Considerations on watermarking security, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.201-206, 2001. ,
DOI : 10.1109/MMSP.2001.962734
Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, 2005. ,
DOI : 10.1109/TSP.2005.855418
URL : https://hal.archives-ouvertes.fr/inria-00088006
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis, 7th Information Hiding Workshop, IH05, 2005. ,
DOI : 10.1007/11558859_12
Security of Lattice-Based Data Hiding Against the Known Message Attack, IEEE Transactions on Information Forensics and Security, vol.1, issue.4, pp.421-439, 2006. ,
DOI : 10.1109/TIFS.2006.885029
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding, IEEE Transactions on Information Forensics and Security, vol.3, issue.1, 2008. ,
DOI : 10.1109/TIFS.2007.916006
URL : https://hal.archives-ouvertes.fr/hal-00325091
Spread-Spectrum Watermarking Security, IEEE Transactions on Information Forensics and Security, vol.4, issue.1, pp.2-24, 2009. ,
DOI : 10.1109/TIFS.2008.2009603
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x
Improved spread spectrum: a new modulation technique for robust watermarking, IEEE Transactions on Signal Processing, vol.51, issue.4, pp.898-905, 2003. ,
DOI : 10.1109/TSP.2003.809385
Correlation-and-Bit-Aware Spread Spectrum Embedding for Data Hiding, IEEE Transactions on Information Forensics and Security, vol.6, issue.2, pp.267-282, 2011. ,
DOI : 10.1109/TIFS.2010.2103061
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack, IEEE Transactions on Information Forensics and Security, vol.3, issue.4, pp.593-610, 2008. ,
DOI : 10.1109/TIFS.2008.2002938
Security of cass data hiding scheme under the scenarios of KMA and WOA, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1797-1800, 2012. ,
DOI : 10.1109/ICASSP.2012.6288249
Estimating mutual information, Physical Review E, vol.69, issue.6, p.66138, 2004. ,
DOI : 10.1103/PhysRevE.69.066138
Biclique Cryptanalysis of the Full AES, 2011. ,
DOI : 10.1007/978-3-642-25385-0_19
Authentication theory and hypothesis testing, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1350-1356, 2000. ,
DOI : 10.1109/18.850674
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.4053
Watermarking Is Not Cryptography, Proc. Int. Work. on Digital Watermarking, 2006. ,
DOI : 10.1007/11922841_1
URL : https://hal.archives-ouvertes.fr/inria-00504528
Computational security models for digital watermarks, Proc. of the Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS), 2005. ,
A New Measure of Watermarking Security Applied on QIM, Proc. of Information Hiding Workshop, 2012. ,
DOI : 10.1007/978-3-642-36373-3_14
URL : https://hal.archives-ouvertes.fr/hal-00702689
Can detectability be improved by adding noise?, IEEE Signal Processing Letters, vol.7, issue.1, pp.8-10, 2000. ,
DOI : 10.1109/97.809511
Stochastic resonance in locally optimal detectors, IEEE Transactions on Signal Processing, vol.51, issue.12, pp.3177-3181, 2003. ,
DOI : 10.1109/TSP.2003.818905
URL : https://hal.archives-ouvertes.fr/hal-00022620
Sequential Monte Carlo for rare event estimation, Statistics and Computing, pp.1-14, 2011. ,
Simulation and Estimation of Extreme Quantiles and Extreme Probabilities, Applied Mathematics & Optimization, vol.22, issue.4, pp.171-196, 2011. ,
DOI : 10.1007/s00245-011-9135-z
URL : https://hal.archives-ouvertes.fr/hal-00911891
Key length estimation of zero-bit watermarking schemes, Proc. EUSIPCO, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00728159
Handbook of mathematical functions with formulas, graphs, and mathematical tables, of National Bureau of Standards Applied Mathematics Series, Superintendent of Documents, U.S. Government Printing Office, 1964. ,
On some accurate bounds for the quantiles of a non-central chi squared distribution, Statistics & Probability Letters, vol.10, issue.2, pp.101-106, 1990. ,
DOI : 10.1016/0167-7152(90)90003-P
he was a member of the Laboratoire des Images et des Signaux de Grenoble (LIS), France where he worked on still image watermarking. During his post-doctoral activities, he was a member of the Communications and, 1997. ,
Furon serves as Associate, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, and of the Elsevier Digital Signal Processing Journal. He is an elected member of the IEEE Information Forensics and Security Technical Committee ,