default search action
Teddy Furon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Kassem Kallas, Quentin Le Roux, Wassim Hamidouche, Teddy Furon:
Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors. EURASIP J. Inf. Secur. 2024(1): 32 (2024) - [c99]Quentin Le Roux, Kassem Kallas, Teddy Furon:
A Double-Edged Sword: The Power of Two in Defending Against DNN Backdoor Attacks. EUSIPCO 2024: 2007-2011 - [c98]Pierre Fernandez, Guillaume Couairon, Teddy Furon, Matthijs Douze:
Functional Invariants To Watermark Large Transformers. ICASSP 2024: 4815-4819 - [c97]Robin San Roman, Pierre Fernandez, Hady Elsahar, Alexandre Défossez, Teddy Furon, Tuan Tran:
Proactive Detection of Voice Cloning with Localized Watermarking. ICML 2024 - [c96]Quentin Le Roux, Kassem Kallas, Teddy Furon:
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event Simulation. SaTML 2024: 286-308 - [i40]Robin San Roman, Pierre Fernandez, Alexandre Défossez, Teddy Furon, Tuan Tran, Hady Elsahar:
Proactive Detection of Voice Cloning with Localized Watermarking. CoRR abs/2401.17264 (2024) - [i39]Tom Sander, Pierre Fernandez, Alain Durmus, Matthijs Douze, Teddy Furon:
Watermarking Makes Language Models Radioactive. CoRR abs/2402.14904 (2024) - [i38]Gautier Evennou, Vivien Chappelier, Ewa Kijak, Teddy Furon:
SWIFT: Semantic Watermarking for Image Forgery Thwarting. CoRR abs/2407.18995 (2024) - [i37]Vitaliy Kinakh, Brian Pulfer, Yury Belousov, Pierre Fernandez, Teddy Furon, Slava Voloshynovskiy:
Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks. CoRR abs/2409.18211 (2024) - 2023
- [j24]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Fingerprinting Classifiers With Benign Inputs. IEEE Trans. Inf. Forensics Secur. 18: 5459-5472 (2023) - [c95]Karim Tit, Teddy Furon, Mathias Rousset:
Gradient-Informed Neural Network Statistical Robustness Estimation. AISTATS 2023: 323-334 - [c94]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. ICASSP 2023: 1-5 - [c93]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Model Fingerprinting with Benign Inputs. ICASSP 2023: 1-5 - [c92]Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon:
How to choose your best allies for a transferable attack? ICCV 2023: 4519-4528 - [c91]Pierre Fernandez, Guillaume Couairon, Hervé Jégou, Matthijs Douze, Teddy Furon:
The Stable Signature: Rooting Watermarks in Latent Diffusion Models. ICCV 2023: 22409-22420 - [c90]Pierre Fernandez, Matthijs Douze, Hervé Jégou, Teddy Furon:
Active Image Indexing. ICLR 2023 - [c89]Pierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon:
Three Bricks to Consolidate Watermarks for Large Language Models. WIFS 2023: 1-6 - [i36]Pierre Fernandez, Guillaume Couairon, Hervé Jégou, Matthijs Douze, Teddy Furon:
The Stable Signature: Rooting Watermarks in Latent Diffusion Models. CoRR abs/2303.15435 (2023) - [i35]Thibault Maho, Seyed-Mohsen Moosavi-Dezfooli, Teddy Furon:
How to choose your best allies for a transferable attack? CoRR abs/2304.02312 (2023) - [i34]Pierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon:
Three Bricks to Consolidate Watermarks for Large Language Models. CoRR abs/2308.00113 (2023) - [i33]Pierre Fernandez, Guillaume Couairon, Teddy Furon, Matthijs Douze:
Functional Invariants to Watermark Large Transformers. CoRR abs/2310.11446 (2023) - 2022
- [j23]Benoît Bonnet, Teddy Furon, Patrick Bas:
Generating Adversarial Images in Quantized Domains. IEEE Trans. Inf. Forensics Secur. 17: 373-385 (2022) - [c88]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing Under Attack: How Good is it in Practice? ICASSP 2022: 3014-3018 - [c87]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. ICASSP 2022: 3054-3058 - [c86]Benoît Bonnet, Teddy Furon, Patrick Bas:
Impact of Downscaling on Adversarial Images. ICIP 2022: 2256-2260 - [c85]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. WIFS 2022: 1-6 - [i32]Thibault Maho, Teddy Furon, Erwan Le Merrer:
