Export 6 results:
Author Title [ Type(Desc)] Year
Filters: Keyword is watermarking and Author is Teddy Furon  [Clear All Filters]
Conference Paper
L. Pérez-Freire, Pérez-González, F., and Furon, T., On achievable security levels for lattice data hiding in the Known Message Attack scenario, in ACM Workshop on Multimedia and Security (MMSEC), Geneva, Switzerland, 2006, pp. 68-79.
L. Pérez-Freire and Furon, T., Blind decoder for binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 56-60.
T. Furon and Pérez-Freire, L., EM decoding of Tardos traitor tracing codes, in ACM Workshop on Multimedia and Security (MMSEC), Princeton, NJ, USA, 2009.
T. Furon, Pérez-Freire, L., Guyader, A., and Cérou, F., Estimating the minimal length of Tardos code, in International Workshop on Information Hiding (IH), Darmstadt, Germany, 2009.
T. Furon and Pérez-Freire, L., Worst case attacks against binary probabilistic traitor tracing codes, in IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 2009, pp. 46-50.
Journal Article
L. Pérez-Freire, Pérez-González, F., Furon, T., and Comesaña, P., Security of lattice-based data hiding against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006.PDF icon tifs06security.pdf (563.51 KB)