default search action
François Cayre
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2003
- [b1]François Cayre:
Contributions au tatouage des maillages surfaciques 3D. (Contributions to watermarking of 3D triangle meshes). Télécom ParisTech, France, 2003
Journal Articles
- 2021
- [j12]Ludovic Darmet, Kai Wang, François Cayre:
Disentangling copy-moved source and target areas. Appl. Soft Comput. 109: 107536 (2021) - 2020
- [j11]Ludovic Darmet, Kai Wang, François Cayre:
GRAFT: Unsupervised Adaptation to Resizing for Detection of Image Manipulation. IEEE Access 8: 55619-55632 (2020) - 2016
- [j10]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
Corrections to "JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality". IEEE Trans. Inf. Forensics Secur. 11(11): 2628 (2016) - 2015
- [j9]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution. IEEE Trans. Inf. Forensics Secur. 10(5): 1076-1091 (2015) - 2014
- [j8]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
JPEG Anti-Forensics With Improved Tradeoff Between Forensic Undetectability and Image Quality. IEEE Trans. Inf. Forensics Secur. 9(8): 1211-1226 (2014) - [j7]Benjamin Mathon, François Cayre, Patrick Bas, Benoît Macq:
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images. IEEE Trans. Image Process. 23(4): 1694-1705 (2014) - 2013
- [j6]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Impacts of Watermarking Security on Tardos-Based Fingerprinting. IEEE Trans. Inf. Forensics Secur. 8(6): 1038-1050 (2013) - 2009
- [j5]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Comparison of secure spread-spectrum modulations applied to still image watermarking. Ann. des Télécommunications 64(11-12): 801-813 (2009) - 2008
- [j4]François Cayre, Patrick Bas:
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. IEEE Trans. Inf. Forensics Secur. 3(1): 1-15 (2008) - 2005
- [j3]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10): 3976-3987 (2005) - 2003
- [j2]François Cayre, Patrice Rondao-Alface, Francis J. M. Schmitt, Benoît Macq, Henri Maître:
Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Process. Image Commun. 18(4): 309-319 (2003) - [j1]François Cayre, Benoît Macq:
Data hiding on 3-D triangle meshes. IEEE Trans. Signal Process. 51(4): 939-949 (2003)
Conference and Workshop Papers
- 2019
- [c27]François Cayre, Nicolas Le Bihan:
Complexity and Similarity for Sequences using LZ77-based conditional information measure. ISIT 2019: 2454-2458 - [c26]Ludovic Darmet, Kai Wang, François Cayre:
Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches. IWDW 2019: 99-114 - 2017
- [c25]Marion Revolle, François Cayre, Nicolas Le Bihan:
Clustering and causality inference using algorithmic complexity. EUSIPCO 2017: 843-847 - 2016
- [c24]Anh Thu Phan Ho, Kai Wang, François Cayre:
An effective histogram-based approach to JPEG-100 forensics. IPTA 2016: 1-6 - 2015
- [c23]Wei Fan, Kai Wang, François Cayre:
General-purpose image forensics using patch likelihood under image statistical models. WIFS 2015: 1-6 - 2013
- [c22]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
A variational approach to JPEG anti-forensics. ICASSP 2013: 3058-3062 - [c21]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics. IH&MMSec 2013: 117-122 - [c20]Cléo Baras, François Cayre:
Towards a realistic channel model for security analysis of authentication using graphical codes. WIFS 2013: 115-119 - 2012
- [c19]Cléo Baras, François Cayre:
2D bar-codes for authentication: A security approach. EUSIPCO 2012: 1760-1766 - [c18]Wei Fan, Kai Wang, François Cayre, Zhang Xiong:
3D lighting-based image forgery detection using shape-from-shading. EUSIPCO 2012: 1777-1781 - [c17]Patrick Bas, Teddy Furon, François Cayre:
Practical key length of watermarking systems. ICASSP 2012: 1769-1772 - 2010
- [c16]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Considering security and robustness constraints for watermark-based Tardos fingerprinting. MMSP 2010: 46-51 - [c15]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Security and robustness constraints for spread-spectrum Tardos fingerprinting. WIFS 2010: 1-6 - 2009
- [c14]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Patrick Bas, François Cayre:
On security threats for robust perceptual hashing. Media Forensics and Security 2009: 72540H - [c13]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Optimization of natural watermarking using transportation theory. MM&Sec 2009: 33-38 - 2008
- [c12]Benjamin Mathon, Patrick Bas, François Cayre, Fernando Pérez-González:
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. Information Hiding 2008: 325-340 - 2007
- [c11]Patrice Rondao-Alface, Benoît Macq, François Cayre:
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack? ICIP (5) 2007: 465-468 - [c10]Benjamin Mathon, Patrick Bas, François Cayre:
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. MM&Sec 2007: 237-244 - [c9]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The good, the bad, and the ugly: three different approaches to break their watermarking system. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650517 - 2006
- [c8]Patrick Bas, François Cayre:
Natural Watermarking: A Secure Spread Spectrum Technique for WOA. Information Hiding 2006: 1-14 - [c7]Patrick Bas, François Cayre:
Achieving subspace or key security for WOA using natural or circular watermarking. MM&Sec 2006: 80-88 - 2005
- [c6]François Cayre, Caroline Fontaine, Teddy Furon:
A theoretical study of watermarking security. ISIT 2005: 1868-1872 - [c5]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part one: Theory. Security, Steganography, and Watermarking of Multimedia Contents 2005: 746-757 - [c4]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking security part two: Practice. Security, Steganography, and Watermarking of Multimedia Contents 2005: 758-768 - 2004
- [c3]François Cayre, Caroline Fontaine, Teddy Furon:
Watermarking Attack: Security of WSS Techniques. IWDW 2004: 171-183 - 2003
- [c2]Patrice Rondao-Alface, Benoît Macq, François Cayre, Francis J. M. Schmitt, Henri Maître:
Lapped spectral decomposition for 3D triangle mesh compression. ICIP (1) 2003: 781-784 - 2002
- [c1]Jan C. Vorbrüggen, François Cayre:
The Certimark benchmark: architecture and future perspectives. ICME (2) 2002: 485-488
Editorship
- 2016
- [e2]Fernando Pérez-González, Patrick Bas, Tanya Ignatenko, François Cayre:
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016. ACM 2016, ISBN 978-1-4503-4290-2 [contents] - 2008
- [e1]Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6 [contents]
Informal and Other Publications
- 2016
- [i2]Marion Revolle, François Cayre, Nicolas Le Bihan:
SALZA: Soft algorithmic complexity estimates for clustering and causality inference. CoRR abs/1607.05144 (2016) - 2008
- [i1]Gaëtan Le Guelvouit, Teddy Furon, François Cayre:
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system. CoRR abs/0811.4681 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint