dblp.uni-trier.dewww.uni-trier.de

Teddy Furon

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
20EETeddy Furon, Luis Pérez-Freire: Worst case attacks against binary probabilistic traitor tracing codes CoRR abs/0903.3480: (2009)
2008
19 Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers Springer 2008
18EETeddy Furon, Arnaud Guyader, Frédéric Cérou: On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. Information Hiding 2008: 341-356
17EEFuchun Xie, Teddy Furon, Caroline Fontaine: On-off keying modulation and tardos fingerprinting. MM&Sec 2008: 101-106
16EEGaëtan Le Guelvouit, Teddy Furon, François Cayre: The Good, the Bad, and the Ugly: three different approaches to break their watermarking system CoRR abs/0811.4681: (2008)
2007
15EETeddy Furon: A Constructive and Unifying Framework for Zero-Bit Watermarking. IEEE Transactions on Information Forensics and Security 2(2): 149-163 (2007)
2006
14EEIngemar J. Cox, Gwenaël J. Doërr, Teddy Furon: Watermarking Is Not Cryptography. IWDW 2006: 1-15
13EETeddy Furon: Hermite polynomials as provably good functions to watermark white gaussian hosts. MM&Sec 2006: 224-229
12EELuis Pérez-Freire, Fernando Pérez-González, Teddy Furon: On achievable security levels for lattice data hiding in the known message attack scenario. MM&Sec 2006: 68-79
11EETeddy Furon: A constructive and unifying framework for zero-bit watermarking CoRR abs/cs/0606034: (2006)
10EELuis Pérez-Freire, Fernando Pérez-González, Teddy Furon, Pedro Comesaña: Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Transactions on Information Forensics and Security 1(4): 421-439 (2006)
2005
9EETeddy Furon: A Survey of Watermarking Security. IWDW 2005: 201-215
8 François Cayre, Caroline Fontaine, Teddy Furon: Watermarking security part one: Theory. Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757
7 François Cayre, Caroline Fontaine, Teddy Furon: Watermarking security part two: Practice. Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768
2004
6EEFrançois Cayre, Caroline Fontaine, Teddy Furon: Watermarking Attack: Security of WSS Techniques. IWDW 2004: 171-183
2003
5EEMauro Barni, Franco Bartolini, Teddy Furon: A general framework for robust watermarking security. Signal Processing 83(10): 2069-2084 (2003)
2002
4 Teddy Furon, Benoit M. Macq, Neil J. Hurley, Guenole C. M. Silvestre: JANIS: Just Another n-order Side-Informed Watermarking Scheme. ICIP (2) 2002: 153-156
3EEGuenole C. M. Silvestre, Neil J. Hurley, Teddy Furon: Robustness and Efficiency of Non-linear Side-Informed Watermarking. Information Hiding 2002: 106-118
2000
2 Teddy Furon, Pierre Duhamel: Robustness of an Asymmetric Watermarking Technique. ICIP 2000
1999
1 Teddy Furon, Pierre Duhamel: An Asymmetric Public Detection Watermarking Technique. Information Hiding 1999: 88-100

Coauthor Index

1Pedro Comesaña Alfaro (Pedro Comesaña) [10]
2Mauro Barni [5]
3Franco Bartolini [5]
4Patrick Bas [19]
5François Cayre [6] [7] [8] [16] [19]
6Frédéric Cérou [18]
7Ingemar J. Cox [14]
8Gwenaël J. Doërr [14] [19]
9Pierre Duhamel [1] [2]
10Caroline Fontaine [6] [7] [8] [17]
11Gaëtan Le Guelvouit [16]
12Arnaud Guyader [18]
13Neil J. Hurley [3] [4]
14Benoit M. Macq (Benoît Macq) [4]
15Luis Pérez-Freire [10] [12] [20]
16Fernando Pérez-González [10] [12]
17Guenole C. M. Silvestre [3] [4]
18Fuchun Xie [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)