensics Secur. 16: 701-713 (2021) - [j21]Laurent Amsaleg
, James Bailey
, Amélie Barbe, Sarah M. Erfani
, Teddy Furon
, Michael E. Houle
, Milos Radovanovic
, Xuan Vinh Nguyen
:
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence. IEEE Trans. Inf. Forensics Secur. 16: 854-865 (2021) - [c84]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: A Fast Surrogate-Free Black-Box Attack. CVPR 2021: 10430-10439 - [c83]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A Benchmark Suite For Assessing Classifiers Robustness. ICIP 2021: 3612-3616 - [c82]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks. Trustworthy AI @ ACM Multimedia 2021: 9-17 - [c81]Teddy Furon, Jingen Liu, Yogesh Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: 1st International Workshop on Trustworthy AI for Multimedia Computing. ACM Multimedia 2021: 5708-5709 - [c80]Karim Tit, Teddy Furon, Mathias Rousset:
Efficient Statistical Assessment of Neural Network Corruption Robustness. NeurIPS 2021: 9253-9263 - [e2]Teddy Furon, Jingen Liu, Yogesh Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, Virtual Event, China, 24 October 2021. ACM 2021, ISBN 978-1-4503-8674-6 [contents] - [i26]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A benchmark suite for assessing classifiers robustness. CoRR abs/2102.05368 (2021) - [i25]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. CoRR abs/2112.09581 (2021) - 2020
- [j20]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth adversarial examples. EURASIP J. Inf. Secur. 2020: 15 (2020) - [j19]Vedran Vukotic, Vivien Chappelier, Teddy Furon
:
Are Classification Deep Neural Networks Good for Blind Image Watermarking? Entropy 22(2): 198 (2020) - [c79]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. ICASSP 2020: 2922-2926 - [c78]Benoît Bonnet
, Teddy Furon
, Patrick Bas
:
Forensics Through Stega Glasses: The Case of Adversarial Images. ICPR Workshops (6) 2020: 453-469 - [c77]Benoît Bonnet, Teddy Furon, Patrick Bas:
What if Adversarial Samples were Digital Images? IH&MMSec 2020: 55-66 - [c76]Benoît Bonnet, Teddy Furon, Patrick Bas:
Fooling an Automatic Image Quality Estimator. MediaEval 2020 - [c75]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. ACM Multimedia 2020: 1930-1938 - [i24]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? CoRR abs/2002.10362 (2020) - [i23]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. CoRR abs/2002.10363 (2020) - [i22]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. CoRR abs/2008.05230 (2020) - [i21]Teddy Furon:
Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions. CoRR abs/2010.00990 (2020) - [i20]Benoît Bonnet, Teddy Furon, Patrick Bas:
Adversarial Images through Stega Glasses. CoRR abs/2010.07542 (2020) - [i19]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: a fast surrogate-free black-box attack. CoRR abs/2011.12807 (2020)
2010 – 2019
- 2019
- [c74]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CVPR Workshops 2019: 74-82 - [c73]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi
, Slava Voloshynovskiy
:
Aggregation and Embedding for Group Membership Verification. ICASSP 2019: 2592-2596 - [c72]Teddy Furon:
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector. IH&MMSec 2019: 173-181 - [c71]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? WIFS 2019: 1-7 - [i18]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth Adversarial Examples. CoRR abs/1903.11862 (2019) - [i17]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CoRR abs/1904.10327 (2019) - [i16]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. CoRR abs/1912.02153 (2019) - 2018
- [b1]Teddy Furon:
Binary Tardos Codes and Zero-bit Watermarking. University of Rennes 1, France, 2018 - [j18]Laurent Amsaleg, Oussama Chelly
, Teddy Furon, Stéphane Girard
, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Extreme-value-theoretic estimation of local intrinsic dimensionality. Data Min. Knowl. Discov. 32(6): 1768-1805 (2018) - [j17]Ahmet Iscen
