2024
Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors.
EURASIP J. Inf. Secur., December, 2024
Watermark Anything with Localized Messages.
CoRR, 2024
WaterMax: breaking the LLM watermark detectability-robustness-quality trade-off.
CoRR, 2024
Watermarking Makes Language Models Radioactive.
CoRR, 2024
Evaluation of Security of ML-based Watermarking: Copy and Removal Attacks.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
When does gradient estimation improve black-box adversarial attacks?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
SWIFT: Semantic Watermarking for Image Forgery Thwarting.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event Simulation.
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proactive Detection of Voice Cloning with Localized Watermarking.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Functional Invariants To Watermark Large Transformers.
Proceedings of the IEEE International Conference on Acoustics, 2024
A Double-Edged Sword: The Power of Two in Defending Against DNN Backdoor Attacks.
Proceedings of the 32nd European Signal Processing Conference, 2024
2023
Fingerprinting Classifiers With Benign Inputs.
IEEE Trans. Inf. Forensics Secur., 2023
Three Bricks to Consolidate Watermarks for Large Language Models.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
How to choose your best allies for a transferable attack?
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
The Stable Signature: Rooting Watermarks in Latent Diffusion Models.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Model Fingerprinting with Benign Inputs.
Proceedings of the IEEE International Conference on Acoustics, 2023
Mixer: DNN Watermarking using Image Mixup.
Proceedings of the IEEE International Conference on Acoustics, 2023
Gradient-Informed Neural Network Statistical Robustness Estimation.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
2022
Generating Adversarial Images in Quantized Domains.
IEEE Trans. Inf. Forensics Secur., 2022
FBI: Fingerprinting models with Benign Inputs.
CoRR, 2022
AggNet: Learning to Aggregate Faces for Group Membership Verification.
CoRR, 2022
Randomized Smoothing under Attack: How Good is it in Pratice?
CoRR, 2022
ROSE: A RObust and SEcure DNN Watermarking.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Impact of Downscaling on Adversarial Images.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Randomized Smoothing Under Attack: How Good is it in Practice?
Proceedings of the IEEE International Conference on Acoustics, 2022
Watermarking Images in Self-Supervised Latent Spaces.
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
Walking on the Edge: Fast, Low-Distortion Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2021
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence.
IEEE Trans. Inf. Forensics Secur., 2021
Efficient Statistical Assessment of Neural Network Corruption Robustness.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Patch Replacement: A Transformation-based Method to Improve Robustness against Adversarial Attacks.
Proceedings of the Trustworthy AI'21: Proceedings of the 1st International Workshop on Trustworthy AI for Multimedia Computing, 2021
Trustworthy AI'21: 1st International Workshop on Trustworthy AI for Multimedia Computing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
RoBIC: A Benchmark Suite For Assessing Classifiers Robustness.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
SurFree: A Fast Surrogate-Free Black-Box Attack.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
Are Classification Deep Neural Networks Good for Blind Image Watermarking?
Entropy, 2020
Smooth adversarial examples.
EURASIP J. Inf. Secur., 2020
Adversarial Images through Stega Glasses.
CoRR, 2020
Note: An alternative proof of the vulnerability of k-NN classifiers in high intrinsic dimensionality regions.
CoRR, 2020
Defending Adversarial Examples via DNN Bottleneck Reinforcement.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Fooling an Automatic Image Quality Estimator.
Proceedings of the Working Notes Proceedings of the MediaEval 2020 Workshop, 2020
What if Adversarial Samples were Digital Images?
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Forensics Through Stega Glasses: The Case of Adversarial Images.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Joint Learning of Assignment and Representation for Biometric Group Membership.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
Group Membership Verification with Privacy: Sparse or Dense?
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Aggregation and Embedding for Group Membership Verification.
Proceedings of the IEEE International Conference on Acoustics, 2019
Privacy Preserving Group Membership Verification and Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019
2018
Memory Vectors for Similarity Search in High-Dimensional Spaces.
IEEE Trans. Big Data, 2018
Extreme-value-theoretic estimation of local intrinsic dimensionality.
Data Min. Knowl. Discov., 2018
Are Deep Neural Networks good for blind image watermarking?
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Fast Spectral Ranking for Similarity Search.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
Hybrid Diffusion: Spectral-Temporal Graph Filtering for Manifold Ranking.
Proceedings of the Computer Vision - ACCV 2018, 2018
Binary Tardos Codes and Zero-bit Watermarking.
, 2018
2017
Panorama to Panorama Matching for Location Recognition.
Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval, 2017
Identity Documents Classification as an Image Classification Problem.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017
Complex Document Classification and Localization Application on Identity Document Images.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017
Automatic Discovery of Discriminative Parts as a Quadratic Assignment Problem.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017
About zero bitwatermarking error exponents.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Efficient Diffusion on Region Manifolds: Recovering Small Objects with Compact CNN Representations.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017
2016
Privacy-Preserving Outsourced Media Search.
IEEE Trans. Knowl. Data Eng., 2016
Automatic discovery of discriminative parts as a quadratic assignment problem.
CoRR, 2016
Scaling Group Testing Similarity Search.
Proceedings of the 2016 ACM on International Conference on Multimedia Retrieval, 2016
Group Testing for Identification with Privacy.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Differentially Private Matrix Factorization using Sketching Techniques.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Sketching Techniques for Very Large Matrix Factorization.
Proceedings of the Advances in Information Retrieval, 2016
Efficient Large-Scale Similarity Search Using Matrix Factorization.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, 2016
2015
Rotation and translation covariant match kernels for image retrieval.
Comput. Vis. Image Underst., 2015
Estimating Local Intrinsic Dimensionality.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Puzzling face verification algorithms for privacy protection.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
A Group Testing Framework for Similarity Search in High-dimensional Spaces.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014
Instance classification with prototype selection.
Proceedings of the International Conference on Multimedia Retrieval, 2014
Beyond "project and sign" for cosine estimation with binary codes.
Proceedings of the IEEE International Conference on Acoustics, 2014
Challenging Differential Privacy: The Case of Non-interactive Mechanisms.
Proceedings of the Computer Security - ESORICS 2014, 2014
Orientation Covariant Aggregation of Local Descriptors with Embeddings.
Proceedings of the Computer Vision - ECCV 2014, 2014
2013
A New Measure of Watermarking Security: The Effective Key Length.
IEEE Trans. Inf. Forensics Secur., 2013
Fast and secure similarity search in high dimensional space.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Secure and efficient approximate nearest neighbors search.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
2012
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes.
IEEE Trans. Inf. Forensics Secur., 2012
Sequential Monte Carlo for rare event estimation.
Stat. Comput., 2012
The Effective Key Length of Watermarking Schemes
CoRR, 2012
Decoding fingerprints using the Markov Chain Monte Carlo method.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Security-oriented picture-in-picture visual modifications.
Proceedings of the International Conference on Multimedia Retrieval, 2012
A New Measure of Watermarking Security Applied on QIM.
Proceedings of the Information Hiding - 14th International Conference, 2012
Anti-sparse coding for approximate nearest neighbor search.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Practical key length of watermarking systems.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Key length estimation of zero-bit watermarking schemes.
Proceedings of the 20th European Signal Processing Conference, 2012
Are 128 Bits Long Keys Possible in Watermarking?
Proceedings of the Communications and Multimedia Security, 2012
2011
Towards joint decoding of Tardos fingerprinting codes
CoRR, 2011
Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm.
Proceedings of the Information Hiding - 13th International Conference, 2011
An Asymmetric Fingerprinting Scheme Based on Tardos Codes.
Proceedings of the Information Hiding - 13th International Conference, 2011
Iterative single tardos decoder with controlled probability of false positive.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Group testing meets traitor tracing.
Proceedings of the IEEE International Conference on Acoustics, 2011
2010
Décodage EM du code de Tardos pour le fingerprinting.
Traitement du Signal, 2010
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread.
IEEE Secur. Priv., 2010
Challenging the security of Content-Based Image Retrieval systems.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Towards robust and secure watermarking.
Proceedings of the Multimedia and Security Workshop, 2010
Deluding image recognition in sift-based cbir systems.
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, 2010
Understanding the security and robustness of SIFT.
Proceedings of the 18th International Conference on Multimedia 2010, 2010
Better security levels for broken arrows.
Proceedings of the Media Forensics and Security II, 2010
2009
Blind decoder for binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Worst case attacks against binary probabilistic traitor tracing codes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
EM decoding of tardos traitor tracing codes.
Proceedings of the Multimedia and Security Workshop, 2009
Expectation maximization decoding of Tardos probabilistic fingerprinting code.
Proceedings of the Media Forensics and Security I, 2009
Estimating the Minimal Length of Tardos Code.
Proceedings of the Information Hiding, 11th International Workshop, 2009
Estimating the probability fo false alarm for a zero-bit watermarking technique.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
2008
EURASIP J. Inf. Secur., 2008
Experimental Assessment of the Reliability for Watermarking and Fingerprinting Schemes.
EURASIP J. Inf. Secur., 2008
On-off keying modulation and tardos fingerprinting.
Proceedings of the 10th workshop on Multimedia & Security, 2008
On the Design and Optimization of Tardos Probabilistic Fingerprinting Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
A Constructive and Unifying Framework for Zero-Bit Watermarking.
IEEE Trans. Inf. Forensics Secur., 2007
The good, the bad, and the ugly: three different approaches to break their watermarking system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
2006
Security of Lattice-Based Data Hiding Against the Known Message Attack.
IEEE Trans. Inf. Forensics Secur., 2006
Some theoretical aspects of watermarking detection.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
On achievable security levels for lattice data hiding in the known message attack scenario.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Hermite polynomials as provably good functions to watermark white gaussian hosts.
Proceedings of the 8th workshop on Multimedia & Security, 2006
Watermarking Is Not Cryptography.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
2005
Watermarking security: theory and practice.
IEEE Trans. Signal Process., 2005
Watermarking security part two: Practice.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Watermarking security part one: Theory.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
A Survey of Watermarking Security.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
A theoretical study of watermarking security.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
Copy protection system for digital home networks.
IEEE Signal Process. Mag., 2004
Towards digital rights and exemptions management systems.
Comput. Law Secur. Rev., 2004
Watermarking Attack: Security of WSS Techniques.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
2003
An asymmetric watermarking method.
IEEE Trans. Signal Process., 2003
A general framework for robust watermarking security.
Signal Process., 2003
Improved polynomial detectors for side-informed watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Application of side-informed embedding and polynomial detection to audio watermarking.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2002
Applied public-key steganography.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Robustness and Efficiency of Non-linear Side-Informed Watermarking.
Proceedings of the Information Hiding, 5th International Workshop, 2002
JANIS: Just Another n-order Side-Informed Watermarking Scheme.
Proceedings of the 2002 International Conference on Image Processing, 2002
Side-informed watermarking using n<sup>th</sup>-order polynomial detectors.
Proceedings of the 11th European Signal Processing Conference, 2002
2001
Unified approach of asymmetric watermarking schemes.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
2000
Robustness of an Asymmetric Watermarking Technique.
Proceedings of the 2000 International Conference on Image Processing, 2000
Audio public key watermarking technique.
Proceedings of the IEEE International Conference on Acoustics, 2000
1999
An Asymmetric Public Detection Watermarking Technique.
Proceedings of the Information Hiding, Third International Workshop, 1999