Gaëtan Le Guelvouit

According to our database1, Gaëtan Le Guelvouit authored at least 21 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication.
ACM Trans. Web, 2022

DWT Collusion Resistant Video Watermarking Using Tardos Family Codes.
Proceedings of the 5th IEEE International Conference on Image Processing Applications and Systems, 2022

2020
"Guess Who?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020

FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2016
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Privacy Protection for JPEG Content on Image-Sharing Platforms.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Robust and Secure Image Encryption Schemes During JPEG Compression Process.
Proceedings of the Imaging and Multimedia Analytics in a Web and Mobile World 2016, 2016

2013
Enhanced blind decoding of tardos codes with new MAP-based functions.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

2012
Fast detection of Tardos codes with Boneh-Shaw types.
Proceedings of the Media Watermarking, 2012

2011
Probabilistic fingerprinting codes used to detect traitor zero-bit watermark.
Proceedings of the Media Watermarking, 2011

Towards ISP-acceptable P2P delivery systems for user generated contents.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2008
Trellis-coded quantization for public-key steganography
CoRR, 2008

Informed stego-systems in active warden context: Statistical undetectability and capacity.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

2007
The good, the bad, and the ugly: three different approaches to break their watermarking system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

2006
Rotation/scale insensitive spread spectrum image watermarking game.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2004
Capacity of data-hiding system subject to desynchronization.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

2003
Tatouage robuste par étalement de spectre avec prise en compte de l'information adjacente. (Robust watermarking using spread spectrum and side informed techniques).
PhD thesis, 2003

Practical watermarking scheme based on wide spread spectrum and game theory.
Signal Process. Image Commun., 2003

Wide spread spectrum watermarking with side information and interference cancellation.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information.
Proceedings of the 2002 International Conference on Image Processing, 2002

Information-theoretic resolution of perceptual WSS watermarking of non i.i.d Gaussian signals.
Proceedings of the 11th European Signal Processing Conference, 2002


  Loading...