|
||
---|---|---|
hal-00437864v1
Journal articles
Comparison of secure spread-spectrum modulations applied to still image watermarking Annals of Telecommunications - annales des télécommunications, Springer, 2009, 64 (11-12), pp.801-813. ⟨10.1007/s12243-009-0119-9⟩ |
||
hal-00325091v1
Journal articles
Kerckhoffs-based embedding security classes for WOA data-hiding IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2008, 3 (1), pp.1-15. ⟨10.1109/TIFS.2007.916006⟩ |
||
hal-00335311v1
Journal articles
Broken Arrows EURASIP Journal on Information Security, Hindawi/SpringerOpen, 2008, 2008, pp.ID 597040. ⟨10.1155/2008/597040⟩ |
||
hal-00437891v1
Journal articles
Une methodologie pour la selection de variables pour la steganalyse Traitement du Signal, Lavoisier, 2009, 26 (1), pp.13-30 |
||
hal-00437902v1
Conference papers
Optimization of Natural Watermarking Using Transportation Theory ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8 |
||
hal-00384058v1
Conference papers
Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8 |
||
hal-00437868v1
Journal articles
Reliable Steganalysis Using a Minimum Set of Samples and Features EURASIP Journal on Information Security, Hindawi/SpringerOpen, 2009, 2009, pp.ID 901381. ⟨10.1155/2009/901381⟩ |
||
hal-00157965v1
Other publications
Natural Watermarking: a secure spread spectrum technique for WOA 2007, pp.8 |
||
hal-00166725v1
Conference papers
Techniques sûres de tatouage pour l'image CORESA 2007 - 12èmes Journées d´Etudes et d´Echanges COmpression et REprésentation des Signaux Audiovisuels, Nov 2007, Montpellier, France. pp.electronic version |
||
hal-00166726v1
Conference papers
Practical Performance Analysis of Secure Modulations for WOA Spread-Spectrum based Image Watermarking ACM Multimedia and Security Workshop 2007, Sep 2007, Dallas, United States. pp.electronic version |
||
hal-00325080v1
Conference papers
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding Information Hiding 2008, Jun 2008, Santa-Barbara, United States |
||
hal-00580748v1
Other publications
Subjective Quality assessment of the Broken Arrows watermarking technique 2009, http://www.irccyn.ec-nantes.fr/~autrusse/Databases/BrokenArrows/ |
||
hal-00541415v1
Journal articles
OP-ELM: Optimally-Pruned Extreme Learning Machine IEEE Transactions on Neural Networks, Institute of Electrical and Electronics Engineers, 2009, 21 (1), pp.158-162. ⟨10.1109/TNN.2009.2036259⟩ |
||
hal-00166690v1
Conference papers
Practical Security Analysis of Dirty Paper Trellis Watermarking Information Hiding: 9th International Workshop, IH 2007, Jun 2007, Saint-Malo, France. pp.396 |
||
hal-00166695v1
Conference papers
Advantages of Using Feature Selection Techniques on Steganalysis Schemes IWANN 2007 - 9th International Work-Conference on Artificial Neural Networks, Jun 2007, San Sebastian, Spain. pp.electronic version |
||
hal-00371146v1
Conference papers
On security threats for robust perceptual hashing Media Forensics and Security, Jan 2009, San Jose, United States. pp.id 807487, ⟨10.1117/12.807487⟩ |
||
hal-00325086v1
Conference papers
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes ACM Multimedia and Security Workshop 2008, Sep 2008, -, United Kingdom. pp.227--232 |
||
hal-00166700v1
Conference papers
Extracting relevant features of steganographic schemes by feature selection techniques WaCHa 2007 - Third Wavila Challenge, Jun 2007, Saint-Malo, France. pp.electronic version |
||
hal-00437905v1
Conference papers
Steganalysis by Subtractive Pixel Adjacency Matrix ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.75-84 |
||
hal-00166692v1
Conference papers
Avantages de la Sélection de Caractéristiques pour la Stéganalyse GRETSI 2007 - XXIème Colloque francophone de traitement du signal et des images, Sep 2007, Troyes, France. pp.electronic version |
||
inria-00504303v1
Directions of work or proceedings
Proceedings of the 9th Information Hiding Workshop Teddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. 4567, Springer Verlag, pp.1--391, 2007 |
||
|