2009 |
20 | EE | Teddy Furon,
Luis Pérez-Freire:
Worst case attacks against binary probabilistic traitor tracing codes
CoRR abs/0903.3480: (2009) |
2008 |
19 | | Teddy Furon,
François Cayre,
Gwenaël J. Doërr,
Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
Springer 2008 |
18 | EE | Teddy Furon,
Arnaud Guyader,
Frédéric Cérou:
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.
Information Hiding 2008: 341-356 |
17 | EE | Fuchun Xie,
Teddy Furon,
Caroline Fontaine:
On-off keying modulation and tardos fingerprinting.
MM&Sec 2008: 101-106 |
16 | EE | Gaëtan Le Guelvouit,
Teddy Furon,
François Cayre:
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
CoRR abs/0811.4681: (2008) |
2007 |
15 | EE | Teddy Furon:
A Constructive and Unifying Framework for Zero-Bit Watermarking.
IEEE Transactions on Information Forensics and Security 2(2): 149-163 (2007) |
2006 |
14 | EE | Ingemar J. Cox,
Gwenaël J. Doërr,
Teddy Furon:
Watermarking Is Not Cryptography.
IWDW 2006: 1-15 |
13 | EE | Teddy Furon:
Hermite polynomials as provably good functions to watermark white gaussian hosts.
MM&Sec 2006: 224-229 |
12 | EE | Luis Pérez-Freire,
Fernando Pérez-González,
Teddy Furon:
On achievable security levels for lattice data hiding in the known message attack scenario.
MM&Sec 2006: 68-79 |
11 | EE | Teddy Furon:
A constructive and unifying framework for zero-bit watermarking
CoRR abs/cs/0606034: (2006) |
10 | EE | Luis Pérez-Freire,
Fernando Pérez-González,
Teddy Furon,
Pedro Comesaña:
Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Transactions on Information Forensics and Security 1(4): 421-439 (2006) |
2005 |
9 | EE | Teddy Furon:
A Survey of Watermarking Security.
IWDW 2005: 201-215 |
8 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part one: Theory.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 |
7 | | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking security part two: Practice.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 |
2004 |
6 | EE | François Cayre,
Caroline Fontaine,
Teddy Furon:
Watermarking Attack: Security of WSS Techniques.
IWDW 2004: 171-183 |
2003 |
5 | EE | Mauro Barni,
Franco Bartolini,
Teddy Furon:
A general framework for robust watermarking security.
Signal Processing 83(10): 2069-2084 (2003) |
2002 |
4 | | Teddy Furon,
Benoit M. Macq,
Neil J. Hurley,
Guenole C. M. Silvestre:
JANIS: Just Another n-order Side-Informed Watermarking Scheme.
ICIP (2) 2002: 153-156 |
3 | EE | Guenole C. M. Silvestre,
Neil J. Hurley,
Teddy Furon:
Robustness and Efficiency of Non-linear Side-Informed Watermarking.
Information Hiding 2002: 106-118 |
2000 |
2 | | Teddy Furon,
Pierre Duhamel:
Robustness of an Asymmetric Watermarking Technique.
ICIP 2000 |
1999 |
1 | | Teddy Furon,
Pierre Duhamel:
An Asymmetric Public Detection Watermarking Technique.
Information Hiding 1999: 88-100 |