Teddy Furon

Orcid: 0000-0002-1565-765X

According to our database1, Teddy Furon authored at least 130 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Watermarking Makes Language Models Radioactive.
CoRR, 2024

Proactive Detection of Voice Cloning with Localized Watermarking.
CoRR, 2024

2023
Fingerprinting Classifiers With Benign Inputs.
IEEE Trans. Inf. Forensics Secur., 2023

Functional Invariants to Watermark Large Transformers.
CoRR, 2023

Three Bricks to Consolidate Watermarks for Large Language Models.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Active Image Indexing.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

How to choose your best allies for a transferable attack?
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

The Stable Signature: Rooting Watermarks in Latent Diffusion Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Model Fingerprinting with Benign Inputs.
Proceedings of the IEEE International Conference on Acoustics, 2023

Mixer: DNN Watermarking using Image Mixup.
Proceedings of the IEEE International Conference on Acoustics, 2023

Gradient-Informed Neural Network Statistical Robustness Estimation.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

2022
Generating Adversarial Images in Quantized Domains.
IEEE Trans. Inf. Forensics Secur., 2022

FBI: Fingerprinting models with Benign Inputs.
CoRR, 2022

AggNet: Learning to Aggregate Faces for Group Membership Verification.
CoRR, 2022

Randomized Smoothing under Attack: How Good is it in Pratice?
CoRR, 2022

ROSE: A RObust and SEcure DNN Watermarking.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Impact of Downscaling on Adversarial Images.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Randomized Smoothing Under Attack: How Good is it in Practice?
Proceedings of the IEEE International Conference on Acoustics, 2022

Watermarking Images in Self-Supervised Latent Spaces.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Walking on the Edge: Fast, Low-Distortion Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2021

High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence.
IEEE Trans. Inf. Forensics Secur., 2021

Efficient Statistical Assessment of Neural Network Corruption Robustness.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks.
Proceedings of the Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, 2021

Trustworthy AI'21: 1st International Workshop on Trustworthy AI for Multimedia Computing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

RoBIC: A Benchmark Suite For Assessing Classifiers Robustness.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

SurFree: A Fast Surrogate-Free Black-Box Attack.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Are Classification Deep Neural Networks Good for Blind Image Watermarking?
Entropy, 2020

Smooth adversarial examples.
EURASIP J. Inf. Secur., 2020

Adversarial Images through Stega Glasses.
CoRR, 2020

Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions.
CoRR, 2020

Defending Adversarial Examples via DNN Bottleneck Reinforcement.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Fooling an Automatic Image Quality Estimator.
Proceedings of the Working Notes Proceedings of the MediaEval 2020 Workshop, 2020

What if Adversarial Samples were Digital Images?
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Forensics Through Stega Glasses: The Case of Adversarial Images.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

Joint Learning of Assignment and Representation for Biometric Group Membership.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Group Membership Verification with Privacy: Sparse or Dense?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Aggregation and Embedding for Group Membership Verification.
Proceedings of the IEEE International Conference on Acoustics, 2019

Privacy Preserving Group Membership Verification and Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

2018
Memory Vectors for Similarity Search in High-Dimensional Spaces.
IEEE Trans. Big Data, 2018

Extreme-value-theoretic estimation of local intrinsic dimensionality.
Data Min. Knowl. Discov., 2018

Are Deep Neural Networks good for blind image watermarking?
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Fast Spectral Ranking for Similarity Search.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking.
Proceedings of the Computer Vision - ACCV 2018, 2018

Binary Tardos Codes and Zero-bit Watermarking.
, 2018

2017
Panorama to Panorama Matching for Location Recognition.
Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, 2017

Identity Documents Classification as an Image Classification Problem.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017

Complex Document Classification and Localization Application on Identity Document Images.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Automatic Discovery of Discriminative Parts as a Quadratic Assignment Problem.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

About zero bitwatermarking error exponents.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Privacy-Preserving Outsourced Media Search.
IEEE Trans. Knowl. Data Eng., 2016

Automatic discovery of discriminative parts as a quadratic assignment problem.
CoRR, 2016

Scaling Group Testing Similarity Search.
Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, 2016

Group Testing for Identification with Privacy.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Differentially Private Matrix Factorization using Sketching Techniques.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Sketching Techniques for Very Large Matrix Factorization.
Proceedings of the Advances in Information Retrieval, 2016

Efficient Large-Scale Similarity Search Using Matrix Factorization.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016

2015
Rotation and translation covariant match kernels for image retrieval.
Comput. Vis. Image Underst., 2015

Estimating Local Intrinsic Dimensionality.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

2014
Tardos codes for real.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Puzzling face verification algorithms for privacy protection.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

A Group Testing Framework for Similarity Search in High-dimensional Spaces.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Instance classification with prototype selection.
Proceedings of the International Conference on Multimedia Retrieval, 2014

Beyond "project and sign" for cosine estimation with binary codes.
Proceedings of the IEEE International Conference on Acoustics, 2014

