Gwenaël J. Doërr

Orcid: 0009-0005-5124-3111

According to our database1, Gwenaël J. Doërr authored at least 68 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Next-Generation Access Tokens to Fight CDN Leeching.
Proceedings of the 3rd Mile-High Video Conference, 2024

2023
Information Forensics and Security: A quarter-century-long journey.
IEEE Signal Process. Mag., July, 2023

CDN Performance Evaluation with Edge-Embedded Watermarking.
Proceedings of the 2nd Mile-High Video Conference, 2023

2017
Flicker Forensics for Camcorder Piracy.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Impact of screencasting on video temporal synchronization.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Disparity estimation and disparity-coherent watermarking.
Proceedings of the Media Watermarking, 2015

Flicker Forensics for Pirate Device Identification.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Outlier aggregation to pick up scattered watermark energy.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Anti-cropping blind resynchronization for 3D watermarking.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework.
IEEE Trans. Inf. Forensics Secur., 2014

A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation.
IEEE Trans. Inf. Forensics Secur., 2014

Security analysis of radial-based 3D watermarking systems.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Forensic characterization of pirated movies: digital cinema cam vs. optical disc rip.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Modeling the flicker effect in camcorded videos to improve watermark robustness.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism.
Proceedings of the SECRYPT 2014, 2014

Blind detection for disparity-coherent stereo video watermarking.
Proceedings of the Media Watermarking, 2014

Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Lightweight forensic video watermarking to enable premium content consumption on mobile devices.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Impact of geometry-preserving encryption on rendering time.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Adjusting bit-stream video watermarking systems to cope with HTTP adaptive streaming transmission.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Robust diameter-based thickness estimation of 3D objects.
Graph. Model., 2013

Exploring color information to characterize camcorder piracy.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

A sneak peek into the camcorder path.
Proceedings of the Media Watermarking, 2013

Impact of content mastering on the throughput of a bit stream video watermarking system.
Proceedings of the IEEE International Conference on Image Processing, 2013

Semi-blind automatic temporal registration for video watermarking systems.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Normalized Energy Density-Based Forensic Detection of Resampled Images.
IEEE Trans. Multim., 2012

AC-3 bit stream watermarking.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Forensic characterization of camcorded movies: digital cinema vs. celluloid film prints.
Proceedings of the Media Watermarking, 2012

Simulating large scale acoustic path benchmarking.
Proceedings of the Media Watermarking, 2012

2011
Improving Tonality Measures for Audio Watermarking.
Proceedings of the Information Hiding - 13th International Conference, 2011

An energy-based method for the forensic detection of Re-sampled images.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Virtual view invariant domain for 3D video blind watermarking.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Efficient coherent phase quantization for audio watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread.
IEEE Secur. Priv., 2010

FLD-based detection of re-compressed speech signals.
Proceedings of the Multimedia and Security Workshop, 2010

Multimedia security technologies for movie protection.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

JPEG recompression detection.
Proceedings of the Media Forensics and Security II, 2010

2009
Detection of motion-incoherent components in video streams.
IEEE Trans. Inf. Forensics Secur., 2009

2008
A comparative study of +/- steganalyzers.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema.
Proceedings of the International Conference on Image Processing, 2008

Design rules for interoperable domains: controlling content dilution and content sharing.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Trellis coded modulation to improve dirty paper trellis watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Steganalysis for LSB Matching in Images with High-frequency Noise.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

Practical Security Analysis of Dirty Paper Trellis Watermarking.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
On the Need for Signal-Coherent Watermarks.
IEEE Trans. Multim., 2006

Still-image watermarking robust to local geometric distortions.
IEEE Trans. Image Process., 2006

Spread Transform Dither Modulation using a Perceptual Model.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Assessing motion-coherency in video watermarking.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Watermarking Is Not Cryptography.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Toward a Better Understanding of Dirty Paper Trellis Codes.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Collusion issue in video watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

How to Combat Block Replacement Attacks?.
Proceedings of the Information Hiding, 7th International Workshop, 2005

An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005

A Countermeasur to Resist Block Replacement Attacks.
Proceedings of the 2005 International Conference on Image Processing, 2005

2004
Security pitfalls of frame-by-frame approaches to video watermarking.
IEEE Trans. Signal Process., 2004

Applying informed coding and embedding to design a robust high-capacity watermark.
IEEE Trans. Image Process., 2004

Secure background watermarking based on video mosaicing.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Exploiting self-similarities to defeat digital watermarking systems: a case study on still images.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Danger of low-dimensional watermarking subspaces.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
A guide tour of video watermarking.
Signal Process. Image Commun., 2003

Secure Video Watermarking via Embedding Strength Modulation.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

New intra-video collusion attack using mosaicing.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Informed Embedding for Multi-bit Watermarks.
Proceedings of the Digital Watermarking, First International Workshop, 2002

Toward generic image dewatermarking?
Proceedings of the 2002 International Conference on Image Processing, 2002

Dirty-paper trellis codes for watermarking.
Proceedings of the 2002 International Conference on Image Processing, 2002


  Loading...