, Teddy Furon, Vincent Gripon
, Michael G. Rabbat, Hervé Jégou:
Memory Vectors for Similarity Search in High-Dimensional Spaces. IEEE Trans. Big Data 4(1): 65-77 (2018) - [c70]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. ACCV (2) 2018: 301-316 - [c69]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CVPR 2018: 7632-7641 - [c68]Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Deep Neural Networks good for blind image watermarking? WIFS 2018: 1-7 - [i15]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. CoRR abs/1807.08692 (2018) - [i14]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. CoRR abs/1812.03943 (2018) - 2017
- [c67]Ahmet Iscen, Giorgos Tolias
, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CVPR 2017: 926-935 - [c66]Teddy Furon:
About zero bitwatermarking error exponents. ICASSP 2017: 2132-2136 - [c65]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie, Ewa Kijak:
Automatic Discovery of Discriminative Parts as a Quadratic Assignment Problem. ICCV Workshops 2017: 1059-1068 - [c64]Ahmad Montaser Awal, Nabil Ghanmi, Ronan Sicre, Teddy Furon:
Complex Document Classification and Localization Application on Identity Document Images. ICDAR 2017: 426-431 - [c63]Ronan Sicre, Ahmad Montaser Awal, Teddy Furon:
Identity Documents Classification as an Image Classification Problem. ICIAP (2) 2017: 602-613 - [c62]Ahmet Iscen, Giorgos Tolias
, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to Panorama Matching for Location Recognition. ICMR 2017: 392-396 - [i13]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CoRR abs/1703.06935 (2017) - [i12]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to panorama matching for location recognition. CoRR abs/1704.06591 (2017) - 2016
- [j16]Li Weng
, Laurent Amsaleg, Teddy Furon:
Privacy-Preserving Outsourced Media Search. IEEE Trans. Knowl. Data Eng. 28(10): 2738-2751 (2016) - [c61]Ahmet Iscen, Michael G. Rabbat, Teddy Furon:
Efficient Large-Scale Similarity Search Using Matrix Factorization. CVPR 2016: 2073-2081 - [c60]Raghavendran Balu, Teddy Furon, Laurent Amsaleg:
Sketching Techniques for Very Large Matrix Factorization. ECIR 2016: 782-788 - [c59]Ahmet Iscen, Teddy Furon:
Group Testing for Identification with Privacy. IH&MMSec 2016: 51-56 - [c58]Raghavendran Balu, Teddy Furon:
Differentially Private Matrix Factorization using Sketching Techniques. IH&MMSec 2016: 57-62 - [c57]Ahmet Iscen, Laurent Amsaleg, Teddy Furon:
Scaling Group Testing Similarity Search. ICMR 2016: 213-220 - [i11]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie:
Automatic discovery of discriminative parts as a quadratic assignment problem. CoRR abs/1611.04413 (2016) - [i10]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CoRR abs/1611.05113 (2016) - 2015
- [j15]Giorgos Tolias
, Andrei Bursuc, Teddy Furon, Hervé Jégou:
Rotation and translation covariant match kernels for image retrieval. Comput. Vis. Image Underst. 140: 9-20 (2015) - [c56]Laurent Amsaleg, Oussama Chelly
, Teddy Furon, Stéphane Girard
, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Estimating Local Intrinsic Dimensionality. KDD 2015: 29-38 - 2014
- [c55]Giorgos Tolias
, Teddy Furon, Hervé Jégou:
Orientation Covariant Aggregation of Local Descriptors with Embeddings. ECCV (6) 2014: 382-397 - [c54]Raghavendran Balu, Teddy Furon, Sébastien Gambs:
Challenging Differential Privacy: The Case of Non-interactive Mechanisms. ESORICS (2) 2014: 146-164 - [c53]Raghavendran Balu, Teddy Furon, Hervé Jégou:
Beyond "project and sign" for cosine estimation with binary codes. ICASSP 2014: 6884-6888 - [c52]Josip Krapac, Florent Perronnin, Teddy Furon, Hervé Jégou:
Instance classification with prototype selection. ICMR 2014: 431 - [c51]Miaojing Shi, Teddy Furon, Hervé Jégou:
A Group Testing Framework for Similarity Search in High-dimensional Spaces. ACM Multimedia 2014: 407-416 - [c50]Teddy Furon, Mathieu Desoubeaux:
Tardos codes for real. WIFS 2014: 24-29 - [c49]Binod Bhattarai, Alexis Mignon, Frédéric Jurie, Teddy Furon:
Puzzling face verification algorithms for privacy protection. WIFS 2014: 66-71 - [i9]Giorgos Tolias, Teddy Furon, Hervé Jégou:
Orientation covariant aggregation of local descriptors with embeddings. CoRR abs/1407.2170 (2014) - [i8]Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory vectors for similarity search in high-dimensional spaces. CoRR abs/1412.3328 (2014) - 2013
- [j14]Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. IEEE Trans. Inf. Forensics Secur. 8(8): 1306-1317 (2013) - [c48]Benjamin Mathon
, Teddy Furon, Laurent Amsaleg, Julien Bringer:
Secure and efficient approximate nearest neighbors search. IH&MMSec 2013: 175-180 - [c47]Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon
:
Fast and secure similarity search in high dimensional space. WIFS 2013: 73-78 - 2012
- [j13]Frédéric Cérou, Pierre Del Moral
, Teddy Furon, Arnaud Guyader:
Sequential Monte Carlo for rare event estimation. Stat. Comput. 22(3): 795-808 (2012) - [j12]Peter Meerwald, Teddy Furon:
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes. IEEE Trans. Inf. Forensics Secur. 7(4): 1168-1180 (2012) - [c46]Patrick Bas, Teddy Furon:
Are 128 Bits Long Keys Possible in Watermarking? Communications and Multimedia Security 2012: 191 - [c45]Patrick Bas, Teddy Furon:
Key length estimation of zero-bit watermarking schemes. EUSIPCO 2012: 1693-1697 - [c44]Patrick Bas, Teddy Furon, François Cayre:
Practical key length of watermarking systems. ICASSP 2012: 1769-1772 - [c43]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations. ICASSP 2012: 1817-1820 - [c42]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. ICASSP 2012: 2029-2032 - [c41]Teddy Furon, Patrick Bas:
A New Measure of Watermarking Security Applied on QIM. Information Hiding 2012: 207-223 - [c40]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Security-oriented picture-in-picture visual modifications. ICMR 2012: 13 - [c39]Teddy Furon, Arnaud Guyader, Frédéric Cérou:
Decoding fingerprints using the Markov Chain Monte Carlo method. WIFS 2012: 187-192 - [i7]Patrick Bas, Teddy Furon:
The Effective Key Length of Watermarking Schemes. CoRR abs/1202.3562 (2012) - 2011
- [c38]Peter Meerwald, Teddy Furon:
Group testing meets traitor tracing. ICASSP 2011: 4204-4207 - [c37]Peter Meerwald, Teddy Furon:
Iterative single tardos decoder with controlled probability of false positive. ICME 2011: 1-6 - [c36]Peter Meerwald, Teddy Furon:
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm. Information Hiding 2011: 28-42 - [c35]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme Based on Tardos Codes. Information Hiding 2011: 43-58 - [i6]Peter Meerwald, Teddy Furon:
Towards joint decoding of Tardos fingerprinting codes. CoRR abs/1104.5616 (2011) - [i5]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. CoRR abs/1110.3767 (2011) - 2010
- [j11]Teddy Furon, Gwenaël J. Doërr:
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. IEEE Secur. Priv. 8(5): 69-71 (2010) - [j10]Ana Charpentier, Caroline Fontaine, Teddy Furon:
Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal 27(2): 127-146 (2010) - [c34]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Better security levels for broken arrows. Media Forensics and Security 2010: 75410H - [c33]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Deluding image recognition in sift-based cbir systems. MiFor@MM 2010: 7-12 - [c32]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Understanding the security and robustness of SIFT. ACM Multimedia 2010: 1195-1198 - [c31]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Towards robust and secure watermarking. MM&Sec 2010: 153-160 - [c30]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Challenging the security of Content-Based Image Retrieval systems. MMSP 2010: 52-57 - [i4]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme based on Tardos Codes. CoRR abs/1010.2621 (2010)