Challenging Differential Privacy: The Case of Non-interactive Mechanisms.
Proceedings of the Computer Security - ESORICS 2014, 2014

Orientation Covariant Aggregation of Local Descriptors with Embeddings.
Proceedings of the Computer Vision - ECCV 2014, 2014

2013
A New Measure of Watermarking Security: The Effective Key Length.
IEEE Trans. Inf. Forensics Secur., 2013

Fast and secure similarity search in high dimensional space.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Secure and efficient approximate nearest neighbors search.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes.
IEEE Trans. Inf. Forensics Secur., 2012

Sequential Monte Carlo for rare event estimation.
Stat. Comput., 2012

The Effective Key Length of Watermarking Schemes
CoRR, 2012

Decoding fingerprints using the Markov Chain Monte Carlo method.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Security-oriented picture-in-picture visual modifications.
Proceedings of the International Conference on Multimedia Retrieval, 2012

A New Measure of Watermarking Security Applied on QIM.
Proceedings of the Information Hiding - 14th International Conference, 2012

Anti-sparse coding for approximate nearest neighbor search.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Practical key length of watermarking systems.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Key length estimation of zero-bit watermarking schemes.
Proceedings of the 20th European Signal Processing Conference, 2012

Are 128 Bits Long Keys Possible in Watermarking?
Proceedings of the Communications and Multimedia Security, 2012

2011
Towards joint decoding of Tardos fingerprinting codes
CoRR, 2011

Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm.
Proceedings of the Information Hiding - 13th International Conference, 2011

An Asymmetric Fingerprinting Scheme Based on Tardos Codes.
Proceedings of the Information Hiding - 13th International Conference, 2011

Iterative single tardos decoder with controlled probability of false positive.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Group testing meets traitor tracing.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
Décodage EM du code de Tardos pour le fingerprinting.
Traitement du Signal, 2010

Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread.
IEEE Secur. Priv., 2010

Challenging the security of Content-Based Image Retrieval systems.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Towards robust and secure watermarking.
Proceedings of the Multimedia and Security Workshop, 2010

Deluding image recognition in sift-based cbir systems.
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, 2010

Understanding the security and robustness of SIFT.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Better security levels for broken arrows.
Proceedings of the Media Forensics and Security II, 2010

2009
Blind decoder for binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Worst case attacks against binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

EM decoding of tardos traitor tracing codes.
Proceedings of the Multimedia and Security Workshop, 2009

Expectation maximization decoding of Tardos probabilistic fingerprinting code.
Proceedings of the Media Forensics and Security I, 2009

Estimating the Minimal Length of Tardos Code.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Estimating the probability fo false alarm for a zero-bit watermarking technique.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
Broken Arrows.
EURASIP J. Inf. Secur., 2008

Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes.
EURASIP J. Inf. Secur., 2008

On-off keying modulation and tardos fingerprinting.
Proceedings of the 10th workshop on Multimedia & Security, 2008

On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
A Constructive and Unifying Framework for Zero-Bit Watermarking.
IEEE Trans. Inf. Forensics Secur., 2007

The good, the bad, and the ugly: three different approaches to break their watermarking system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Trans. Inf. Forensics Secur., 2006

Some theoretical aspects of watermarking detection.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

On achievable security levels for lattice data hiding in the known message attack scenario.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Hermite polynomials as provably good functions to watermark white gaussian hosts.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Watermarking Is Not Cryptography.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

2005
Watermarking security: theory and practice.
IEEE Trans. Signal Process., 2005

Watermarking security part two: Practice.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Watermarking security part one: Theory.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A Survey of Watermarking Security.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A theoretical study of watermarking security.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Copy protection system for digital home networks.
IEEE Signal Process. Mag., 2004

Towards digital rights and exemptions management systems.
Comput. Law Secur. Rev., 2004

Watermarking Attack: Security of WSS Techniques.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

2003
An asymmetric watermarking method.
IEEE Trans. Signal Process., 2003

A general framework for robust watermarking security.
Signal Process., 2003

Improved polynomial detectors for side-informed watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Application of side-informed embedding and polynomial detection to audio watermarking.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Applied public-key steganography.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Robustness and Efficiency of Non-linear Side-Informed Watermarking.
Proceedings of the Information Hiding, 5th International Workshop, 2002

JANIS: Just Another n-order Side-Informed Watermarking Scheme.
Proceedings of the 2002 International Conference on Image Processing, 2002

Side-informed watermarking using n<sup>th</sup>-order polynomial detectors.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
Unified approach of asymmetric watermarking schemes.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

2000
Robustness of an Asymmetric Watermarking Technique.
Proceedings of the 2000 International Conference on Image Processing, 2000

Audio public key watermarking technique.
Proceedings of the IEEE International Conference on Acoustics, 2000

1999
An Asymmetric Public Detection Watermarking Technique.
Proceedings of the Information Hiding, Third International Workshop, 1999


  Loading...