Randomized Smoothing under Attack: How Good is it in Pratice? CoRR abs/2204.14187 (2022) - [i31]Marzieh Gheisari, Javad Amirian, Teddy Furon, Laurent Amsaleg:
AggNet: Learning to Aggregate Faces for Group Membership Verification. CoRR abs/2206.08683 (2022) - [i30]Kassem Kallas, Teddy Furon:
ROSE: A RObust and SEcure DNN Watermarking. CoRR abs/2206.11024 (2022) - [i29]Thibault Maho, Teddy Furon, Erwan Le Merrer:
FBI: Fingerprinting models with Benign Inputs. CoRR abs/2208.03169 (2022) - [i28]Pierre Fernandez, Matthijs Douze, Hervé Jégou, Teddy Furon:
Active Image Indexing. CoRR abs/2210.10620 (2022) - [i27]Kassem Kallas, Teddy Furon:
Mixer: DNN Watermarking using Image Mixup. CoRR abs/2212.02814 (2022) - 2021
- [j22]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. IEEE Trans. Inf. Forensics Secur. 16: 701-713 (2021) - [j21]Laurent Amsaleg, James Bailey, Amélie Barbe, Sarah M. Erfani, Teddy Furon, Michael E. Houle, Milos Radovanovic, Xuan Vinh Nguyen:
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence. IEEE Trans. Inf. Forensics Secur. 16: 854-865 (2021) - [c84]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: A Fast Surrogate-Free Black-Box Attack. CVPR 2021: 10430-10439 - [c83]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A Benchmark Suite For Assessing Classifiers Robustness. ICIP 2021: 3612-3616 - [c82]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks. Trustworthy AI @ ACM Multimedia 2021: 9-17 - [c81]Teddy Furon, Jingen Liu, Yogesh S. Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: 1st International Workshop on Trustworthy AI for Multimedia Computing. ACM Multimedia 2021: 5708-5709 - [c80]Karim Tit, Teddy Furon, Mathias Rousset:
Efficient Statistical Assessment of Neural Network Corruption Robustness. NeurIPS 2021: 9253-9263 - [e2]Teddy Furon, Jingen Liu, Yogesh S. Rawat, Wei Zhang, Qi Zhao:
Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, Virtual Event, China, 24 October 2021. ACM 2021, ISBN 978-1-4503-8674-6 [contents] - [i26]Thibault Maho, Benoît Bonnet, Teddy Furon, Erwan Le Merrer:
RoBIC: A benchmark suite for assessing classifiers robustness. CoRR abs/2102.05368 (2021) - [i25]Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Hervé Jégou, Matthijs Douze:
Watermarking Images in Self-Supervised Latent Spaces. CoRR abs/2112.09581 (2021) - 2020
- [j20]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth adversarial examples. EURASIP J. Inf. Secur. 2020: 15 (2020) - [j19]Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Classification Deep Neural Networks Good for Blind Image Watermarking? Entropy 22(2): 198 (2020) - [c79]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. ICASSP 2020: 2922-2926 - [c78]Benoît Bonnet, Teddy Furon, Patrick Bas:
Forensics Through Stega Glasses: The Case of Adversarial Images. ICPR Workshops (6) 2020: 453-469 - [c77]Benoît Bonnet, Teddy Furon, Patrick Bas:
What if Adversarial Samples were Digital Images? IH&MMSec 2020: 55-66 - [c76]Benoît Bonnet, Teddy Furon, Patrick Bas:
Fooling an Automatic Image Quality Estimator. MediaEval 2020 - [c75]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. ACM Multimedia 2020: 1930-1938 - [i24]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? CoRR abs/2002.10362 (2020) - [i23]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Joint Learning of Assignment and Representation for Biometric Group Membership. CoRR abs/2002.10363 (2020) - [i22]Wenqing Liu, Miaojing Shi, Teddy Furon, Li Li:
Defending Adversarial Examples via DNN Bottleneck Reinforcement. CoRR abs/2008.05230 (2020) - [i21]Teddy Furon:
Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions. CoRR abs/2010.00990 (2020) - [i20]Benoît Bonnet, Teddy Furon, Patrick Bas:
Adversarial Images through Stega Glasses. CoRR abs/2010.07542 (2020) - [i19]Thibault Maho, Teddy Furon, Erwan Le Merrer:
SurFree: a fast surrogate-free black-box attack. CoRR abs/2011.12807 (2020)
2010 – 2019
- 2019
- [c74]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CVPR Workshops 2019: 74-82 - [c73]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. ICASSP 2019: 2592-2596 - [c72]Teddy Furon:
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector. IH&MMSec 2019: 173-181 - [c71]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Group Membership Verification with Privacy: Sparse or Dense? WIFS 2019: 1-7 - [i18]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Smooth Adversarial Examples. CoRR abs/1903.11862 (2019) - [i17]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg:
Privacy Preserving Group Membership Verification and Identification. CoRR abs/1904.10327 (2019) - [i16]Hanwei Zhang, Yannis Avrithis, Teddy Furon, Laurent Amsaleg:
Walking on the Edge: Fast, Low-Distortion Adversarial Examples. CoRR abs/1912.02153 (2019) - 2018
- [b1]Teddy Furon:
Binary Tardos Codes and Zero-bit Watermarking. University of Rennes 1, France, 2018 - [j18]Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stéphane Girard, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Extreme-value-theoretic estimation of local intrinsic dimensionality. Data Min. Knowl. Discov. 32(6): 1768-1805 (2018) - [j17]Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory Vectors for Similarity Search in High-Dimensional Spaces. IEEE Trans. Big Data 4(1): 65-77 (2018) - [c70]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. ACCV (2) 2018: 301-316 - [c69]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CVPR 2018: 7632-7641 - [c68]Vedran Vukotic, Vivien Chappelier, Teddy Furon:
Are Deep Neural Networks good for blind image watermarking? WIFS 2018: 1-7 - [i15]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking. CoRR abs/1807.08692 (2018) - [i14]Marzieh Gheisari, Teddy Furon, Laurent Amsaleg, Behrooz Razeghi, Slava Voloshynovskiy:
Aggregation and Embedding for Group Membership Verification. CoRR abs/1812.03943 (2018) - 2017
- [c67]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CVPR 2017: 926-935 - [c66]Teddy Furon:
About zero bitwatermarking error exponents. ICASSP 2017: 2132-2136 - [c65]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie, Ewa Kijak:
Automatic Discovery of Discriminative Parts as a Quadratic Assignment Problem. ICCV Workshops 2017: 1059-1068 - [c64]Ahmad Montaser Awal, Nabil Ghanmi, Ronan Sicre, Teddy Furon:
Complex Document Classification and Localization Application on Identity Document Images. ICDAR 2017: 426-431 - [c63]Ronan Sicre, Ahmad Montaser Awal, Teddy Furon:
Identity Documents Classification as an Image Classification Problem. ICIAP (2) 2017: 602-613 - [c62]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to Panorama Matching for Location Recognition. ICMR 2017: 392-396 - [i13]Ahmet Iscen, Yannis Avrithis, Giorgos Tolias, Teddy Furon, Ondrej Chum:
Fast Spectral Ranking for Similarity Search. CoRR abs/1703.06935 (2017) - [i12]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Panorama to panorama matching for location recognition. CoRR abs/1704.06591 (2017) - 2016
- [j16]Li Weng, Laurent Amsaleg, Teddy Furon:
Privacy-Preserving Outsourced Media Search. IEEE Trans. Knowl. Data Eng. 28(10): 2738-2751 (2016) - [c61]Ahmet Iscen, Michael G. Rabbat, Teddy Furon:
Efficient Large-Scale Similarity Search Using Matrix Factorization. CVPR 2016: 2073-2081 - [c60]Raghavendran Balu, Teddy Furon, Laurent Amsaleg:
Sketching Techniques for Very Large Matrix Factorization. ECIR 2016: 782-788 - [c59]Ahmet Iscen, Teddy Furon:
Group Testing for Identification with Privacy. IH&MMSec 2016: 51-56 - [c58]Raghavendran Balu, Teddy Furon:
Differentially Private Matrix Factorization using Sketching Techniques. IH&MMSec 2016: 57-62 - [c57]Ahmet Iscen, Laurent Amsaleg, Teddy Furon:
Scaling Group Testing Similarity Search. ICMR 2016: 213-220 - [i11]Ronan Sicre, Julien Rabin, Yannis Avrithis, Teddy Furon, Frédéric Jurie:
Automatic discovery of discriminative parts as a quadratic assignment problem. CoRR abs/1611.04413 (2016) - [i10]Ahmet Iscen, Giorgos Tolias, Yannis Avrithis, Teddy Furon, Ondrej Chum:
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations. CoRR abs/1611.05113 (2016) - 2015
- [j15]Giorgos Tolias, Andrei Bursuc, Teddy Furon, Hervé Jégou:
Rotation and translation covariant match kernels for image retrieval. Comput. Vis. Image Underst. 140: 9-20 (2015) - [c56]Laurent Amsaleg, Oussama Chelly, Teddy Furon, Stéphane Girard, Michael E. Houle, Ken-ichi Kawarabayashi, Michael Nett:
Estimating Local Intrinsic Dimensionality. KDD 2015: 29-38 - 2014
- [c55]Giorgos Tolias, Teddy Furon, Hervé Jégou:
Orientation Covariant Aggregation of Local Descriptors with Embeddings. ECCV (6) 2014: 382-397 - [c54]Raghavendran Balu, Teddy Furon, Sébastien Gambs:
Challenging Differential Privacy: The Case of Non-interactive Mechanisms. ESORICS (2) 2014: 146-164 - [c53]Raghavendran Balu, Teddy Furon, Hervé Jégou:
Beyond "project and sign" for cosine estimation with binary codes. ICASSP 2014: 6884-6888 - [c52]Josip Krapac, Florent Perronnin, Teddy Furon, Hervé Jégou:
Instance classification with prototype selection. ICMR 2014: 431 - [c51]Miaojing Shi, Teddy Furon, Hervé Jégou:
A Group Testing Framework for Similarity Search in High-dimensional Spaces. ACM Multimedia 2014: 407-416 - [c50]Teddy Furon, Mathieu Desoubeaux:
Tardos codes for real. WIFS 2014: 24-29 - [c49]Binod Bhattarai, Alexis Mignon, Frédéric Jurie, Teddy Furon:
Puzzling face verification algorithms for privacy protection. WIFS 2014: 66-71 - [i9]Giorgos Tolias, Teddy Furon, Hervé Jégou:
Orientation covariant aggregation of local descriptors with embeddings. CoRR abs/1407.2170 (2014) - [i8]Ahmet Iscen, Teddy Furon, Vincent Gripon, Michael G. Rabbat, Hervé Jégou:
Memory vectors for similarity search in high-dimensional spaces. CoRR abs/1412.3328 (2014) - 2013
- [j14]Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. IEEE Trans. Inf. Forensics Secur. 8(8): 1306-1317 (2013) - [c48]Benjamin Mathon, Teddy Furon, Laurent Amsaleg, Julien Bringer:
Secure and efficient approximate nearest neighbors search. IH&MMSec 2013: 175-180 - [c47]Teddy Furon, Hervé Jégou, Laurent Amsaleg, Benjamin Mathon:
Fast and secure similarity search in high dimensional space. WIFS 2013: 73-78 - 2012
- [j13]Frédéric Cérou, Pierre Del Moral, Teddy Furon, Arnaud Guyader:
Sequential Monte Carlo for rare event estimation. Stat. Comput. 22(3): 795-808 (2012) - [j12]Peter Meerwald, Teddy Furon:
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes. IEEE Trans. Inf. Forensics Secur. 7(4): 1168-1180 (2012) - [c46]Patrick Bas, Teddy Furon:
Are 128 Bits Long Keys Possible in Watermarking? Communications and Multimedia Security 2012: 191 - [c45]Patrick Bas, Teddy Furon:
Key length estimation of zero-bit watermarking schemes. EUSIPCO 2012: 1693-1697 - [c44]Patrick Bas, Teddy Furon, François Cayre:
Practical key length of watermarking systems. ICASSP 2012: 1769-1772 - [c43]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations. ICASSP 2012: 1817-1820 - [c42]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. ICASSP 2012: 2029-2032 - [c41]Teddy Furon, Patrick Bas:
A New Measure of Watermarking Security Applied on QIM. Information Hiding 2012: 207-223 - [c40]Thanh-Toan Do, Ewa Kijak, Laurent Amsaleg, Teddy Furon:
Security-oriented picture-in-picture visual modifications. ICMR 2012: 13 - [c39]Teddy Furon, Arnaud Guyader, Frédéric Cérou:
Decoding fingerprints using the Markov Chain Monte Carlo method. WIFS 2012: 187-192 - [i7]Patrick Bas, Teddy Furon:
