Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Clayton D. Scott
muljowidodo kartidjo
Duzgun, H.Sebnem
Jean Jourdan
Roland Zumkeller
Maximilian Dürr
Mouldi Makdir
Dan Graur
Yuki Akahane
Hsin-Lung Su
Home
/
Author
/
FRANCOIS CAYRE
Author Info
Open Visualization
Name
Affiliation
Papers
FRANCOIS CAYRE
GIPSA-LAB, Grenoble-INP, Saint Martin d'Hères Cedex, France
29
Collaborators
Citations
PageRank
24
244
18.86
Referers
Referees
References
391
359
331
Search Limit
100
391
Publications (29 rows)
Collaborators (24 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Clustering and causality inference using algorithmic complexity.
0
0.34
2017
An effective histogram-based approach to JPEG-100 forensics
0
0.34
2016
Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality".
0
0.34
2016
SALZA: Soft algorithmic complexity estimates for clustering and causality inference.
1
0.43
2016
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution
8
0.46
2015
General-purpose image forensics using patch likelihood under image statistical models
14
0.65
2015
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality
17
0.90
2014
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images
16
0.68
2014
A variational approach to JPEG anti-forensics
19
0.68
2013
Towards A Realistic Channel Model For Security Analysis Of Authentication Using Graphical Codes
5
0.72
2013
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics
8
0.46
2013
Impacts of Watermarking Security on Tardos-Based Fingerprinting
2
0.36
2013
Practical key length of watermarking systems
2
0.40
2012
3D lighting-based image forgery detection using shape-from-shading
6
0.55
2012
Security and robustness constraints for spread-spectrum Tardos fingerprinting
1
0.35
2010
Comparison of secure spread-spectrum modulations applied to still image watermarking
4
0.44
2009
On security threats for robust perceptual hashing
7
0.52
2009
Optimization of natural watermarking using transportation theory.
9
0.60
2009
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding
6
0.54
2008
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
0
0.34
2008
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers
24
2.50
2008
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?
22
0.94
2007
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking
6
0.54
2007
Natural watermarking: a secure spread spectrum technique for WOA
10
0.80
2006
Achieving subspace or key security for WOA using natural or circular watermarking
20
1.05
2006
Watermarking security part one: Theory
15
0.96
2005
Watermarking security part two: Practice
11
0.80
2005
A Theoretical Study Of Watermarking Security
1
0.38
2005
Watermarking attack: security of WSS techniques
10
0.78
2004
1