2000 – 2009
- 2009
- [c29]Teddy Furon, Cyrille Jégourel, Arnaud Guyader, Frédéric Cérou:
Estimating the probability fo false alarm for a zero-bit watermarking technique. DPS 2009: 1-8 - [c28]Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou:
Estimating the Minimal Length of Tardos Code. Information Hiding 2009: 176-190 - [c27]Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon:
Expectation maximization decoding of Tardos probabilistic fingerprinting code. Media Forensics and Security 2009: 72540E - [c26]Teddy Furon, Luis Pérez-Freire:
EM decoding of tardos traitor tracing codes. MM&Sec 2009: 99-106 - [c25]Luis Pérez-Freire, Teddy Furon:
Blind decoder for binary probabilistic traitor tracing codes. WIFS 2009: 46-50 - [c24]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. WIFS 2009: 56-60 - [i3]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009) - 2008
- [j9]Frédéric Cérou, Teddy Furon, Arnaud Guyader:
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP J. Inf. Secur. 2008 (2008) - [j8]Teddy Furon, Patrick Bas:
Broken Arrows. EURASIP J. Inf. Secur. 2008 (2008) - [c23]Teddy Furon, Arnaud Guyader, Frédéric Cérou:
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. Information Hiding 2008: 341-356 - [c22]Fuchun Xie, Teddy Furon, Caroline Fontaine:
On-off keying modulation and tardos fingerprinting. MM&Sec 2008: 101-106 - [e1]Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6 [contents] - [i2]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system. CoRR abs/0811.4681 (2008) - 2007
- [j7]Teddy Furon:
A Constructive and Unifying Framework for Zero-Bit Watermarking. IEEE Trans. Inf. Forensics Secur. 2(2): 149-163 (2007) - [c21]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The good, the bad, and the ugly: three different approaches to break their watermarking system. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650517 - 2006
- [j6]Luis Pérez-Freire, Fernando Pérez-González
, Teddy Furon, Pedro Comesaña
:
Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Inf. Forensics Secur. 1(4): 421-439 (2006) - [c20]Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon:
Watermarking Is Not Cryptography. IWDW 2006: 1-15 - [c19]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon:
On achievable security levels for lattice data hiding in the known message attack scenario. MM&Sec 2006: 68-79 - [c18]Teddy Furon:
Hermite polynomials as provably good functions to watermark white gaussian hosts. MM&Sec 2006: 224-229 - [c17]Teddy Furon, Julie Josse, Sandrine Le Squin:
Some theoretical aspects of watermarking detection. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721G - [i1]Teddy Furon:
A constructive and unifying framework for zero-bit watermarking. CoRR abs/cs/0606034 (2006) - 2005
- [j5]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10): 3976-3987 (2005) - [c16]François Cayre, Caroline Fontaine, Teddy Furon:
A theoretical study of watermarking security. ISIT 2005: 1868-1872 - [c15]Teddy Furon:
A Survey of Watermarking Security. IWDW 2005: 201-215 - [c14]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part one: Theory. Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 - [c13]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part two: Practice. Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 - 2004
- [j4]Thierry Maillard, Teddy Furon:
Towards digital rights and exemptions management systems. Comput. Law Secur. Rev. 20(4): 281-287 (2004) - [j3]Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl:
Copy protection system for digital home networks. IEEE Signal Process. Mag. 21(2): 100-108 (2004) - [c12]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking Attack: Security of WSS Techniques. IWDW 2004: 171-183 - 2003
- [j2]Mauro Barni, Franco Bartolini, Teddy Furon:
A general framework for robust watermarking security. Signal Process. 83(10): 2069-2084 (2003) - [j1]