The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Patrick Bas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Patrick Bas, Jean-Marc Chassery, Franck Davoine
    Using the Fractal Code to Watermark Images. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:469-473 [Conf]
  2. Patrick Bas, Benoit M. Macq
    A new video-object watermarking scheme robust to object manipulation. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:526-529 [Conf]
  3. Patrick Bas, Benoit M. Macq
    A new video-object watermarking scheme robust to object manipulation. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2001, pp:526-529 [Conf]
  4. Boris Vassaux, Patrick Bas, Jean-Marc Chassery
    A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2001, pp:983-986 [Conf]
  5. Patrick Bas
    A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:106-117 [Conf]
  6. Patrick Bas, Jarmo Hurri
    Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:186-200 [Conf]
  7. Yoan Miche, Benoit Roue, Amaury Lendasse, Patrick Bas
    A Feature Selection Methodology for Steganalysis. [Citation Graph (0, 0)][DBLP]
    MRCS, 2006, pp:49-56 [Conf]
  8. Alejandro LoboGuerrero, Patrick Bas, Joel Lienard
    An informed synchronization scheme for audio data hiding. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:116-126 [Conf]
  9. Patrick Bas, Jean-Marc Chassery, Benoit M. Macq
    Image watermarking: an evolution to content based approaches. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2002, v:35, n:3, pp:545-561 [Journal]
  10. Patrick Bas, Jean-Marc Chassery, Benoit M. Macq
    Geometrically invariant watermarking using feature points. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2002, v:11, n:9, pp:1014-1028 [Journal]
  11. Patrick Bas, François Cayre
    Natural Watermarking: A Secure Spread Spectrum Technique for WOA. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:1-14 [Conf]
  12. Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten, Olli Simula
    Advantages of Using Feature Selection Techniques on Steganalysis Schemes. [Citation Graph (0, 0)][DBLP]
    IWANN, 2007, pp:606-613 [Conf]
  13. Benjamin Mathon, Patrick Bas, François Cayre
    Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:237-244 [Conf]
  14. Patrick Bas, François Cayre
    Achieving subspace or key security for WOA using natural or circular watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:80-88 [Conf]
  15. Benoit Roue, Patrick Bas, Jean-Marc Chassery
    Improving LSB steganalysis using marginal and joint probabilistic distributions. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:75-80 [Conf]

  16. A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM. [Citation Graph (, )][DBLP]


  17. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. [Citation Graph (, )][DBLP]


  18. Practical Security Analysis of Dirty Paper Trellis Watermarking. [Citation Graph (, )][DBLP]


  19. Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. [Citation Graph (, )][DBLP]


  20. On security threats for robust perceptual hashing. [Citation Graph (, )][DBLP]


  21. Comparison of secure spread-spectrum modulations applied to still image watermarking. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002