Marcel Fernandez

Orcid: 0000-0001-7655-135X

According to our database1, Marcel Fernandez authored at least 65 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Frameproof codes, separable codes and B<sub>2</sub> codes: Bounds and constructions.
Cryptogr. Commun., May, 2024

An algorithmic construction of union-intersection-bounded families.
Theor. Comput. Sci., 2024

Multiplicity Assignments for Koetter-Vardy Decoding. The Case of Traceability Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Bounds and Constructions of Parent Identifying Schemes via the Algorithmic Version of the Lovász Local Lemma.
IEEE Trans. Inf. Theory, November, 2023

Codes for Exact Support Recovery of Sparse Vectors from Inaccurate Linear Measurements and Their Decoding.
Probl. Inf. Transm., January, 2023

A constructive approach to multimedia codes with complete traceability resistant to δ-noise.
Proceedings of the IEEE Information Theory Workshop, 2023

Multimedia Fingerprinting Codes Resistant to Linear Attacks and Adversarial Noise.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
A study of the separating property in Reed-Solomon codes by bounding the minimum distance.
Des. Codes Cryptogr., 2022

2020
Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise.
Probl. Inf. Transm., 2020

On non-binary traceability set systems.
Des. Codes Cryptogr., 2020

2019
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing.
Des. Codes Cryptogr., 2019

Algorithmic Aspects on the Construction of Separating Codes.
Proceedings of the Analysis of Experimental Algorithms - Special Event, 2019

A Construction of Traceability Set Systems with Polynomial Tracing Algorithm.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Constructions of almost secure frameproof codes with applications to fingerprinting schemes.
Des. Codes Cryptogr., 2018

2017
Improved existence bounds on IPP codes using the Clique Lovász Local Lemma.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Almost separating and almost secure frameproof codes over q-ary alphabets.
Des. Codes Cryptogr., 2016

Multimedia fingerprinting codes resistant against colluders and noise.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Signature codes for the A-channel and collusion-secure multimedia fingerprinting codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2015
Binary fingerprinting codes - can we prove that someone is guilty?!
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Almost IPP-codes or provably secure digital fingerprinting codes.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
A simple scheme for correcting blocks of multiple adjacent bit errors.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces.
Proceedings of the Advances in Information and Computer Security, 2013

2012
On the relationship between the traceability properties of Reed-Solomon codes.
Adv. Math. Commun., 2012

2011
Identifying Traitors Using the Koetter-Vardy Algorithm.
IEEE Trans. Inf. Theory, 2011

Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Lower bounds on almost-separating binary codes.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Almost separating and almost secure frameproof codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
A family of asymptotically good binary fingerprinting codes.
IEEE Trans. Inf. Theory, 2010

Traitor tracing over YouTube video service - proof of concept.
Telecommun. Syst., 2010

A note about the identifier parent property in Reed-Solomon codes.
Comput. Secur., 2010

2009
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

On the IPP Properties of Reed-Solomon Codes.
Proceedings of the Emerging Challenges for Security, 2009

2008
New Considerations about the Correct Design of Turbo Fingerprinting Codes.
Proceedings of the Computer Security, 2008

Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error.
Online Inf. Rev., 2007

Tracing illegal redistribution using errors-anderasures and side information decoding algorithms.
IET Inf. Secur., 2007

Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Improvement of Collusion Secure Convolutional Fingerprinting Information Codes.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

A Note About the Traceability Properties of Linear Codes.
Proceedings of the Information Security and Cryptology, 2007

2006
Multicast Copyright Protection System Based on a Trusted Soft-Engine.
Int. J. Bus. Data Commun. Netw., 2006

Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Obtaining Traceability Codes from Chinese Reminder Theorem Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Families of traceability codes based on the Chinese Remainder Theorem.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

A Practical Solution for Distribution Rights Protection in Multicast Environments.
Proceedings of the Computational Science and Its Applications, 2006

Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Development of a platform offering video copyright protection and security against illegal distribution.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Multimedia Copyright Protection Platform Demonstrator.
Proceedings of the Trust Management, Third International Conference, 2005

A New Class of Codes for Fingerprinting Schemes.
Proceedings of the Information Security Practice and Experience, 2005

Tracing Traitors by Guessing Secrets. The <i>q</i>-Ary Case.
Proceedings of the Information Security Practice and Experience, 2005

A Family of Collusion 2-Secure Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Practical Scenarios for the Van Trung-Martirosyan Codes.
Proceedings of the Computational Science and Its Applications, 2005

Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms.
Proceedings of the Computational Science and Its Applications, 2005

2004
Identification of traitors in algebraic-geometric traceability codes.
IEEE Trans. Signal Process., 2004

Soft-Decision Tracing in Fingerprinted Multimedia Content.
IEEE Multim., 2004

Efficient Recovery of Secrets.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Identification Algorithms for Sequential Traitor Tracing.
Proceedings of the Progress in Cryptology, 2004

Identification of Traitors Using a Trellis.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
A generalization of traceability codes using ideal-based codes.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Protecting Intellectual Property by Guessing Secrets.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

2002
Fingerprinting Concatenated Codes with Efficient Identification.
Proceedings of the Information Security, 5th International Conference, 2002

Decoding codes with the identifiable parent property.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Soft-decision decoding of traceability codes.
Proceedings of the 2002 IEEE International Conference on Multimedia and Expo, 2002

Efficient Identification of Traitors in Fingerprinted Multimedia Contents.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002


  Loading...