Beyond "project and sign" for cosine estimation with binary codes, ICASPP-International Conference on Acoustics, Speech, and Signal Processing, 2014. ,
DOI : 10.1109/icassp.2014.6854934
URL : https://hal.archives-ouvertes.fr/hal-00942075
Fast and secure similarity search in high dimensional space, IEEE International Workshop on Information Forensics and Security, 2013. ,
DOI : 10.1109/wifs.2013.6707797
URL : https://hal.archives-ouvertes.fr/hal-00857570
Scaling Group Testing Similarity Search, ACM International Conference on Multimedia Retrieval, 2016. ,
DOI : 10.1145/2911996.2912010
URL : https://hal.archives-ouvertes.fr/hal-01304287
Memory vectors for similarity search in highdimensional spaces, IEEE Transactions on Big Data, 2017. ,
DOI : 10.1109/tbdata.2017.2677964
URL : https://hal.archives-ouvertes.fr/hal-01481220
Efficient Large-Scale Similarity Search Using Matrix Factorization, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016. ,
DOI : 10.1109/cvpr.2016.228
URL : https://hal.archives-ouvertes.fr/hal-01294736
Anti-sparse coding for approximate nearest neighbor search, ICASSP-37th International Conference on Acoustics, Speech, and Signal Processing, 2012. ,
Recherche approximative de plus proches voisins efficace et sûre, GRETSI, p.238, 2013. ,
Secure and Efficient Approximate Nearest Neighbors Search, 1st ACM Workshop on Information Hiding and Multimedia Security, IH & MMSec '13, pp.175-180, 2013. ,
DOI : 10.1145/2482513.2482539
URL : https://hal.archives-ouvertes.fr/hal-00817336
A Group Testing Framework for Similarity Search in High-dimensional Spaces, ACM Multimedia, 2014. ,
DOI : 10.1145/2647868.2654895
URL : https://hal.archives-ouvertes.fr/hal-01062531
, Computer Vision
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01505470
Panorama to panorama matching for location recognition, ACM International Conference on Multimedia Retrieval (ICMR) 2017, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01511793
Instance classification with prototype selection, ICMR-ACM International Conference on Multimedia Retrieval, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00942275
Rotation and translation covariant match kernels for image retrieval. Computer Vision and Image Understanding, p.15, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01168525
Orientation covariant aggregation of local descriptors with embeddings, European Conference on Computer Vision, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01020823
Differentially Private Matrix Factorization using Sketching Techniques, In ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01317596
Challenging differential privacy: the case of non-interactive mechanisms, European Symposium on Research in Computer Security, vol.8657, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011346
Puzzling Face Verification Algorithms for Privacy Protection, IEEE Workshop on Information Forensics and Security, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01066070
Privacy-Preserving Outsourced Media Search, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.10, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01391444
, Miscellanea: Laws and DRM systems
Copy protection system for digital home networks, Expressions for JANIS with order k T. Furon HabilitationàHabilitationà diriger des recherches, vol.21, pp.100-108, 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00083200
Linear universal decoding for compound channels, IEEE Trans. on Inf. Theory, vol.56, issue.12, pp.5999-6013, 2010. ,
High rate fingerprinting codes and the fingerprinting capacity, Proc. of 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), 2009. ,
Boolean compressed sensing and noisy group testing, IEEE Transactions on Information Theory, vol.58, issue.3, pp.1880-1901, 2012. ,
Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Trans. Inform Theory, vol.49, issue.4, pp.852-865, 2003. ,
Optimum decoding and detection of multiplicative watermarks, IEEE Trans. Signal Processing, vol.51, issue.4, pp.1118-1123, 2003. ,
A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. on Image Processing, vol.5, pp.755-66, 2001. ,
, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, 2004.
On projection algorithms for solving convex feasibility problems, SIAM Review, vol.38, issue.3, pp.367-426, 1996. ,
Improved versions of Tardos' fingerprinting scheme, Des. Codes Cryptography, vol.48, issue.1, pp.79-103, 2008. ,
Asymptotic Fingerprinting Capacity for Non-binary Alphabets, pp.1-13, 2011. ,
, Asymptotic Fingerprinting Capacity in the Combined Digit Model, pp.255-268, 2013.
Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, vol.44, pp.1897-1905, 1998. ,
Locally optimum nonlinearities for DCT watermarking detection, IEEE Trans. Image Processing, vol.13, issue.12, p.17, 2004. ,
Dependence, correlation and gaussianity in independent component analysis, J. Mach. Learn. Res, vol.4, issue.7-8, pp.1177-1203, 2004. ,
TCQ practical evaluation in the hyper-cube watermarking framework, 2011 IEEE International Conference on Multimedia and Expo, pp.1-6, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00839005
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. on Information Theory, vol.4, pp.1423-1443, 2001. ,
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on, vol.47, issue.4, pp.1423-1443, 2001. ,
Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans. Sig. Processing, vol.51, issue.4, pp.906-924, 2003. ,
Jeffreys' prior is asymptotically least favorable under entropy risk, Journal of Stat. Planning and Inference, vol.41, pp.37-60, 1994. ,
Asymptotically optimum universal watermark embedding and detection in the high-snr regime, IEEE Transactions on, vol.56, issue.6, pp.2804-2815, 2010. ,
Writing on dirty paper, IEEE Trans. on Information Theory, vol.29, issue.3, pp.439-441, 1983. ,
, Writing on dirty paper (corresp.)," Information Theory, IEEE Transactions on, vol.29, pp.439-441, 1983.
Elements of information theory, ser. Wiley series in telecommunications, 1991. ,
, Digital Watermarking, 2008.
Secure spread spectrum watermarking for multimedia, IEEE Transactions on, vol.6, issue.12, pp.1673-1687, 1997. ,
Watermarking as communications with side information, Proceedings of the IEEE, vol.87, issue.7, pp.1127-1141, 1999. ,
Improved Polynomial Detectors for Side-Informed Watermarking, Security and Watermarking of Multimedia Contents IV, pp.311-321, 2002. ,
URL : https://hal.archives-ouvertes.fr/inria-00080827
Revisiting the VLAD image representation, ACM Int. Conference on MultiMedia, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00840653
Maximum likelihood from incomplete data via the em algorithm, Journal of the Royal Statistical Society. Series B (Methodological), vol.39, issue.1, pp.1-38, 1977. ,
Enhanced Blind Decoding of Tardos Codes with New Map-Based Functions, IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00907670
Achieving 1/2 log (1+snr) on the awgn channel with lattice encoding and decoding, IEEE Transactions on Information Theory, vol.50, issue.10, pp.2293-2314, 2004. ,
Fingerprinting codes under the weak marking assumption, IEEE Transactions on Information Forensics and Security, vol.13, issue.6, pp.1495-1508, 2018. ,
Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes, Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), vol.8895, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01090053
An asymmetric watermarking method, IEEE Trans. on Signal Processing, vol.51, issue.4, pp.981-995, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00080829
JANIS: Just Another N-order side-Informed Scheme, Proc. of Int. Conf. on Image Processing ICIP'02, vol.2, pp.153-156, 2002. ,
URL : https://hal.archives-ouvertes.fr/inria-00080826
A simple derivation of the coding theorem and some applications, IEEE Transactions on Information Theory, vol.11, issue.1, pp.3-18, 1965. ,
Simulation and estimation of extreme quantiles and extreme probabilities, Applied Mathematics & Optimization, vol.64, issue.2, pp.171-196, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00911891
,
On the fingerprinting capacity games for arbitrary alphabets and their asymptotics, IEEE Transactions on Information Forensics and Security, vol.9, issue.9, pp.1477-1490, 2014. ,
Saddle-point solution of the fingerprinting capacity game under the marking assumption, Proceedings of the 2009 IEEE international conference on Symposium on Information Theory, vol.4, pp.2256-2260, 2009. ,
, On the saddle-point solution and the large-coalition asymptotics of fingerprinting games, IEEE Transactions on Information Forensics and Security, vol.119, issue.1, pp.160-175, 2012.
Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing, EURASIP Journal on Information Security, vol.2014, issue.1, p.12, 2014. ,
Improving bag-of-features for large scale image search, Int. Journal on Computer Vision, vol.87, issue.3, pp.316-336, 2010. ,
Combining Tardos fingerprinting codes and fingercasting, Proc. of 9th Information Hiding, ser. Lecture Notes in Computer Science, S. Verlag, vol.4567, 2007. ,
Combining tardos fingerprinting codes and fingercasting, pp.294-310, 2007. ,
Simplified map detector for binary fingerprinting code embedded by spread spectrum watermarking scheme, IEEE Transactions on Information Forensics and Security, vol.9, issue.4, pp.610-623, 2014. ,
, Tardos's Fingerprinting Code over AWGN Channel, pp.103-117, 2010.
