R. Balu, T. Furon, and H. Jégou, Beyond "project and sign" for cosine estimation with binary codes, ICASPP-International Conference on Acoustics, Speech, and Signal Processing, 2014.
DOI : 10.1109/icassp.2014.6854934

URL : https://hal.archives-ouvertes.fr/hal-00942075

T. Furon, H. Jégou, L. Amsaleg, and B. Mathon, Fast and secure similarity search in high dimensional space, IEEE International Workshop on Information Forensics and Security, 2013.
DOI : 10.1109/wifs.2013.6707797

URL : https://hal.archives-ouvertes.fr/hal-00857570

A. Iscen, L. Amsaleg, and T. Furon, Scaling Group Testing Similarity Search, ACM International Conference on Multimedia Retrieval, 2016.
DOI : 10.1145/2911996.2912010

URL : https://hal.archives-ouvertes.fr/hal-01304287

A. Iscen, T. Furon, V. Gripon, M. Rabbat, and H. Jégou, Memory vectors for similarity search in highdimensional spaces, IEEE Transactions on Big Data, 2017.
DOI : 10.1109/tbdata.2017.2677964

URL : https://hal.archives-ouvertes.fr/hal-01481220

A. Iscen, M. Rabbat, and T. Furon, Efficient Large-Scale Similarity Search Using Matrix Factorization, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
DOI : 10.1109/cvpr.2016.228

URL : https://hal.archives-ouvertes.fr/hal-01294736

H. Jégou, T. Furon, and J. Fuchs, Anti-sparse coding for approximate nearest neighbor search, ICASSP-37th International Conference on Acoustics, Speech, and Signal Processing, 2012.

B. Mathon, T. Furon, L. Amsaleg, and J. Bringer, Recherche approximative de plus proches voisins efficace et sûre, GRETSI, p.238, 2013.

B. Mathon, T. Furon, L. Amsaleg, and J. Bringer, Secure and Efficient Approximate Nearest Neighbors Search, 1st ACM Workshop on Information Hiding and Multimedia Security, IH & MMSec '13, pp.175-180, 2013.
DOI : 10.1145/2482513.2482539

URL : https://hal.archives-ouvertes.fr/hal-00817336

M. Shi, T. Furon, and H. Jégou, A Group Testing Framework for Similarity Search in High-dimensional Spaces, ACM Multimedia, 2014.
DOI : 10.1145/2647868.2654895

URL : https://hal.archives-ouvertes.fr/hal-01062531

, Computer Vision

A. Iscen, G. Tolias, Y. Avrithis, T. Furon, and O. Chum, Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
URL : https://hal.archives-ouvertes.fr/hal-01505470

A. Iscen, G. Tolias, Y. Avrithis, T. Furon, and O. Chum, Panorama to panorama matching for location recognition, ACM International Conference on Multimedia Retrieval (ICMR) 2017, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01511793

J. Krapac, F. Perronnin, T. Furon, and H. Jégou, Instance classification with prototype selection, ICMR-ACM International Conference on Multimedia Retrieval, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00942275

G. Tolias, A. Bursuc, T. Furon, and H. Jégou, Rotation and translation covariant match kernels for image retrieval. Computer Vision and Image Understanding, p.15, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01168525

G. Tolias, T. Furon, and H. Jégou, Orientation covariant aggregation of local descriptors with embeddings, European Conference on Computer Vision, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01020823

R. Balu and T. Furon, Differentially Private Matrix Factorization using Sketching Techniques, In ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01317596

R. Balu, T. Furon, and S. Gambs, Challenging differential privacy: the case of non-interactive mechanisms, European Symposium on Research in Computer Security, vol.8657, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011346

B. Bhattarai, A. Mignon, F. Jurie, and T. Furon, Puzzling Face Verification Algorithms for Privacy Protection, IEEE Workshop on Information Forensics and Security, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01066070

L. Weng, L. Amsaleg, and T. Furon, Privacy-Preserving Outsourced Media Search, IEEE Transactions on Knowledge and Data Engineering, vol.28, issue.10, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01391444

, Miscellanea: Laws and DRM systems

J. Andreaux, A. Durand, T. Furon, and E. Diehl, Copy protection system for digital home networks, Expressions for JANIS with order k T. Furon HabilitationàHabilitationà diriger des recherches, vol.21, pp.100-108, 2004.
URL : https://hal.archives-ouvertes.fr/inria-00083200

E. Abbe and L. Zheng, Linear universal decoding for compound channels, IEEE Trans. on Inf. Theory, vol.56, issue.12, pp.5999-6013, 2010.

E. Amiri and G. Tardos, High rate fingerprinting codes and the fingerprinting capacity, Proc. of 20th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2009), 2009.

