Watermarking security: Theory and practice F Cayre, C Fontaine, T Furon Signal Processing, IEEE Transactions on 53 (10), 3976-3987, 2005 | 346 | 2005 |
Sequential Monte Carlo for rare event estimation F Cérou, P Del Moral, T Furon, A Guyader Statistics and computing 22 (3), 795-808, 2012 | 195 | 2012 |
An asymmetric watermarking method T Furon, P Duhamel IEEE Transactions on Signal Processing 51 (4), 981-995, 2003 | 158 | 2003 |
A general framework for robust watermarking security M Barni, F Bartolini, T Furon Signal Processing 83 (10), 2069-2084, 2003 | 156 | 2003 |
Efficient diffusion on region manifolds: Recovering small objects with compact cnn representations A Iscen, G Tolias, Y Avrithis, T Furon, O Chum Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2017 | 131 | 2017 |
An asymmetric public detection watermarking technique T Furon, P Duhamel International Workshop on Information Hiding, 88-100, 1999 | 108 | 1999 |
Watermarking is not cryptography IJ Cox, G Doërr, T Furon International Workshop on Digital Watermarking, 1-15, 2006 | 106 | 2006 |
Estimating local intrinsic dimensionality L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ... Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015 | 82 | 2015 |
On the design and optimization of Tardos probabilistic fingerprinting codes T Furon, A Guyader, F Cérou International Workshop on Information Hiding, 341-356, 2008 | 75 | 2008 |
Broken arrows T Furon, P Bas EURASIP Journal on Information Security 2008, 1-13, 2008 | 68 | 2008 |
Applied public-key steganography P Guillon, T Furon, P Duhamel Security and Watermarking of Multimedia Contents IV 4675, 38-49, 2002 | 65 | 2002 |
Unified approach of asymmetric watermarking schemes T Furon, I Venturini, P Duhamel Security and Watermarking of Multimedia Contents III 4314, 269-279, 2001 | 62 | 2001 |
Security of lattice-based data hiding against the known message attack L Pérez-Freire, F Pérez-González, T Furon, P Comesana IEEE Transactions on Information Forensics and Security 1 (4), 421-439, 2006 | 57 | 2006 |
Anti-sparse coding for approximate nearest neighbor search H Jégou, T Furon, JJ Fuchs 2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012 | 52 | 2012 |
Robustness of asymmetric watermarking technique T Furon, P Duhamel Proceedings 2000 International Conference on Image Processing (Cat. No …, 2000 | 51 | 2000 |
Memory vectors for similarity search in high-dimensional spaces A Iscen, T Furon, V Gripon, M Rabbat, H Jégou IEEE transactions on big data 4 (1), 65-77, 2017 | 47 | 2017 |
On-off keying modulation and Tardos fingerprinting F Xie, T Furon, C Fontaine Proceedings of the 10th ACM workshop on Multimedia and security, 101-106, 2008 | 47 | 2008 |
Generating textual adversarial examples for deep learning models: A survey WE Zhang, QZ Sheng, AAF Alhazmi, C Li CoRR, abs/1901.06796, 2019 | 46* | 2019 |
Watermarking security part one: theory F Cayre, C Fontaine, T Furon Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005 | 46 | 2005 |
Worst case attacks against binary probabilistic traitor tracing codes T Furon, L Pérez-Freire 2009 First IEEE International Workshop on Information Forensics and Security …, 2009 | 44 | 2009 |