Fabien A. P. Petitcolas

Orcid: 0000-0002-4108-3899

According to our database1, Fabien A. P. Petitcolas authored at least 35 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
ExMo: Explainable AI Model Using Inverse Frequency Decision Rules.
Proceedings of the Artificial Intelligence in HCI, 2022

2021
Explainable Machine Learning for Fraud Detection.
Computer, 2021

2019
PINFER: Privacy-Preserving Inference for Machine Learning.
CoRR, 2019

Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication.
CoRR, 2019

PINFER: Privacy-Preserving Inference - Logistic Regression, Support Vector Machines, and More, over Encrypted Data.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

Privacy-Enhancing Context Authentication from Location-Sensitive Data.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
A First Look at Identity Management Schemes on the Blockchain.
IEEE Secur. Priv., 2018

Decentralizing Digital Identity: Open Challenges for Distributed Ledgers.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

2017
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

2015
Information Hiding.
Artech House information security and privacy series, Artech House, ISBN: 978-1-60807-928-5, 2015

2011
Kerckhoffs' Principle.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2007
The Replacement Attack.
IEEE Trans. Speech Audio Process., 2007

2003
Blind pattern matching attack on watermarking systems.
IEEE Trans. Signal Process., 2003

Digital rights management for digital cinema.
Multim. Syst., 2003

Authentication of MPEG-4 data: risks and solutions.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

3D watermarking design evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Digital Watermarking.
Proceedings of the Digital Rights Management, 2003

2002
Defining security in steganographic systems.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

The blind pattern matching attack on watermark systems.
Proceedings of the IEEE International Conference on Acoustics, 2002

Replacement Attack on Arbitrary Watermarking Systems.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Watermarking schemes evaluation.
IEEE Signal Process. Mag., 2000

Fair evaluation methods for image watermarking systems.
J. Electronic Imaging, 2000

Possible counter-attacks against random geometric distortions.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Watermarking scheme evaluation tool.
Proceedings of the 2000 International Symposium on Multimedia Software Engineering, 2000

1999
Information hiding and its application to copyright protection
PhD thesis, 1999

Information hiding-a survey.
Proc. IEEE, 1999

Fair benchmark for image watermarking systems.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Evaluation of Copyright Marking Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
On the limits of steganography.
IEEE J. Sel. Areas Commun., 1998

WebGroup: A Secure Group Access Control Tool for the World-Wide Web.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

The Eternal Resource Locator: An Alternative Means of Establishing Trust on the World Wide Web.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Attacks on Copyright Marking Systems.
Proceedings of the Information Hiding, 1998

1997
Secure Books: Protecting the Distribution of Knowledge.
Proceedings of the Security Protocols, 1997


  Loading...