Search

Your search keyword '"Furon, Teddy"' showing total 492 results

Search Constraints

Start Over You searched for: Author "Furon, Teddy" Remove constraint Author: "Furon, Teddy"
492 results on '"Furon, Teddy"'

Search Results

152. Similarity by diverting supervised machine learning — Application to knowledge discovery in multimedia content

153. Decoding Fingerprinting Using the Markov Chain Monte Carlo Method

154. Chapitre V: Les mesures techniques de protection - Une brève introduction

155. Un schéma complet de traçage de documents multimédia reposant sur des versions améliorées des codes de Tardos et de la technique de tatouage ' Broken Arrows '

156. ESTIMATING THE PROBABILITY OF FALSE ALARM FOR A ZERO-BIT WATERMARKING TECHNIQUE

157. Le traçage de traîtres

158. Beyond 'project and sign' for cosine estimation with binary codes

159. Les Mesures Techniques de Protection... autrement dit les DRM

160. Rare event simulation for a static distribution

161. On achievable security levels for lattice data hiding in the known message attack

167. La stéganographie moderne

168. SmartRight: A Copy Protection System for Digital Home Networks

169. Robustness of an asymmetric technique

170. Recherche approximative de plus proches voisins efficace et sûre

171. Using extreme value theory for image detection

172. Watermark detector based on Nth order statistics

173. Key Length Estimation of Zero-Bit Watermarking Schemes

174. A New Measure of Watermarking Security Applied on DC-DM QIM

175. Copy protection of distributed contents: an application of watermarking techniques

176. Estimating Local Intrinsic Dimensionality

177. Better security levels for 'Broken Arrows'

180. Proceedings of the 9th Information Hiding Workshop

181. Watermarking security part I: theory

182. Watermarking security part II: practice

183. Tatouage asymétrique

187. Applied public-key steganography

188. Introduction aux méthodes de tatouage asymétriques dans le cadre de la protection de copie

189. An unified approach of asymmetric watermarking schemes

190. Audio asymmetric watermarking technique

191. Développement de méthodes de tatouage sûres pour le traçage de contenus multimédia

Catalog

Books, media, physical & digital resources