dblp.uni-trier.dewww.uni-trier.de

Gwenaël J. Doërr

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22 Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers Springer 2008
21EEGwenaël J. Doërr, Ton Kalker: Design rules for interoperable domains: controlling content dilution and content sharing. Digital Rights Management Workshop 2008: 39-50
20EEGiacomo Cancelli, Gwenaël J. Doërr, Ingemar J. Cox, Mauro Barni: Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. ICIP 2008: 1288-1291
19EEPatrick Bas, Gwenaël J. Doërr: Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. MM&Sec 2008: 227-232
18EEGiacomo Cancelli, Gwenaël J. Doërr, Mauro Barni, Ingemar J. Cox: A comparative study of +/- steganalyzers. MMSP 2008: 791-796
2007
17EEPatrick Bas, Gwenaël J. Doërr: Practical Security Analysis of Dirty Paper Trellis Watermarking. Information Hiding 2007: 174-188
2006
16EEIngemar J. Cox, Gwenaël J. Doërr, Teddy Furon: Watermarking Is Not Cryptography. IWDW 2006: 1-15
15EEP. Vinod, Gwenaël J. Doërr, P. K. Bora: Assessing motion-coherency in video watermarking. MM&Sec 2006: 114-119
14EEJean-Luc Dugelay, S. Roche, Christian Rey, Gwenaël J. Doërr: Still-image watermarking robust to local geometric distortions. IEEE Transactions on Image Processing 15(9): 2831-2842 (2006)
13EEGwenaël J. Doërr, Jean-Luc Dugelay, Darko Kirovski: On the Need for Signal-Coherent Watermarks. IEEE Transactions on Multimedia 8(5): 896-904 (2006)
2005
12EELin Lin, Gwenaël J. Doërr, Ingemar J. Cox, Matthew L. Miller: An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking. ICIP (1) 2005: 697-700
11EEGwenaël J. Doërr, Jean-Luc Dugelay: A Countermeasur to Resist Block Replacement Attacks. ICIP (1) 2005: 965-968
10EEGwenaël J. Doërr, Jean-Luc Dugelay: Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. IWDW 2005: 216-230
9EEGwenaël J. Doërr, Jean-Luc Dugelay: How to Combat Block Replacement Attacks?. Information Hiding 2005: 161-175
8 Gwenaël J. Doërr, Jean-Luc Dugelay: Collusion issue in video watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2005: 685-696
2004
7EEGwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé: Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. MM&Sec 2004: 133-142
6 Gwenaël J. Doërr, Jean-Luc Dugelay: Secure background watermarking based on video mosaicing. Security, Steganography, and Watermarking of Multimedia Contents 2004: 304-314
5EEMatthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing 13(6): 792-807 (2004)
2003
4EEGwenaël J. Doërr, Jean-Luc Dugelay: Secure Video Watermarking via Embedding Strength Modulation. IWDW 2003: 340-354
2002
3 Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox: Dirty-paper trellis codes for watermarking. ICIP (2) 2002: 129-132
2 Christian Rey, Gwenaël J. Doërr, Gabriela Csurka, Jean-Luc Dugelay: Toward generic image dewatermarking? ICIP (3) 2002: 633-636
1EEMatthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox: Informed Embedding for Multi-bit Watermarks. IWDW 2002: 13-21

Coauthor Index

1Mauro Barni [18] [20]
2Patrick Bas [17] [19] [22]
3P. K. Bora [15]
4Giacomo Cancelli [18] [20]
5François Cayre [22]
6Ingemar J. Cox [1] [3] [5] [12] [16] [18] [20]
7Gabriela Csurka [2]
8Jean-Luc Dugelay [2] [4] [6] [7] [8] [9] [10] [11] [13] [14]
9Teddy Furon [16] [22]
10Lucas Grangé [7]
11Ton Kalker [21]
12Darko Kirovski [13]
13Lin Lin [12]
14Matthew L. Miller [1] [3] [5] [12]
15Christian Rey [2] [14]
16S. Roche [14]
17P. Vinod [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)