Watermarking security: Theory and practice F Cayre, C Fontaine, T Furon Signal Processing, IEEE Transactions on 53 (10), 3976-3987, 2005 | 411 | 2005 |
Sequential Monte Carlo for rare event estimation F Cérou, P Del Moral, T Furon, A Guyader Statistics and computing 22 (3), 795-808, 2012 | 278 | 2012 |
Efficient diffusion on region manifolds: Recovering small objects with compact cnn representations A Iscen, G Tolias, Y Avrithis, T Furon, O Chum Proceedings of the IEEE conference on computer vision and pattern …, 2017 | 222 | 2017 |
Estimating local intrinsic dimensionality L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ... Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015 | 170 | 2015 |
A general framework for robust watermarking security M Barni, F Bartolini, T Furon Signal Processing 83 (10), 2069-2084, 2003 | 167 | 2003 |
An asymmetric watermarking method T Furon, P Duhamel IEEE Transactions on Signal Processing 51 (4), 981-995, 2003 | 166 | 2003 |
The stable signature: Rooting watermarks in latent diffusion models P Fernandez, G Couairon, H Jégou, M Douze, T Furon Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 165 | 2023 |
Image database of BOWS-2 P Bas, T Furon Accessed: Jun 20, 2016-2017, 2017 | 121 | 2017 |
Watermarking is not cryptography IJ Cox, G Doërr, T Furon International Workshop on Digital Watermarking, 1-15, 2006 | 120 | 2006 |
An asymmetric public detection watermarking technique T Furon, P Duhamel International Workshop on Information Hiding, 88-100, 1999 | 115 | 1999 |
Surfree: a fast surrogate-free black-box attack T Maho, T Furon, E Le Merrer Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 108 | 2021 |
On the design and optimization of Tardos probabilistic fingerprinting codes T Furon, A Guyader, F Cérou International Workshop on Information Hiding, 341-356, 2008 | 79 | 2008 |
Watermarking images in self-supervised latent spaces P Fernandez, A Sablayrolles, T Furon, H Jégou, M Douze ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 78 | 2022 |
Broken arrows T Furon, P Bas EURASIP Journal on Information Security 2008, 1-13, 2008 | 77 | 2008 |
Memory vectors for similarity search in high-dimensional spaces A Iscen, T Furon, V Gripon, M Rabbat, H Jégou IEEE transactions on big data 4 (1), 65-77, 2017 | 73 | 2017 |
Applied public-key steganography P Guillon, T Furon, P Duhamel Security and Watermarking of Multimedia Contents IV 4675, 38-49, 2002 | 70 | 2002 |
Walking on the edge: Fast, low-distortion adversarial examples H Zhang, Y Avrithis, T Furon, L Amsaleg IEEE Transactions on Information Forensics and Security 16, 701-713, 2020 | 68 | 2020 |
Unified approach of asymmetric watermarking schemes T Furon, I Venturini, P Duhamel Security and Watermarking of Multimedia Contents III 4314, 269-279, 2001 | 67 | 2001 |
Extreme-value-theoretic estimation of local intrinsic dimensionality L Amsaleg, O Chelly, T Furon, S Girard, ME Houle, K Kawarabayashi, ... Data Mining and Knowledge Discovery 32 (6), 1768-1805, 2018 | 66 | 2018 |
Complex document classification and localization application on identity document images AM Awal, N Ghanmi, R Sicre, T Furon 2017 14th IAPR International Conference on Document Analysis and Recognition …, 2017 | 65 | 2017 |