G. K. Atia and V. Saligrama, Boolean compressed sensing and noisy group testing, IEEE Transactions on Information Theory, vol.58, issue.3, pp.1880-1901, 2012.

A. Barg, G. R. Blakley, and G. A. Kabatiansky, Digital fingerprinting codes: problem statements, constructions, identification of traitors, IEEE Trans. Inform Theory, vol.49, issue.4, pp.852-865, 2003.

M. Barni, F. Bartolini, A. De-rosa, and A. Piva, Optimum decoding and detection of multiplicative watermarks, IEEE Trans. Signal Processing, vol.51, issue.4, pp.1118-1123, 2003.

M. Barni, F. Bartolini, A. D. Rosa, and A. Piva, A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. on Image Processing, vol.5, pp.755-66, 2001.

M. Barni and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, 2004.

H. H. Bauschke and J. M. Borwein, On projection algorithms for solving convex feasibility problems, SIAM Review, vol.38, issue.3, pp.367-426, 1996.

O. Blayer and T. Tassa, Improved versions of Tardos' fingerprinting scheme, Des. Codes Cryptography, vol.48, issue.1, pp.79-103, 2008.

D. Boesten and B. Skori´cskori´c, Asymptotic Fingerprinting Capacity for Non-binary Alphabets, pp.1-13, 2011.

, Asymptotic Fingerprinting Capacity in the Combined Digit Model, pp.255-268, 2013.

D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, vol.44, pp.1897-1905, 1998.

A. Briassouli and M. Strinzis, Locally optimum nonlinearities for DCT watermarking detection, IEEE Trans. Image Processing, vol.13, issue.12, p.17, 2004.

J. Cardoso, Dependence, correlation and gaussianity in independent component analysis, J. Mach. Learn. Res, vol.4, issue.7-8, pp.1177-1203, 2004.

M. Chaumont and D. Goudia, TCQ practical evaluation in the hyper-cube watermarking framework, 2011 IEEE International Conference on Multimedia and Expo, pp.1-6, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00839005

B. Chen and G. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. on Information Theory, vol.4, pp.1423-1443, 2001.

B. Chen and G. W. Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding, IEEE Transactions on, vol.47, issue.4, pp.1423-1443, 2001.

Q. Cheng and T. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans. Sig. Processing, vol.51, issue.4, pp.906-924, 2003.

B. Clarke and A. Barron, Jeffreys' prior is asymptotically least favorable under entropy risk, Journal of Stat. Planning and Inference, vol.41, pp.37-60, 1994.

P. Comesana, N. Merhav, and M. Barni, Asymptotically optimum universal watermark embedding and detection in the high-snr regime, IEEE Transactions on, vol.56, issue.6, pp.2804-2815, 2010.

M. Costa, Writing on dirty paper, IEEE Trans. on Information Theory, vol.29, issue.3, pp.439-441, 1983.

, Writing on dirty paper (corresp.)," Information Theory, IEEE Transactions on, vol.29, pp.439-441, 1983.

T. Cover and J. Thomas, Elements of information theory, ser. Wiley series in telecommunications, 1991.

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking, 2008.

I. J. Cox, J. Kilian, F. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on, vol.6, issue.12, pp.1673-1687, 1997.

I. J. Cox, M. Miller, and A. Mckellips, Watermarking as communications with side information, Proceedings of the IEEE, vol.87, issue.7, pp.1127-1141, 1999.

J. Delhumeau, T. Furon, G. Silvestre, and N. Hurley, Improved Polynomial Detectors for Side-Informed Watermarking, Security and Watermarking of Multimedia Contents IV, pp.311-321, 2002.
URL : https://hal.archives-ouvertes.fr/inria-00080827

J. Delhumeau, P. Gosselin, H. Jégou, and P. Pérez, Revisiting the VLAD image representation, ACM Int. Conference on MultiMedia, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00840653

A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood from incomplete data via the em algorithm, Journal of the Royal Statistical Society. Series B (Methodological), vol.39, issue.1, pp.1-38, 1977.

M. Desoubeaux, C. Herzet, W. Puech, and G. L. Guelvouit, Enhanced Blind Decoding of Tardos Codes with New Map-Based Functions, IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00907670

U. Erez and R. Zamir, Achieving 1/2 log (1+snr) on the awgn channel with lattice encoding and decoding, IEEE Transactions on Information Theory, vol.50, issue.10, pp.2293-2314, 2004.

G. Fodor, P. Schelkens, and A. Dooms, Fingerprinting codes under the weak marking assumption, IEEE Transactions on Information Forensics and Security, vol.13, issue.6, pp.1495-1508, 2018.

