Seguir
Teddy Furon
Teddy Furon
INRIA Rennes - IRISA
Dirección de correo verificada de inria.fr - Página principal
Título
Citado por
Citado por
Año
Watermarking security: Theory and practice
F Cayre, C Fontaine, T Furon
Signal Processing, IEEE Transactions on 53 (10), 3976-3987, 2005
4112005
Sequential Monte Carlo for rare event estimation
F Cérou, P Del Moral, T Furon, A Guyader
Statistics and computing 22 (3), 795-808, 2012
2782012
Efficient diffusion on region manifolds: Recovering small objects with compact cnn representations
A Iscen, G Tolias, Y Avrithis, T Furon, O Chum
Proceedings of the IEEE conference on computer vision and pattern …, 2017
2282017
The stable signature: Rooting watermarks in latent diffusion models
P Fernandez, G Couairon, H Jégou, M Douze, T Furon
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
1822023
Estimating local intrinsic dimensionality
L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ...
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
1732015
A general framework for robust watermarking security
M Barni, F Bartolini, T Furon
Signal Processing 83 (10), 2069-2084, 2003
1672003
An asymmetric watermarking method
T Furon, P Duhamel
IEEE Transactions on Signal Processing 51 (4), 981-995, 2003
1662003
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
1212017
Watermarking is not cryptography
IJ Cox, G Doërr, T Furon
International Workshop on Digital Watermarking, 1-15, 2006
1202006
An asymmetric public detection watermarking technique
T Furon, P Duhamel
International Workshop on Information Hiding, 88-100, 1999
1151999
Surfree: a fast surrogate-free black-box attack
T Maho, T Furon, E Le Merrer
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
1132021
Watermarking images in self-supervised latent spaces
P Fernandez, A Sablayrolles, T Furon, H Jégou, M Douze
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
842022
On the design and optimization of Tardos probabilistic fingerprinting codes
T Furon, A Guyader, F Cérou
International Workshop on Information Hiding, 341-356, 2008
792008
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
772008
Memory vectors for similarity search in high-dimensional spaces
A Iscen, T Furon, V Gripon, M Rabbat, H Jégou
IEEE transactions on big data 4 (1), 65-77, 2017
742017
Applied public-key steganography
P Guillon, T Furon, P Duhamel
Security and Watermarking of Multimedia Contents IV 4675, 38-49, 2002
702002
Walking on the edge: Fast, low-distortion adversarial examples
H Zhang, Y Avrithis, T Furon, L Amsaleg
IEEE Transactions on Information Forensics and Security 16, 701-713, 2020
682020
Extreme-value-theoretic estimation of local intrinsic dimensionality
L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ...
Data Mining and Knowledge Discovery 32 (6), 1768-1805, 2018
672018
Unified approach of asymmetric watermarking schemes
T Furon, I Venturini, P Duhamel
Security and Watermarking of Multimedia Contents III 4314, 269-279, 2001
672001
Complex document classification and localization application on identity document images
AM Awal, N Ghanmi, R Sicre, T Furon
2017 14th IAPR International Conference on Document Analysis and Recognition …, 2017
662017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20