Teddy Furon
Teddy Furon
INRIA Rennes - IRISA
Dirección de correo verificada de inria.fr - Página principal
TítuloCitado porAño
Watermarking security: Theory and practice
F Cayre, C Fontaine, T Furon
Signal Processing, IEEE Transactions on 53 (10), 3976-3987, 2005
3182005
Sequential Monte Carlo for rare event estimation
F Cérou, P Del Moral, T Furon, A Guyader
Statistics and computing 22 (3), 795-808, 2012
1652012
An asymmetric watermarking method
T Furon, P Duhamel
IEEE Transactions on Signal Processing 51 (4), 981-995, 2003
1552003
A general framework for robust watermarking security
M Barni, F Bartolini, T Furon
Signal Processing 83 (10), 2069-2084, 2003
1482003
An asymmetric public detection watermarking technique
T Furon, P Duhamel
International Workshop on Information Hiding, 88-100, 1999
1051999
Watermarking is not cryptography
IJ Cox, G Doërr, T Furon
International Workshop on Digital Watermarking, 1-15, 2006
982006
Efficient diffusion on region manifolds: Recovering small objects with compact cnn representations
A Iscen, G Tolias, Y Avrithis, T Furon, O Chum
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017
862017
On the design and optimization of Tardos probabilistic fingerprinting codes
T Furon, A Guyader, F Cérou
International Workshop on Information Hiding, 341-356, 2008
732008
Anti-sparse coding for approximate nearest neighbor search
H Jégou, T Furon, JJ Fuchs
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
642012
Applied public-key steganography
P Guillon, T Furon, P Duhamel
Security and Watermarking of Multimedia Contents IV 4675, 38-49, 2002
632002
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008 (1), 597040, 2008
612008
Estimating local intrinsic dimensionality
L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ...
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
582015
Unified approach of asymmetric watermarking schemes
T Furon, I Venturini, P Duhamel
Security and Watermarking of Multimedia Contents III 4314, 269-279, 2001
582001
Security of lattice-based data hiding against the known message attack
L Prez-Freire, F Prez-Gonzlez, T Furon, P Comesaa
IEEE Transactions on Information Forensics and Security 1 (4), 421-439, 2006
542006
Robustness of asymmetric watermarking technique
T Furon, P Duhamel
Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000
512000
On-off keying modulation and tardos fingerprinting
F Xie, T Furon, C Fontaine
Proceedings of the 10th ACM workshop on Multimedia and security, 101-106, 2008
472008
Worst case attacks against binary probabilistic traitor tracing codes
T Furon, L Pérez-Freire
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
452009
Watermarking security part one: theory
F Cayre, C Fontaine, T Furon
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
442005
Estimating the minimal length of Tardos code
T Furon, L Pérez-Freire, A Guyader, F Cérou
International Workshop on Information Hiding, 176-190, 2009
412009
A survey of watermarking security
T Furon
International workshop on digital watermarking, 201-215, 2005
412005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20