default search action
Patrick Bas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Jan Butora, Pauline Puteaux, Patrick Bas:
Errorless Robust JPEG Steganography Using Outputs of JPEG Coders. IEEE Trans. Dependable Secur. Comput. 21(4): 2394-2406 (2024) - [j24]Jan Butora, Patrick Bas:
Size-Independent Reliable CNN for RJCA Steganalysis. IEEE Trans. Inf. Forensics Secur. 19: 4420-4431 (2024) - [j23]Etienne Levecque, Jan Butora, Patrick Bas:
Finding Incompatible Blocks for Reliable JPEG Steganalysis. IEEE Trans. Inf. Forensics Secur. 19: 9467-9479 (2024) - [c81]Jan Butora, Patrick Bas:
Detection of the Adobe Pattern. EUSIPCO 2024: 730-734 - [c80]Antoine Mallet, Rémi Cogranne, Patrick Bas:
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis. IH&MMSec 2024: 31-39 - [c79]Antoine Mallet, Patrick Bas, Rémi Cogranne:
Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch. IH&MMSec 2024: 87-94 - [c78]Jan Butora, Patrick Bas:
The Adobe Hidden Feature and its Impact on Sensor Attribution. IH&MMSec 2024: 143-148 - [i15]Jan Butora, Patrick Bas:
The Adobe Hidden Feature and its Impact on Sensor Attribution. CoRR abs/2401.01366 (2024) - [i14]Etienne Levecque, Jan Butora, Patrick Bas:
Finding Incompatibles Blocks for Reliable JPEG Steganalysis. CoRR abs/2402.13660 (2024) - [i13]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis. CoRR abs/2405.16961 (2024) - [i12]Etienne Levecque, Jan Butora, Patrick Bas:
Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics. CoRR abs/2408.17106 (2024) - 2023
- [j22]Jan Butora, Patrick Bas:
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. IEEE Trans. Inf. Forensics Secur. 18: 2683-2695 (2023) - [c77]Etienne Levecque, Patrick Bas, Jan Butora:
Compatibility and Timing Attacks for JPEG Steganalysis. IH&MMSec 2023: 29-35 - [c76]Jan Butora, Patrick Bas, Rémi Cogranne:
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack. IH&MMSec 2023: 59-66 - [c75]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Leveraging Data Geometry to Mitigate CSM in Steganalysis. WIFS 2023: 1-6 - [i11]Etienne Levecque, Patrick Bas, Jan Butora:
Compatibility and Timing Attacks for JPEG Steganalysis. CoRR abs/2306.01317 (2023) - [i10]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Leveraging Data Geometry to Mitigate CSM in Steganalysis. CoRR abs/2310.04479 (2023) - 2022
- [j21]Benoît Bonnet, Teddy Furon, Patrick Bas:
Generating Adversarial Images in Quantized Domains. IEEE Trans. Inf. Forensics Secur. 17: 373-385 (2022) - [j20]Rémi Cogranne, Quentin Giboulot, Patrick Bas:
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. IEEE Trans. Inf. Forensics Secur. 17: 1328-1343 (2022) - [j19]Quentin Giboulot, Patrick Bas, Rémi Cogranne:
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. IEEE Trans. Inf. Forensics Secur. 17: 1841-1854 (2022) - [j18]Solène Bernard, Patrick Bas, John Klein, Tomás Pevný:
Backpack: A Backpropagable Adversarial Embedding Scheme. IEEE Trans. Inf. Forensics Secur. 17: 3539-3554 (2022) - [c74]Quentin Giboulot, Patrick Bas, Rémi Cogranne, Dirk Borghys:
The Cover Source Mismatch Problem in Deep-Learning Steganalysis. EUSIPCO 2022: 1032-1036 - [c73]Benoît Bonnet, Teddy Furon, Patrick Bas:
Impact of Downscaling on Adversarial Images. ICIP 2022: 2256-2260 - [c72]Jan Butora, Patrick Bas:
Fighting the Reverse JPEG Compatibility Attack: Pick your Side. IH&MMSec 2022: 113-121 - [c71]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Using Set Covering to Generate Databases for Holistic Steganalysis. WIFS 2022: 1-6 - [c70]Etienne Levecque, John Klein, Patrick Bas, Jan Butora:
Toward Reliable JPEG Steganalysis (at QF100). WIFS 2022: 1-6 - [i9]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Using Set Covering to Generate Databases for Holistic Steganalysis. CoRR abs/2211.03447 (2022) - [i8]Jan Butora, Pauline Puteaux, Patrick Bas:
Errorless Robust JPEG Steganography using Outputs of JPEG Coders. CoRR abs/2211.04750 (2022) - [i7]Jan Butora, Patrick Bas:
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. CoRR abs/2211.05530 (2022) - 2021
- [j17]Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica J. Fridrich:
Natural Steganography in JPEG Domain With a Linear Development Pipeline. IEEE Trans. Inf. Forensics Secur. 16: 173-186 (2021) - [j16]Solène Bernard, Patrick Bas, John Klein, Tomás Pevný:
Explicit Optimization of min max Steganographic Game. IEEE Trans. Inf. Forensics Secur. 16: 812-823 (2021) - [j15]Quentin Giboulot, Rémi Cogranne, Patrick Bas:
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off. IEEE Trans. Inf. Forensics Secur. 16: 2202-2217 (2021) - [c69]Pauline Puteaux, Vincent Itier, Patrick Bas:
Combining Forensics and Privacy Requirements for Digital Images. EUSIPCO 2021: 806-810 - [c68]Solène Bernard, Patrick Bas, Tomás Pevný, John Klein:
Optimizing Additive Approximations of Non-additive Distortion Functions. IH&MMSec 2021: 105-112 - [c67]Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas:
Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics. WIFS 2021: 1-6 - [e3]Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tomás Pevný, Bin Li, Jennifer Newman:
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021. ACM 2021, ISBN 978-1-4503-8295-3 [contents] - [i6]Pauline Puteaux, Vincent Itier, Patrick Bas:
Combining Forensics and Privacy Requirements for Digital Images. CoRR abs/2103.03569 (2021) - 2020
- [j14]Quentin Giboulot, Rémi Cogranne, Dirk Borghys, Patrick Bas:
Effects and solutions of Cover-Source Mismatch in image steganalysis. Signal Process. Image Commun. 86: 115888 (2020) - [c66]Quentin Giboulot, Rémi Cogranne, Patrick Bas:
JPEG Steganography with Side Information from the Processing Pipeline. ICASSP 2020: 2767-2771 - [c65]Benoît Bonnet, Teddy Furon, Patrick Bas:
Forensics Through Stega Glasses: The Case of Adversarial Images. ICPR Workshops (6) 2020: 453-469 - [c64]Mehdi Yedroudj, Marc Chaumont, Frédéric Comby, Ahmed Oulad Amara, Patrick Bas:
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis. IH&MMSec 2020: 39-48 - [c63]Benoît Bonnet, Teddy Furon, Patrick Bas:
What if Adversarial Samples were Digital Images? IH&MMSec 2020: 55-66 - [c62]Théo Taburet, Patrick Bas, Wadih Sawaya, Rémi Cogranne:
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline. IH&MMSec 2020: 139-149 - [c61]Rémi Cogranne, Quentin Giboulot, Patrick Bas:
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images. IH&MMSec 2020: 161-167 - [c60]Benoît Bonnet, Teddy Furon, Patrick Bas:
Fooling an Automatic Image Quality Estimator. MediaEval 2020 - [c59]Rémi Cogranne, Quentin Giboulot, Patrick Bas:
ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images. WIFS 2020: 1-5 - [c58]Quentin Giboulot, Patrick Bas, Rémi Cogranne:
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography. WIFS 2020: 1-6 - [i5]Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica J. Fridrich:
Natural Steganography in JPEG Domain with a Linear Development Pipeline. CoRR abs/2001.02653 (2020) - [i4]Théo Taburet, Patrick Bas, Wadih Sawaya, Rémi Cogranne:
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline. CoRR abs/2003.10082 (2020) - [i3]Benoît Bonnet, Teddy Furon, Patrick Bas:
Adversarial Images through Stega Glasses. CoRR abs/2010.07542 (2020)
2010 – 2019
- 2019
- [c57]Théo Taburet, Patrick Bas, Jessica J. Fridrich, Wadih Sawaya:
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain. IH&MMSec 2019: 57-62 - [c56]Rémi Cogranne, Quentin Giboulot, Patrick Bas:
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis. IH&MMSec 2019: 125-137 - [c55]Solène Bernard, Tomás Pevný, Patrick Bas, John Klein:
Exploiting Adversarial Embeddings for Better Steganography. IH&MMSec 2019: 216-221 - [c54]Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica J. Fridrich:
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain. Media Watermarking, Security, and Forensics 2019 - 2018
- [c53]Dirk Borghys, Patrick Bas, Helena Bruyninckx:
Facing the Cover-Source Mismatch on JPHide using Training-Set Design. IH&MMSec 2018: 17-22 - [c52]Théo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya:
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. IWDW 2018: 290-303 - [c51]Tomás Denemark, Patrick Bas, Jessica J. Fridrich:
Natural Steganography in JPEG Compressed Images. Media Watermarking, Security, and Forensics 2018 - [c50]Quentin Giboulot, Rémi Cogranne, Patrick Bas:
Steganalysis into the Wild: How to Define a Source? Media Watermarking, Security, and Forensics 2018 - 2017
- [c49]Patrick Bas:
An embedding mechanism for natural steganography after down-sampling. ICASSP 2017: 2127-2131 - 2016
- [c48]Slava Voloshynovskiy, Taras Holotyak, Patrick Bas:
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness. ICASSP 2016: 2029-2033 - [c47]Andrew D. Ker, Tomás Pevný, Patrick Bas:
Rethinking Optimal Embedding. IH&MMSec 2016: 93-102 - [c46]Anh Thu Phan Ho, Wadih Sawaya, Patrick Bas:
Rare event probability estimation using information projection. ISITA 2016: 251-255 - [c45]Patrick Bas:
Steganography via cover-source switching. WIFS 2016: 1-6 - [e2]Fernando Pérez-González, Patrick Bas, Tanya Ignatenko, François Cayre:
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016. ACM 2016, ISBN 978-1-4503-4290-2 [contents] - [i2]Patrick Bas:
Natural Steganography: cover-source switching for better steganography. CoRR abs/1607.07824 (2016) - 2014
- [j13]Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Document authentication using graphical codes: reliable performance analysis and channel optimization. EURASIP J. Inf. Secur. 2014: 9 (2014) - [j12]Benjamin Mathon, François Cayre, Patrick Bas, Benoît Macq:
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images. IEEE Trans. Image Process. 23(4): 1694-1705 (2014) - [c44]Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Authentication using graphical codes: Optimisation of the print and scan channels. EUSIPCO 2014: 800-804 - [c43]Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Image model and printed document authentication: A theoretical analysis. ICIP 2014: 5377-5381 - 2013
- [j11]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Impacts of Watermarking Security on Tardos-Based Fingerprinting. IEEE Trans. Inf. Forensics Secur. 8(6): 1038-1050 (2013) - [j10]Patrick Bas, Teddy Furon:
A New Measure of Watermarking Security: The Effective Key Length. IEEE Trans. Inf. Forensics Secur. 8(8): 1306-1317 (2013) - [c42]Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomás Filler, Jessica J. Fridrich, Tomás Pevný:
Moving steganography and steganalysis from the laboratory into the real world. IH&MMSec 2013: 45-58 - [c41]Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya, Patrick Bas:
Document authentication using graphical codes: impacts of the channel model. IH&MMSec 2013: 87-94 - 2012
- [c40]Mouhamadou L. Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya:
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference. Communications and Multimedia Security 2012: 39-54 - [c39]Patrick Bas, Teddy Furon:
Are 128 Bits Long Keys Possible in Watermarking? Communications and Multimedia Security 2012: 191 - [c38]Patrick Bas, Teddy Furon:
Key length estimation of zero-bit watermarking schemes. EUSIPCO 2012: 1693-1697 - [c37]Patrick Bas, Teddy Furon, François Cayre:
Practical key length of watermarking systems. ICASSP 2012: 1769-1772 - [c36]Teddy Furon, Patrick Bas:
A New Measure of Watermarking Security Applied on QIM. Information Hiding 2012: 207-223 - [i1]Patrick Bas, Teddy Furon:
The Effective Key Length of Watermarking Schemes. CoRR abs/1202.3562 (2012) - 2011
- [j9]Yoan Miche, Mark van Heeswijk, Patrick Bas, Olli Simula, Amaury Lendasse:
TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization. Neurocomputing 74(16): 2413-2421 (2011) - [c35]Patrick Bas:
Informed secure watermarking using optimal transport. ICASSP 2011: 1848-1851 - [c34]Patrick Bas, Tomás Filler, Tomás Pevný:
"Break Our Steganographic System": The Ins and Outs of Organizing BOSS. Information Hiding 2011: 59-70 - [c33]Patrick Bas:
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching. Information Hiding 2011: 208-222 - 2010
- [j8]Tomás Pevný, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2): 215-224 (2010) - [j7]Yoan Miche, Antti Sorjamaa, Patrick Bas, Olli Simula, Christian Jutten, Amaury Lendasse:
OP-ELM: optimally pruned extreme learning machine. IEEE Trans. Neural Networks 21(1): 158-162 (2010) - [c32]Yoan Miche, Emil Eirola, Patrick Bas, Olli Simula, Christian Jutten, Amaury Lendasse, Michel Verleysen:
Ensemble Modeling with a Constrained Linear System of Leave-One-Out Outputs. ESANN 2010 - [c31]Tomás Pevný, Tomás Filler, Patrick Bas:
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. Information Hiding 2010: 161-177 - [c30]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Considering security and robustness constraints for watermark-based Tardos fingerprinting. MMSP 2010: 46-51 - [c29]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Security and robustness constraints for spread-spectrum Tardos fingerprinting. WIFS 2010: 1-6
2000 – 2009
- 2009
- [j6]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Comparison of secure spread-spectrum modulations applied to still image watermarking. Ann. des Télécommunications 64(11-12): 801-813 (2009) - [j5]Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten, Olli Simula:
Reliable Steganalysis Using a Minimum Set of Samples and Features. EURASIP J. Inf. Secur. 2009 (2009) - [c28]Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Patrick Bas, François Cayre:
On security threats for robust perceptual hashing. Media Forensics and Security 2009: 72540H - [c27]Patrick Bas, Andreas Westfeld:
Two key estimation techniques for the broken arrows watermarking scheme. MM&Sec 2009: 1-8 - [c26]Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq:
Optimization of natural watermarking using transportation theory. MM&Sec 2009: 33-38 - [c25]Tomás Pevný, Patrick Bas, Jessica J. Fridrich:
Steganalysis by subtractive pixel adjacency matrix. MM&Sec 2009: 75-84 - 2008
- [j4]Teddy Furon, Patrick Bas:
Broken Arrows. EURASIP J. Inf. Secur. 2008 (2008) - [j3]François Cayre, Patrick Bas:
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. IEEE Trans. Inf. Forensics Secur. 3(1): 1-15 (2008) - [c24]Yoan Miche, Patrick Bas, Christian Jutten, Olli Simula, Amaury Lendasse:
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM. ESANN 2008: 247-252 - [c23]Benjamin Mathon, Patrick Bas, François Cayre, Fernando Pérez-González:
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. Information Hiding 2008: 325-340 - [c22]Patrick Bas, Gwenaël J. Doërr:
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. MM&Sec 2008: 227-232 - [e1]Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6 [contents] - 2007
- [c21]Patrick Bas, Gwenaël J. Doërr:
Practical Security Analysis of Dirty Paper Trellis Watermarking. Information Hiding 2007: 174-188 - [c20]Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten, Olli Simula:
Advantages of Using Feature Selection Techniques on Steganalysis Schemes. IWANN 2007: 606-613 - [c19]Benjamin Mathon, Patrick Bas, François Cayre:
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking. MM&Sec 2007: 237-244 - 2006
- [c18]Patrick Bas, François Cayre:
Natural Watermarking: A Secure Spread Spectrum Technique for WOA. Information Hiding 2006: 1-14 - [c17]Patrick Bas, François Cayre:
Achieving subspace or key security for WOA using natural or circular watermarking. MM&Sec 2006: 80-88 - [c16]Yoan Miche, Benoit Roue, Amaury Lendasse, Patrick Bas:
A Feature Selection Methodology for Steganalysis. MRCS 2006: 49-56 - 2005
- [c15]Jocelyn Chanussot, Patrick Bas, Lionel Bombrun:
Airborne remote sensing of vineyards for the detection of dead vine trees. IGARSS 2005: 3090-3093 - [c14]Patrick Bas:
A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers. Information Hiding 2005: 106-117 - [c13]Patrick Bas, Jarmo Hurri:
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images. IWDW 2005: 186-200 - 2004
- [c12]Alejandro LoboGuerrero, Ferran Marqués, Patrick Bas, Joel Lienard:
Enhanced audio data hiding synchronization using non linear filters. ICASSP (2) 2004: 885-888 - [c11]Benoit Roue, Patrick Bas, Jean-Marc Chassery:
Improving LSB steganalysis using marginal and joint probabilistic distributions. MM&Sec 2004: 75-80 - [c10]Alejandro LoboGuerrero, Patrick Bas, Joel Lienard:
An informed synchronization scheme for audio data hiding. Security, Steganography, and Watermarking of Multimedia Contents 2004: 116-126 - 2003
- [c9]Patrick Bas, Nicolas Le Bihan, Jean-Marc Chassery:
Color image watermarking using quaternion Fourier transform. ICASSP (3) 2003: 521-524 - 2002
- [j2]Patrick Bas, Jean-Marc Chassery, Benoît Macq:
Image watermarking: an evolution to content based approaches. Pattern Recognit. 35(3): 545-561 (2002) - [j1]Patrick Bas, Jean-Marc Chassery, Benoît Macq:
Geometrically invariant watermarking using feature points. IEEE Trans. Image Process. 11(9): 1014-1028 (2002) - [c8]Boris Vassaux, Philippe Nguyen, Séverine Baudry, Patrick Bas, Jean-Marc Chassery:
Scrambling-based watermarking for MPEG-4 video. EUSIPCO 2002: 1-4 - 2001
- [c7]Patrick Bas, Benoît Macq:
A new video-object watermarking scheme robust to object manipulation. ICIP (3) 2001: 526-529 - [c6]Patrick Bas, Benoît Macq:
A new video-object watermarking scheme robust to object manipulation. ICIP (2) 2001: 526-529 - [c5]Boris Vassaux, Patrick Bas, Jean-Marc Chassery:
A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness. ICIP (3) 2001: 983-986 - 2000
- [c4]Patrick Bas, Jean-Marc Chassery, Benoît Macq:
Robust watermarking based on the warping of predefined triangular patterns. Security and Watermarking of Multimedia Contents 2000: 99-109
1990 – 1999
- 1999
- [c3]Patrick Bas, Jean-Marc Chassery, Franck Davoine:
Geometrical and frequential watermarking scheme using similarities. Security and Watermarking of Multimedia Contents 1999: 264-272 - 1998
- [c2]Patrick Bas, Jean-Marc Chassery, Franck Davoine:
Self-similarity based image watermarking. EUSIPCO 1998: 1-4 - [c1]Patrick Bas, Jean-Marc Chassery, Franck Davoine:
Using the Fractal Code to Watermark Images. ICIP (1) 1998: 469-473
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint