François Cayre

Orcid: 0000-0002-6634-9147

According to our database1, François Cayre authored at least 41 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Disentangling copy-moved source and target areas.
Appl. Soft Comput., 2021

2020
GRAFT: Unsupervised Adaptation to Resizing for Detection of Image Manipulation.
IEEE Access, 2020

2019
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Complexity and Similarity for Sequences using LZ77-based conditional information measure.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2017
Clustering and causality inference using algorithmic complexity.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality".
IEEE Trans. Inf. Forensics Secur., 2016

SALZA: Soft algorithmic complexity estimates for clustering and causality inference.
CoRR, 2016

An effective histogram-based approach to JPEG-100 forensics.
Proceedings of the Sixth International Conference on Image Processing Theory, 2016

2015
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution.
IEEE Trans. Inf. Forensics Secur., 2015

General-purpose image forensics using patch likelihood under image statistical models.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

2014
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images.
IEEE Trans. Image Process., 2014

JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality.
IEEE Trans. Inf. Forensics Secur., 2014

2013
Impacts of Watermarking Security on Tardos-Based Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2013

Towards a realistic channel model for security analysis of authentication using graphical codes.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

A variational approach to JPEG anti-forensics.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Practical key length of watermarking systems.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

3D lighting-based image forgery detection using shape-from-shading.
Proceedings of the 20th European Signal Processing Conference, 2012

2D bar-codes for authentication: A security approach.
Proceedings of the 20th European Signal Processing Conference, 2012

2010
Security and robustness constraints for spread-spectrum Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Considering security and robustness constraints for watermark-based Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

2009
Comparison of secure spread-spectrum modulations applied to still image watermarking.
Ann. des Télécommunications, 2009

Optimization of natural watermarking using transportation theory.
Proceedings of the Multimedia and Security Workshop, 2009

On security threats for robust perceptual hashing.
Proceedings of the Media Forensics and Security I, 2009

2008
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2008

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
The good, the bad, and the ugly: three different approaches to break their watermarking system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?
Proceedings of the International Conference on Image Processing, 2007

2006
Achieving subspace or key security for WOA using natural or circular watermarking.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Natural Watermarking: A Secure Spread Spectrum Technique for WOA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Watermarking security: theory and practice.
IEEE Trans. Signal Process., 2005

Watermarking security part two: Practice.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Watermarking security part one: Theory.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A theoretical study of watermarking security.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Watermarking Attack: Security of WSS Techniques.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

2003
Contributions au tatouage des maillages surfaciques 3D. (Contributions to watermarking of 3D triangle meshes).
PhD thesis, 2003

Data hiding on 3-D triangle meshes.
IEEE Trans. Signal Process., 2003

Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry.
Signal Process. Image Commun., 2003

Lapped spectral decomposition for 3D triangle mesh compression.
Proceedings of the 2003 International Conference on Image Processing, 2003

2002
The Certimark benchmark: architecture and future perspectives.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002


  Loading...