The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gwenaël J. Doërr: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox
    Dirty-paper trellis codes for watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:129-132 [Conf]
  2. Christian Rey, Gwenaël J. Doërr, Gabriella Csurka, Jean-Luc Dugelay
    Toward generic image dewatermarking? [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2002, pp:633-636 [Conf]
  3. Gwenaël J. Doërr, Jean-Luc Dugelay
    A Countermeasur to Resist Block Replacement Attacks. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:965-968 [Conf]
  4. Lin Lin, Gwenaël J. Doërr, Ingemar J. Cox, Matthew L. Miller
    An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:697-700 [Conf]
  5. Gwenaël J. Doërr, Jean-Luc Dugelay
    How to Combat Block Replacement Attacks?. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:161-175 [Conf]
  6. Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon
    Watermarking Is Not Cryptography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:1-15 [Conf]
  7. Gwenaël J. Doërr, Jean-Luc Dugelay
    Secure Video Watermarking via Embedding Strength Modulation. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:340-354 [Conf]
  8. Gwenaël J. Doërr, Jean-Luc Dugelay
    Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:216-230 [Conf]
  9. Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox
    Informed Embedding for Multi-bit Watermarks. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:13-21 [Conf]
  10. Gwenaël J. Doërr, Jean-Luc Dugelay
    Secure background watermarking based on video mosaicing. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:304-314 [Conf]
  11. Gwenaël J. Doërr, Jean-Luc Dugelay
    Collusion issue in video watermarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:685-696 [Conf]
  12. Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox
    Applying informed coding and embedding to design a robust high-capacity watermark. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2004, v:13, n:6, pp:792-807 [Journal]
  13. Jean-Luc Dugelay, S. Roche, Christian Rey, Gwenaël J. Doërr
    Still-image watermarking robust to local geometric distortions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2006, v:15, n:9, pp:2831-2842 [Journal]
  14. P. Vinod, Gwenaël J. Doërr, P. K. Bora
    Assessing motion-coherency in video watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:114-119 [Conf]
  15. Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé
    Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:133-142 [Conf]

  16. Design rules for interoperable domains: controlling content dilution and content sharing. [Citation Graph (, )][DBLP]


  17. Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. [Citation Graph (, )][DBLP]


  18. Practical Security Analysis of Dirty Paper Trellis Watermarking. [Citation Graph (, )][DBLP]


  19. Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. [Citation Graph (, )][DBLP]


  20. A comparative study of +/- steganalyzers. [Citation Graph (, )][DBLP]


  21. JPEG recompression detection. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002