C. Fontaine, S. Gambs, J. Lolive, and C. Onete, Private asymmetric fingerprinting : a protocol with optimal traitor tracing using Tardos codes, Third International Conference on Cryptology and Information Security in Latin America (Latincrypt'14), vol.8895, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01090053

T. Furon and P. Duhamel, An asymmetric watermarking method, IEEE Trans. on Signal Processing, vol.51, issue.4, pp.981-995, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00080829

T. Furon, G. Silvestre, and N. Hurley, JANIS: Just Another N-order side-Informed Scheme, Proc. of Int. Conf. on Image Processing ICIP'02, vol.2, pp.153-156, 2002.
URL : https://hal.archives-ouvertes.fr/inria-00080826

R. Gallager, A simple derivation of the coding theorem and some applications, IEEE Transactions on Information Theory, vol.11, issue.1, pp.3-18, 1965.

A. Guyader, N. Hengartner, and E. Matzner-løber, Simulation and estimation of extreme quantiles and extreme probabilities, Applied Mathematics & Optimization, vol.64, issue.2, pp.171-196, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00911891

,

Y. W. Huang and P. Moulin, On the fingerprinting capacity games for arbitrary alphabets and their asymptotics, IEEE Transactions on Information Forensics and Security, vol.9, issue.9, pp.1477-1490, 2014.

Y. Huang and P. Moulin, Saddle-point solution of the fingerprinting capacity game under the marking assumption, Proceedings of the 2009 IEEE international conference on Symposium on Information Theory, vol.4, pp.2256-2260, 2009.

, On the saddle-point solution and the large-coalition asymptotics of fingerprinting games, IEEE Transactions on Information Forensics and Security, vol.119, issue.1, pp.160-175, 2012.

S. Ibrahimi, B. Skori´cskori´c, and J. Oosterwijk, Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing, EURASIP Journal on Information Security, vol.2014, issue.1, p.12, 2014.

H. Jégou, M. Douze, and C. Schmid, Improving bag-of-features for large scale image search, Int. Journal on Computer Vision, vol.87, issue.3, pp.316-336, 2010.

S. Katzenbeisser, B. Skoric, M. Celik, and A. Sadeghi, Combining Tardos fingerprinting codes and fingercasting, Proc. of 9th Information Hiding, ser. Lecture Notes in Computer Science, S. Verlag, vol.4567, 2007.

S. Katzenbeisser, B. Skori´cskori´c, M. U. Celik, and A. Sadeghi, Combining tardos fingerprinting codes and fingercasting, pp.294-310, 2007.

M. Kuribayashi, Simplified map detector for binary fingerprinting code embedded by spread spectrum watermarking scheme, IEEE Transactions on Information Forensics and Security, vol.9, issue.4, pp.610-623, 2014.

, Tardos's Fingerprinting Code over AWGN Channel, pp.103-117, 2010.

T. Laarhoven, Capacities and capacity-achieving decoders for various fingerprinting games, ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec), 2014.

T. Laarhoven and B. De-weger, Optimal symmetric tardos traitor tracing schemes, Designs, Codes and Cryptography, vol.71, issue.1, pp.83-103, 2014.

T. Laarhoven and B. D. Weger, Discrete distributions in the tardos scheme, revisited, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, ser. IH&MMSec '13, pp.13-18, 2013.

J. G. Liao and O. Rosen, Fast and stable algorithms for computing and sampling from the noncentral hypergeometric distribution, The American Statistician, vol.55, issue.4, pp.366-369, 2001.

T. Liu and P. Moulin, Error exponents for one-bit watermarking, Acoustics, Speech, and Signal Processing, vol.3, 2003.

T. Liu, P. Moulin, and R. Koetter, On error exponents of modulo lattice additive noise channels, IEEE Transactions on Information Theory, vol.52, issue.2, pp.454-471, 2006.

H. Malvar and D. Florencio, Improved spread spectrum: A new modulation technique for robust watermarking, Trans. Sig. Proc, vol.51, issue.4, pp.898-905, 2003.

B. Mathon, P. Bas, F. Cayre, and B. Macq, Impacts of Watermarking Security on Tardos-based Fingerprinting, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.1038-1050, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00813362

N. Merhav and M. Feder, Universal prediction, IEEE Trans. Inform. Theory, vol.44, issue.6, pp.2124-2147, 1998.

P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, vol.93, issue.12, pp.2083-2126, 2005.

P. Moulin, Universal fingerprinting: capacity and random-coding exponents, 2008.

, Digital library of mathematical functions

G. E. Noether, On a theorem of pitman, Ann. Math. Statist, vol.26, issue.1, pp.64-68, 1955.

K. Nuida, M. Hagiwara, H. Watanabe, and H. Imai, Optimization of memory usage in tardos' fingerprinting codes, 2008.

J. J. Oosterwijk, B. Skori´cskori´c, and J. Doumen, A capacity-achieving simple decoder for bias-based traitor tracing schemes, IEEE Transactions on Information Theory, vol.61, issue.7, pp.3882-3900, 2015.

J. Oosterwijk, B. Skori´cskori´c, and J. Doumen, A capacity-achieving simple decoder for bias-based traitor tracing schemes, Cryptology ePrint Archive, 2013.

F. Perronnin, Y. Liu, J. Sanchez, and H. Poirier, Large-scale image retrieval with compressed Fisher vectors, Int. Conference on Computer Vision and Pattern Recognition, 2010.

E. Sabbag and N. Merhav, Optimal watermark embedding and detection strategies under limited detection resources," in Information Theory, IEEE International Symposium on, pp.173-177, 2006.

R. Safavi-naini and Y. Wang, Collusion-secure q-ary fingerprinting for perceptual content, Proc. Security and Privacy in Digital Rights Management, SPDRM'01, ser, vol.2320, pp.57-75, 2001.

H. G. Schaathun, Attacks on kuribayashi's fingerprinting scheme, IEEE Transactions on Information Forensics and Security, vol.9, issue.4, pp.607-609, 2014.

M. Schäfer, S. Mair, W. Berchtold, and M. Steinebach, Universal threshold calculation for fingerprinting decoders using mixture models, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ser. IH&MMSec '15, pp.109-114, 2015.

,

A. Seeger, Smoothing a nondifferentiable convex function: the technique of the rolling ball, Revista de Matematicas Aplicadas, vol.18, 1997.
URL : https://hal.archives-ouvertes.fr/hal-02183795

Z. Shahid, M. Chaumont, and W. Puech, Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video, 2010 IEEE International Conference on Image Processing, pp.2105-2108, 2010.
URL : https://hal.archives-ouvertes.fr/lirmm-00839379

, H.264/AVC video watermarking for active fingerprinting based on Tardos code, vol.7, pp.679-694, 2013.

C. E. Shannon, A mathematical theory of communication, Bell System Tech. J, vol.27, 1948.

, Probability of error for optimal codes in a gaussian channel, Bell System Tech. J, vol.38, pp.611-656, 1959.

A. Simone and B. Skori´cskori´c, False positive probabilities in q-ary tardos codes: comparison of attacks, Designs, Codes and Cryptography, vol.75, issue.3, pp.519-542, 2015.

B. Skori´cskori´c, Tally-based simple decoders for traitor tracing and group testing, IEEE Transactions on Information Forensics and Security, vol.10, issue.6, pp.1221-1233, 2015.

B. Skoric, S. Katzenbeisser, and M. Celik, Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, Designs, Codes and Cryptography, vol.46, issue.2, pp.137-166, 2008.

B. Skoric, S. Katzenbeisser, H. G. Schaathun, and M. U. Celik, Tardos fingerprinting codes in the combined digit model, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.906-919, 2011.

B. Skori´cskori´c, J. J. Oosterwijk, and J. Doumen, The holey grail a special score function for non-binary traitor tracing, 2013 IEEE International Workshop on Information Forensics and Security (WIFS), pp.180-185, 2013.

B. Skoric, T. Vladimirova, M. Celik, and J. Talstra, Tardos fingerprinting is better than we thought, IEEE Trans. on Inf. Theory, vol.54, issue.8, 2008.

B. Skori´cskori´c and J. Oosterwijk, Binary and q-ary tardos codes, revisited, Designs, Codes and Cryptography, vol.74, issue.1, 2015.

A. Somekh-baruch and N. Merhav, On the capacity game of private fingerprinting systems under collusion attacks, IEEE Transactions on Information Theory, vol.51, issue.3, pp.884-899, 2005.

J. R. Staddon, D. R. Stinson, and R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Trans. Inform. Theory, vol.47, pp.1042-1049, 2001.

D. R. Stinson and R. Wei, Combinatorial properties and construction of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics, vol.11, pp.41-53, 1998.

C. H. Swannack, U. Erez, and G. W. Wornell, Geometric relationships between gaussian and modulo-lattice error exponents, CoRR, 2013.

G. Tardos, Optimal probabilistic fingerprint codes, Proc. of the 35th annual ACM symposium on theory of computing, pp.116-125, 2003.

, Optimal probabilistic fingerprint codes, Journal of the ACM, vol.55, issue.2, 2008.

H. V. , Trees, Detection, Estimation, and Modulation Theory, Part III, pp.0-471, 2001.

R. Zamir, B. Nazer, Y. Kochman, and I. Bistritz, Lattice Coding for Signals and Networks: A Structured Coding Approach to Quantization, Modulation and Multiuser Information Theory, 2014.

H. V. Zhao and K. J. Liu, Traitor-within-traitor behavior forensics: Strategy and risk minimization, IEEE Trans. Information Forensics and Security, vol.1, issue.4, pp.440-456, 2006.