The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Teddy Furon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Teddy Furon, Pierre Duhamel
    Robustness of an Asymmetric Watermarking Technique. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  2. Teddy Furon, Benoit M. Macq, Neil J. Hurley, Guenole C. M. Silvestre
    JANIS: Just Another n-order Side-Informed Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:153-156 [Conf]
  3. Teddy Furon, Pierre Duhamel
    An Asymmetric Public Detection Watermarking Technique. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:88-100 [Conf]
  4. Guenole C. M. Silvestre, Neil J. Hurley, Teddy Furon
    Robustness and Efficiency of Non-linear Side-Informed Watermarking. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:106-118 [Conf]
  5. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking Attack: Security of WSS Techniques. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:171-183 [Conf]
  6. Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon
    Watermarking Is Not Cryptography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:1-15 [Conf]
  7. Teddy Furon
    A Survey of Watermarking Security. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:201-215 [Conf]
  8. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part one: Theory. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:746-757 [Conf]
  9. François Cayre, Caroline Fontaine, Teddy Furon
    Watermarking security part two: Practice. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:758-768 [Conf]
  10. Mauro Barni, Franco Bartolini, Teddy Furon
    A general framework for robust watermarking security. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:10, pp:2069-2084 [Journal]
  11. Luis Pérez-Freire, Fernando Pérez-González, Teddy Furon
    On achievable security levels for lattice data hiding in the known message attack scenario. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:68-79 [Conf]
  12. Teddy Furon
    Hermite polynomials as provably good functions to watermark white gaussian hosts. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:224-229 [Conf]
  13. Teddy Furon
    A constructive and unifying framework for zero-bit watermarking [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  14. On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes. [Citation Graph (, )][DBLP]


  15. Estimating the Minimal Length of Tardos Code. [Citation Graph (, )][DBLP]


  16. On-off keying modulation and tardos fingerprinting. [Citation Graph (, )][DBLP]


  17. Better security levels for broken arrows. [Citation Graph (, )][DBLP]


  18. Expectation maximization decoding of Tardos probabilistic fingerprinting code. [Citation Graph (, )][DBLP]


  19. The Good, the Bad, and the Ugly: three different approaches to break their watermarking system [Citation Graph (, )][DBLP]


  20. Worst case attacks against binary probabilistic traitor tracing codes [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002