The Effective Key Length of Watermarking Schemes. CoRR abs/1202.3562 (2012) - 2011
- [c38]Peter Meerwald, Teddy Furon:
Group testing meets traitor tracing. ICASSP 2011: 4204-4207 - [c37]Peter Meerwald, Teddy Furon:
Iterative single tardos decoder with controlled probability of false positive. ICME 2011: 1-6 - [c36]Peter Meerwald, Teddy Furon:
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm. Information Hiding 2011: 28-42 - [c35]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme Based on Tardos Codes. Information Hiding 2011: 43-58 - [i6]Peter Meerwald, Teddy Furon:
Towards joint decoding of Tardos fingerprinting codes. CoRR abs/1104.5616 (2011) - [i5]Hervé Jégou, Teddy Furon, Jean-Jacques Fuchs:
Anti-sparse coding for approximate nearest neighbor search. CoRR abs/1110.3767 (2011) - 2010
- [j11]Teddy Furon, Gwenaël J. Doërr:
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. IEEE Secur. Priv. 8(5): 69-71 (2010) - [j10]Ana Charpentier, Caroline Fontaine, Teddy Furon:
Décodage EM du code de Tardos pour le fingerprinting. Traitement du Signal 27(2): 127-146 (2010) - [c34]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Better security levels for broken arrows. Media Forensics and Security 2010: 75410H - [c33]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Deluding image recognition in sift-based cbir systems. MiFor@MM 2010: 7-12 - [c32]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Understanding the security and robustness of SIFT. ACM Multimedia 2010: 1195-1198 - [c31]Fuchun Xie, Teddy Furon, Caroline Fontaine:
Towards robust and secure watermarking. MM&Sec 2010: 153-160 - [c30]Thanh-Toan Do, Ewa Kijak, Teddy Furon, Laurent Amsaleg:
Challenging the security of Content-Based Image Retrieval systems. MMSP 2010: 52-57 - [i4]Ana Charpentier, Caroline Fontaine, Teddy Furon, Ingemar J. Cox:
An Asymmetric Fingerprinting Scheme based on Tardos Codes. CoRR abs/1010.2621 (2010)
2000 – 2009
- 2009
- [c29]Teddy Furon, Cyrille Jégourel, Arnaud Guyader, Frédéric Cérou:
Estimating the probability fo false alarm for a zero-bit watermarking technique. DPS 2009: 1-8 - [c28]Teddy Furon, Luis Pérez-Freire, Arnaud Guyader, Frédéric Cérou:
Estimating the Minimal Length of Tardos Code. Information Hiding 2009: 176-190 - [c27]Ana Charpentier, Fuchun Xie, Caroline Fontaine, Teddy Furon:
Expectation maximization decoding of Tardos probabilistic fingerprinting code. Media Forensics and Security 2009: 72540E - [c26]Teddy Furon, Luis Pérez-Freire:
EM decoding of tardos traitor tracing codes. MM&Sec 2009: 99-106 - [c25]Luis Pérez-Freire, Teddy Furon:
Blind decoder for binary probabilistic traitor tracing codes. WIFS 2009: 46-50 - [c24]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. WIFS 2009: 56-60 - [i3]Teddy Furon, Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes. CoRR abs/0903.3480 (2009) - 2008
- [j9]Frédéric Cérou, Teddy Furon, Arnaud Guyader:
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes. EURASIP J. Inf. Secur. 2008 (2008) - [j8]Teddy Furon, Patrick Bas:
Broken Arrows. EURASIP J. Inf. Secur. 2008 (2008) - [c23]Teddy Furon, Arnaud Guyader, Frédéric Cérou:
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. Information Hiding 2008: 341-356 - [c22]Fuchun Xie, Teddy Furon, Caroline Fontaine:
On-off keying modulation and tardos fingerprinting. MM&Sec 2008: 101-106 - [e1]Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6 [contents] - [i2]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system. CoRR abs/0811.4681 (2008) - 2007
- [j7]Teddy Furon:
A Constructive and Unifying Framework for Zero-Bit Watermarking. IEEE Trans. Inf. Forensics Secur. 2(2): 149-163 (2007) - [c21]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The good, the bad, and the ugly: three different approaches to break their watermarking system. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650517 - 2006
