Folgen
Teddy Furon
Teddy Furon
INRIA Rennes - IRISA
Bestätigte E-Mail-Adresse bei inria.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Watermarking security: Theory and practice
F Cayre, C Fontaine, T Furon
Signal Processing, IEEE Transactions on 53 (10), 3976-3987, 2005
4082005
Sequential Monte Carlo for rare event estimation
F Cérou, P Del Moral, T Furon, A Guyader
Statistics and computing 22 (3), 795-808, 2012
2782012
Efficient diffusion on region manifolds: Recovering small objects with compact cnn representations
A Iscen, G Tolias, Y Avrithis, T Furon, O Chum
Proceedings of the IEEE conference on computer vision and pattern …, 2017
2222017
Estimating local intrinsic dimensionality
L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ...
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
1682015
A general framework for robust watermarking security
M Barni, F Bartolini, T Furon
Signal Processing 83 (10), 2069-2084, 2003
1672003
An asymmetric watermarking method
T Furon, P Duhamel
IEEE Transactions on Signal Processing 51 (4), 981-995, 2003
1662003
The stable signature: Rooting watermarks in latent diffusion models
P Fernandez, G Couairon, H Jégou, M Douze, T Furon
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
1562023
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
1212017
Watermarking is not cryptography
IJ Cox, G Doërr, T Furon
International Workshop on Digital Watermarking, 1-15, 2006
1202006
An asymmetric public detection watermarking technique
T Furon, P Duhamel
International Workshop on Information Hiding, 88-100, 1999
1151999
Surfree: a fast surrogate-free black-box attack
T Maho, T Furon, E Le Merrer
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
1062021
On the design and optimization of Tardos probabilistic fingerprinting codes
T Furon, A Guyader, F Cérou
International Workshop on Information Hiding, 341-356, 2008
792008
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
772008
Watermarking images in self-supervised latent spaces
P Fernandez, A Sablayrolles, T Furon, H Jégou, M Douze
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
752022
Memory vectors for similarity search in high-dimensional spaces
A Iscen, T Furon, V Gripon, M Rabbat, H Jégou
IEEE transactions on big data 4 (1), 65-77, 2017
732017
Applied public-key steganography
P Guillon, T Furon, P Duhamel
Security and Watermarking of Multimedia Contents IV 4675, 38-49, 2002
702002
Unified approach of asymmetric watermarking schemes
T Furon, I Venturini, P Duhamel
Security and Watermarking of Multimedia Contents III 4314, 269-279, 2001
672001
Walking on the edge: Fast, low-distortion adversarial examples
H Zhang, Y Avrithis, T Furon, L Amsaleg
IEEE Transactions on Information Forensics and Security 16, 701-713, 2020
662020
Extreme-value-theoretic estimation of local intrinsic dimensionality
L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ...
Data Mining and Knowledge Discovery 32 (6), 1768-1805, 2018
642018
Complex document classification and localization application on identity document images
AM Awal, N Ghanmi, R Sicre, T Furon
2017 14th IAPR International Conference on Document Analysis and Recognition …, 2017
642017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20