Filtrer vos résultats
- 144
- 28
- 110
- 27
- 11
- 9
- 8
- 3
- 2
- 1
- 1
- 10
- 1
- 168
- 51
- 5
- 3
- 6
- 9
- 9
- 11
- 10
- 6
- 7
- 11
- 10
- 4
- 7
- 5
- 10
- 5
- 9
- 12
- 8
- 3
- 5
- 7
- 4
- 4
- 5
- 2
- 2
- 1
- 155
- 17
- 164
- 163
- 14
- 12
- 9
- 7
- 7
- 6
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 172
- 27
- 17
- 16
- 14
- 13
- 10
- 9
- 9
- 9
- 8
- 8
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
Fooling an Automatic Image Quality EstimatorMediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès
hal-03132891v1
|
||
|
A New Measure of Watermarking Security: The Effective Key LengthIEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue
hal-00836404v1
|
||
|
Automatic discovery of discriminative parts as a quadratic assignment problemICCV Workshops -- CEFRL, Oct 2017, Venise, Italy. pp.1059-1068
Communication dans un congrès
hal-01623148v1
|
||
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès
hal-01540890v1
|
||
|
Smooth adversarial examplesEURASIP Journal on Information Security, 2020, 2020 (1), ⟨10.1186/s13635-020-00112-z⟩
Article dans une revue
hal-03017171v1
|
||
Watermarking SecurityNedeljko Cvejic and Tapio Seppanen. Digital Audio Watermarking Techniques and Technologies, Information Science Reference, 2008, 978-1-59904-513-9
Chapitre d'ouvrage
inria-00580838v1
|
|||
|
Décodage EM du code de Tardos pour le fingerprintingProc. XXIIème colloque du GRETSI, Sep 2009, Dijon, France
Communication dans un congrès
inria-00504522v1
|
||
|
Hermite Polynomials as Provably Good Functions to Watermark White Gaussian HostsProc. ACM Multimedia and Security, ACM, 2006, Geneva, Switzerland
Communication dans un congrès
inria-00504548v1
|
||
|
Rennes - une IA souveraine au service de la vie publiqueBulletin de l'Association Française pour l'Intelligence Artificielle, 2021
Article dans une revue
hal-03313161v1
|
||
|
Functional invariants to watermark large transformersICASSP 2024 - IEEE International Conference on Acoustics, Speech and Signal Processing, Apr 2024, Seoul, South Korea. pp.1-5
Communication dans un congrès
hal-04361026v1
|
||
|
Note: An alternative proof of the vulnerability of $k$-NN classifiers in high intrinsic dimensionality regions2021
Pré-publication, Document de travail
hal-03114686v1
|
||
|
Les Mesures Techniques de Protection... autrement dit les DRMColloque PRIAM, Nov 2008, Grenoble, France
Communication dans un congrès
inria-00505909v1
|
||
|
ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUEIEEE International Conference on Digital Signal Processing, Jul 2009, Santorini, Greece
Communication dans un congrès
inria-00505877v1
|
||
|
Privacy Preserving Group Membership Verification and IdentificationCVPR 2019 - IEEE Conference on Computer Vision and Pattern Recognition, Jun 2019, Long Beach, United States. pp.1-9
Communication dans un congrès
hal-02107442v1
|
||
|
Le traçage de traîtresSymposium sur la Sécurité des Technologies de l'Information et des Communications, Jun 2009, Rennes, France
Communication dans un congrès
inria-00505885v1
|
||
|
Practical Key Length of Watermarking SystemsICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing, Mar 2012, Kyoto, Japan
Communication dans un congrès
hal-00686813v1
|
||
Extreme-value-theoretic estimation of local intrinsic dimensionalityData Mining and Knowledge Discovery, 2018, 32 (6), pp.1768-1805. ⟨10.1007/s10618-018-0578-6⟩
Article dans une revue
hal-01864580v1
|
|||
Application of Side-Informed Embedding and Polynomial Detection to Audio WatermarkingInt. Conf. on Multimedia and Expo, IEEE, Jul 2003, Baltimore, MY, USA, United States
Communication dans un congrès
inria-00083363v1
|
|||
|
Tatouage asymétriqueF. Davoine et S. Pateux. Tatouage de documents audiovisuels numériques, Hermès Science, pp.215--227, 2004, Traité IC2 Information-Commande-Communication, série Traitement du Signal et de l'Image, ISBN-2-7462-0816-4
Chapitre d'ouvrage
inria-00083368v1
|
||
|
Some theoretical aspects of watermarking detectionSecurity, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, Jan 2006, San Jose, CA, USA, United States
Communication dans un congrès
inria-00083370v1
|
||
|
The illusion of group testing[Research Report] RR-9164, Inria Rennes Bretagne Atlantique. 2018, pp.1-19
Rapport
hal-01744252v1
|
||
|
Watermarking Images in Self-Supervised Latent SpacesICASSP 2022 - IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, May 2022, Singapore, Singapore. pp.1-5
Communication dans un congrès
hal-03591396v1
|
||
|
Beyond "project and sign" for cosine estimation with binary codesICASPP - International Conference on Acoustics, Speech, and Signal Processing, IEEE, May 2014, Florence, Italy
Communication dans un congrès
hal-00942075v1
|
||
|
Actes de la conférence CAID 20202021
Proceedings/Recueil des communications
hal-03206297v1
|
||
|
Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'InformationGRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images, Aug 2023, Grenoble, France. pp.1-4
Communication dans un congrès
hal-04149340v2
|
||
|
Binary Tardos Codes and Zero-bit WatermarkingSignal and Image Processing. Université de Rennes 1, 2018
HDR
tel-01932766v1
|
||
|
Group Membership Verification with Privacy: Sparse or Dense?WIFS 2019 - IEEE International Workshop on Information Forensics and Security, Dec 2019, Delft, Netherlands. pp.1-6
Communication dans un congrès
hal-02489991v2
|
||
|
Walking on the Edge: Fast, Low-Distortion Adversarial ExamplesIEEE Transactions on Information Forensics and Security, 2020, 16, pp.701 - 713. ⟨10.1109/TIFS.2020.3021899⟩
Article dans une revue
hal-02931493v1
|
||
|
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Jul 2017, Honolulu, United States
Communication dans un congrès
hal-01505470v1
|
||
|
The Stable Signature: Rooting Watermarks in Latent Diffusion ModelsICCV 2023 - International Conference on Computer Vision, Oct 2023, Paris, France
Communication dans un congrès
hal-04176523v1
|