- [j6]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesaña:
Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Inf. Forensics Secur. 1(4): 421-439 (2006) - [c20]Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon:
Watermarking Is Not Cryptography. IWDW 2006: 1-15 - [c19]Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon:
On achievable security levels for lattice data hiding in the known message attack scenario. MM&Sec 2006: 68-79 - [c18]Teddy Furon:
Hermite polynomials as provably good functions to watermark white gaussian hosts. MM&Sec 2006: 224-229 - [c17]Teddy Furon, Julie Josse, Sandrine Le Squin:
Some theoretical aspects of watermarking detection. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721G - [i1]Teddy Furon:
A constructive and unifying framework for zero-bit watermarking. CoRR abs/cs/0606034 (2006) - 2005
- [j5]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10): 3976-3987 (2005) - [c16]François Cayre, Caroline Fontaine, Teddy Furon:
A theoretical study of watermarking security. ISIT 2005: 1868-1872 - [c15]Teddy Furon:
A Survey of Watermarking Security. IWDW 2005: 201-215 - [c14]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part one: Theory. Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 - [c13]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part two: Practice. Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 - 2004
- [j4]Thierry Maillard, Teddy Furon:
Towards digital rights and exemptions management systems. Comput. Law Secur. Rev. 20(4): 281-287 (2004) - [j3]Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl:
Copy protection system for digital home networks. IEEE Signal Process. Mag. 21(2): 100-108 (2004) - [c12]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking Attack: Security of WSS Techniques. IWDW 2004: 171-183 - 2003
- [j2]Mauro Barni, Franco Bartolini, Teddy Furon:
A general framework for robust watermarking security. Signal Process. 83(10): 2069-2084 (2003) - [j1]Teddy Furon, Pierre Duhamel:
An asymmetric watermarking method. IEEE Trans. Signal Process. 51(4): 981-995 (2003) - [c11]Micheal Mullarkey, Neil J. Hurley, Guenole C. M. Silvestre, Teddy Furon:
Application of side-informed embedding and polynomial detection to audio watermarking. ICASSP (3) 2003: 57-60 - [c10]Micheal Mullarkey, Neil J. Hurley, Guenole C. M. Silvestre, Teddy Furon:
Application of side-informed embedding and polynomial detection to audio watermarking. ICME 2003: 605-608 - [c9]Jonathan Delhumeau, Teddy Furon, Neil J. Hurley, Guénolé C. M. Silvestre:
Improved polynomial detectors for side-informed watermarking. Security and Watermarking of Multimedia Contents 2003: 311-321 - 2002
- [c8]Neil J. Hurley, Guenole C. M. Silvestre, Teddy Furon:
Side-informed watermarking using nth-order polynomial detectors. EUSIPCO 2002: 1-4 - [c7]Teddy Furon, Benoît Macq, Neil J. Hurley, Guenole C. M. Silvestre:
JANIS: Just Another n-order Side-Informed Watermarking Scheme. ICIP (2) 2002: 153-156 - [c6]Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon:
Robustness and Efficiency of Non-linear Side-Informed Watermarking. Information Hiding 2002: 106-118 - [c5]Pierre Guillon, Teddy Furon, Pierre Duhamel:
Applied public-key steganography. Security and Watermarking of Multimedia Contents 2002: 38-49 - 2001
- [c4]Teddy Furon, Ilaria Venturini, Pierre Duhamel:
Unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents 2001: 269-279 - 2000
- [c3]Teddy Furon, Nicolas Moreau, Pierre Duhamel:
Audio public key watermarking technique. ICASSP 2000: 1959-1962 - [c2]Teddy Furon, Pierre Duhamel:
Robustness of an Asymmetric Watermarking Technique. ICIP 2000: 21-24
1990 – 1999
- 1999
- [c1]Teddy Furon, Pierre Duhamel:
An Asymmetric Public Detection Watermarking Technique. Information Hiding 1999: 88-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint