Gwenaël Doërr
TitleCited byYear
A guide tour of video watermarking
G Doerr, JL Dugelay
Signal processing: Image communication 18 (4), 263-282, 2003
4702003
Applying informed coding and embedding to design a robust high-capacity watermark
ML Miller, GJ Doërr, IJ Cox
IEEE Transactions on image processing 13 (6), 792-807, 2004
3402004
Security pitfalls of frame-by-frame approaches to video watermarking
G Doërr, JL Dugelay
IEEE Transactions on Signal Processing 52 (10), 2955-2964, 2004
1782004
Steganalysis for LSB matching in images with high-frequency noise
J Zhang, IJ Cox, G Doerr
2007 IEEE 9th Workshop on Multimedia Signal Processing, 385-388, 2007
1162007
Dirty-paper trellis codes for watermarking
ML Miller, GJ Dorr, IJ Cox
Proceedings. International Conference on Image Processing 2, II-II, 2002
952002
Watermarking is not cryptography
IJ Cox, G Doërr, T Furon
International Workshop on Digital Watermarking, 1-15, 2006
922006
A comparative study of±steganalyzers
G Cancelli, G Doërr, M Barni, IJ Cox
2008 IEEE 10th Workshop on Multimedia Signal Processing, 791-796, 2008
832008
Still-image watermarking robust to local geometric distortions
JL Dugelay, S Roche, C Rey, G Doërr
IEEE transactions on image processing 15 (9), 2831-2842, 2006
792006
Detection of±1 LSB steganography based on the amplitude of histogram local extrema
G Cancelli, G Doërr, IJ Cox, M Barni
2008 15th IEEE International Conference on Image Processing, 1288-1291, 2008
752008
Normalized energy density-based forensic detection of resampled images
X Feng, IJ Cox, G Doerr
IEEE Transactions on Multimedia 14 (3), 536-545, 2012
672012
JPEG recompression detection
X Feng, G Doërr
Media Forensics and Security II 7541, 75410J, 2010
372010
Triangle surface mesh watermarking based on a constrained optimization framework
X Rolland-Neviere, G Doërr, P Alliez
IEEE transactions on information forensics and security 9 (9), 1491-1501, 2014
352014
A phase-based audio watermarking system robust to acoustic path propagation
M Arnold, XM Chen, P Baum, U Gries, G Doerr
IEEE Transactions on Information Forensics and Security 9 (3), 411-425, 2013
332013
Toward generic image dewatermarking?
C Rey, G Doërr, G Csurka, JL Dugelay
Proceedings. International Conference on Image Processing 3, 633-636, 2002
322002
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking
L Lin, G Doërr, IJ Cox, ML Miller
IEEE International Conference on Image Processing 2005 1, I-697, 2005
292005
New intra-video collusion attack using mosaicing
G Doërr, JL Dugelay
2003 International Conference on Multimedia and Expo. ICME'03. Proceedings …, 2003
292003
Danger of low-dimensional watermarking subspaces
G Doërr, JL Dugelay
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
282004
Spread transform dither modulation using a perceptual model
Q Li, G Doërr, IJ Cox
2006 IEEE Workshop on Multimedia Signal Processing, 98-102, 2006
252006
Secure background watermarking based on video mosaicing
G Doerr, JL Dugelay
Security, Steganography, and Watermarking of Multimedia Contents VI 5306 …, 2004
252004
Practical security analysis of dirty paper trellis watermarking
P Bas, G Doërr
International Workshop on Information Hiding, 174-188, 2007
242007
The system can't perform the operation now. Try again later.
Articles 1–20