Name
Affiliation
Papers
FRANCOIS CAYRE
GIPSA-LAB, Grenoble-INP, Saint Martin d'Hères Cedex, France
29
Collaborators
Citations 
PageRank 
24
244
18.86
Referers 
Referees 
References 
391
359
331
Search Limit
100391
Title
Citations
PageRank
Year
Clustering and causality inference using algorithmic complexity.00.342017
An effective histogram-based approach to JPEG-100 forensics00.342016
Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality".00.342016
SALZA: Soft algorithmic complexity estimates for clustering and causality inference.10.432016
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution80.462015
General-purpose image forensics using patch likelihood under image statistical models140.652015
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality170.902014
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images160.682014
A variational approach to JPEG anti-forensics190.682013
Towards A Realistic Channel Model For Security Analysis Of Authentication Using Graphical Codes50.722013
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics80.462013
Impacts of Watermarking Security on Tardos-Based Fingerprinting20.362013
Practical key length of watermarking systems20.402012
3D lighting-based image forgery detection using shape-from-shading60.552012
Security and robustness constraints for spread-spectrum Tardos fingerprinting10.352010
Comparison of secure spread-spectrum modulations applied to still image watermarking40.442009
On security threats for robust perceptual hashing70.522009
Optimization of natural watermarking using transportation theory.90.602009
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding60.542008
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system00.342008
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers242.502008
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?220.942007
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking60.542007
Natural watermarking: a secure spread spectrum technique for WOA100.802006
Achieving subspace or key security for WOA using natural or circular watermarking201.052006
Watermarking security part one: Theory150.962005
Watermarking security part two: Practice110.802005
A Theoretical Study Of Watermarking Security10.382005
Watermarking attack: security of WSS techniques100.782004