Capacities and capacity-achieving decoders for various fingerprinting games, ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), 2014. ,
Optimal symmetric tardos traitor tracing schemes, Designs, Codes and Cryptography, vol.71, issue.1, pp.83-103, 2014. ,
Discrete distributions in the tardos scheme, revisited, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, ser. IH&MMSec '13, pp.13-18, 2013. ,
Fast and stable algorithms for computing and sampling from the noncentral hypergeometric distribution, The American Statistician, vol.55, issue.4, pp.366-369, 2001. ,
Error exponents for one-bit watermarking, Acoustics, Speech, and Signal Processing, vol.3, 2003. ,
On error exponents of modulo lattice additive noise channels, IEEE Transactions on Information Theory, vol.52, issue.2, pp.454-471, 2006. ,
Improved spread spectrum: A new modulation technique for robust watermarking, Trans. Sig. Proc, vol.51, issue.4, pp.898-905, 2003. ,
Impacts of Watermarking Security on Tardos-based Fingerprinting, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.1038-1050, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00813362
Universal prediction, IEEE Trans. Inform. Theory, vol.44, issue.6, pp.2124-2147, 1998. ,
Data-hiding codes, Proceedings of the IEEE, vol.93, issue.12, pp.2083-2126, 2005. ,
Universal fingerprinting: capacity and random-coding exponents, 2008. ,
, Digital library of mathematical functions
On a theorem of pitman, Ann. Math. Statist, vol.26, issue.1, pp.64-68, 1955. ,
Optimization of memory usage in tardos' fingerprinting codes, 2008. ,
A capacity-achieving simple decoder for bias-based traitor tracing schemes, IEEE Transactions on Information Theory, vol.61, issue.7, pp.3882-3900, 2015. ,
A capacity-achieving simple decoder for bias-based traitor tracing schemes, Cryptology ePrint Archive, 2013. ,
Large-scale image retrieval with compressed Fisher vectors, Int. Conference on Computer Vision and Pattern Recognition, 2010. ,
Optimal watermark embedding and detection strategies under limited detection resources," in Information Theory, IEEE International Symposium on, pp.173-177, 2006. ,
Collusion-secure q-ary fingerprinting for perceptual content, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, ser, vol.2320, pp.57-75, 2001. ,
Attacks on kuribayashi's fingerprinting scheme, IEEE Transactions on Information Forensics and Security, vol.9, issue.4, pp.607-609, 2014. ,
Universal threshold calculation for fingerprinting decoders using mixture models, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ser. IH&MMSec '15, pp.109-114, 2015. ,
,
Smoothing a nondifferentiable convex function: the technique of the rolling ball, Revista de Matematicas Aplicadas, vol.18, 1997. ,
URL : https://hal.archives-ouvertes.fr/hal-02183795
Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video, 2010 IEEE International Conference on Image Processing, pp.2105-2108, 2010. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00839379
, H.264/AVC video watermarking for active fingerprinting based on Tardos code, vol.7, pp.679-694, 2013.
A mathematical theory of communication, Bell System Tech. J, vol.27, 1948. ,
, Probability of error for optimal codes in a gaussian channel, Bell System Tech. J, vol.38, pp.611-656, 1959.
False positive probabilities in q-ary tardos codes: comparison of attacks, Designs, Codes and Cryptography, vol.75, issue.3, pp.519-542, 2015. ,
Tally-based simple decoders for traitor tracing and group testing, IEEE Transactions on Information Forensics and Security, vol.10, issue.6, pp.1221-1233, 2015. ,
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.46, issue.2, pp.137-166, 2008. ,
Tardos fingerprinting codes in the combined digit model, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.906-919, 2011. ,
The holey grail a special score function for non-binary traitor tracing, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), pp.180-185, 2013. ,
Tardos fingerprinting is better than we thought, IEEE Trans. on Inf. Theory, vol.54, issue.8, 2008. ,
Binary and q-ary tardos codes, revisited, Designs, Codes and Cryptography, vol.74, issue.1, 2015. ,
On the capacity game of private fingerprinting systems under collusion attacks, IEEE Transactions on Information Theory, vol.51, issue.3, pp.884-899, 2005. ,
Combinatorial properties of frameproof and traceability codes, IEEE Trans. Inform. Theory, vol.47, pp.1042-1049, 2001. ,
Combinatorial properties and construction of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics, vol.11, pp.41-53, 1998. ,
Geometric relationships between gaussian and modulo-lattice error exponents, CoRR, 2013. ,
Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003. ,
, Optimal probabilistic fingerprint codes, Journal of the ACM, vol.55, issue.2, 2008.
Trees, Detection, Estimation, and Modulation Theory, Part III, pp.0-471, 2001. ,
, Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory, 2014.
Traitor-within-traitor behavior forensics: Strategy and risk minimization, IEEE Trans. Information Forensics and Security, vol.1, issue.4, pp.440-456, 2006. ,