default search action
Gwenaël J. Doërr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c56]Gwenaël J. Doërr:
Digital Flamenco with Video Pirates. IH&MMSec 2024: 1-2 - [c55]Gwendal Simon, Gwenaël J. Doërr:
Next-Generation Access Tokens to Fight CDN Leeching. MHV 2024: 111-112 - 2023
- [j13]Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenaël J. Doërr, Jessica J. Fridrich, Nasir D. Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu:
Information Forensics and Security: A quarter-century-long journey. IEEE Signal Process. Mag. 40(5): 67-79 (2023) - [c54]Gwendal Simon, Gwenaël J. Doërr:
CDN Performance Evaluation with Edge-Embedded Watermarking. MHV 2023: 121 - [i1]Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenaël J. Doërr, Jessica J. Fridrich, Nasir D. Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu:
Information Forensics and Security: A quarter-century-long journey. CoRR abs/2309.12159 (2023)
2010 – 2019
- 2017
- [j12]Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr, Min Wu:
Flicker Forensics for Camcorder Piracy. IEEE Trans. Inf. Forensics Secur. 12(1): 89-100 (2017) - 2016
- [c53]Bertrand Chupeau, Antoine Robert, Séverine Baudry, Gwenaël J. Doërr:
Impact of screencasting on video temporal synchronization. ICIP 2016: 3912-3916 - 2015
- [c52]Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Anti-cropping blind resynchronization for 3D watermarking. ICASSP 2015: 1702-1706 - [c51]Hasan Sheikh Faridul, Gwenaël J. Doërr:
Outlier aggregation to pick up scattered watermark energy. ICIP 2015: 2485-2489 - [c50]Adi Hajj-Ahmad, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr:
Flicker Forensics for Pirate Device Identification. IH&MMSec 2015: 75-84 - [c49]Hasan Sheikh Faridul, Gwenaël J. Doërr, Séverine Baudry:
Disparity estimation and disparity-coherent watermarking. Media Watermarking, Security, and Forensics 2015: 94090O - [c48]Hasan Sheikh Faridul, Gwenaël J. Doërr:
A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence. WIFS 2015: 1-6 - 2014
- [j11]Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Ulrich Gries, Gwenaël J. Doërr:
A Phase-Based Audio Watermarking System Robust to Acoustic Path Propagation. IEEE Trans. Inf. Forensics Secur. 9(3): 411-425 (2014) - [j10]Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework. IEEE Trans. Inf. Forensics Secur. 9(9): 1491-1501 (2014) - [c47]Antoine Robert, Omar Alvarez, Gwenaël J. Doërr:
Adjusting bit-stream video watermarking systems to cope with HTTP adaptive streaming transmission. ICASSP 2014: 7416-7419 - [c46]Antoine Robert, Gwenaël J. Doërr:
Lightweight forensic video watermarking to enable premium content consumption on mobile devices. ICIP 2014: 3402-3404 - [c45]Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Spread transform and roughness-based shaping to improve 3D watermarking based on quadratic programming. ICIP 2014: 4777-4781 - [c44]Marc Éluard, Yves Maetz, Gwenaël J. Doërr:
Impact of geometry-preserving encryption on rendering time. ICIP 2014: 4787-4791 - [c43]César Burini, Séverine Baudry, Gwenaël J. Doërr:
Blind detection for disparity-coherent stereo video watermarking. Media Watermarking, Security, and Forensics 2014: 90280B - [c42]Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr:
Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism. SECRYPT 2014: 253-260 - [c41]Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Security analysis of radial-based 3D watermarking systems. WIFS 2014: 30-35 - [c40]Séverine Baudry, Bertrand Chupeau, Mario de Vito, Gwenaël J. Doërr:
Modeling the flicker effect in camcorded videos to improve watermark robustness. WIFS 2014: 42-47 - [c39]Bertrand Chupeau, Séverine Baudry, Gwenaël J. Doërr:
Forensic characterization of pirated movies: digital cinema cam vs. optical disc rip. WIFS 2014: 155-160 - 2013
- [j9]Xavier Rolland-Nevière, Gwenaël J. Doërr, Pierre Alliez:
Robust diameter-based thickness estimation of 3D objects. Graph. Model. 75(6): 279-296 (2013) - [c38]Bertrand Chupeau, Séverine Baudry, Gwenaël J. Doërr:
Semi-blind automatic temporal registration for video watermarking systems. ICASSP 2013: 2853-2856 - [c37]Antoine Robert, Gwenaël J. Doërr:
Impact of content mastering on the throughput of a bit stream video watermarking system. ICIP 2013: 4532-4535 - [c36]Cherif Ben Zid, Séverine Baudry, Bertrand Chupeau, Gwenaël J. Doërr:
A sneak peek into the camcorder path. Media Watermarking, Security, and Forensics 2013: 86650E - [c35]Juan Jose Moreira-Perez, Bertrand Chupeau, Gwenaël J. Doërr, Séverine Baudry:
Exploring color information to characterize camcorder piracy. WIFS 2013: 132-137 - 2012
- [j8]Xiaoying Feng, Ingemar J. Cox, Gwenaël J. Doërr:
Normalized Energy Density-Based Forensic Detection of Resampled Images. IEEE Trans. Multim. 14(3-1): 536-545 (2012) - [c34]Michael Arnold, Peter G. Baum, Manuel Alonso, Ulrich Gries, Gwenaël J. Doërr:
Simulating large scale acoustic path benchmarking. Media Watermarking, Security, and Forensics 2012: 83030T - [c33]Xavier Rolland-Nevière, Bertrand Chupeau, Gwenaël J. Doërr, Laurent Blondé:
Forensic characterization of camcorded movies: digital cinema vs. celluloid film prints. Media Watermarking, Security, and Forensics 2012: 83030R - [c32]Xiao-Ming Chen, Michael Arnold, Peter G. Baum, Gwenaël J. Doërr:
AC-3 bit stream watermarking. WIFS 2012: 181-186 - 2011
- [c31]Xiao-Ming Chen, Gwenaël J. Doërr, Michael Arnold, Peter G. Baum:
Efficient coherent phase quantization for audio watermarking. ICASSP 2011: 1844-1847 - [c30]Javier Franco-Contreras, Séverine Baudry, Gwenaël J. Doërr:
Virtual view invariant domain for 3D video blind watermarking. ICIP 2011: 2761-2764 - [c29]Xiaoying Feng, Ingemar J. Cox, Gwenaël J. Doërr:
An energy-based method for the forensic detection of Re-sampled images. ICME 2011: 1-6 - [c28]Michael Arnold, Xiao-Ming Chen, Peter G. Baum, Gwenaël J. Doërr:
Improving Tonality Measures for Audio Watermarking. Information Hiding 2011: 223-237 - 2010
- [j7]Teddy Furon, Gwenaël J. Doërr:
Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread. IEEE Secur. Priv. 8(5): 69-71 (2010) - [c27]Xiaoying Feng, Gwenaël J. Doërr:
JPEG recompression detection. Media Forensics and Security 2010: 75410J - [c26]Michael Arnold, Séverine Baudry, Peter G. Baum, Xiao-Ming Chen, Bertrand Chupeau, Olivier Courtay, Gwenaël J. Doërr, Ulrich Gries, Frédéric Lefèbvre, Michel Morvan, Antoine Robert, Charles Salmon-Legagneur, Christophe Vincent, Mario de Vito:
Multimedia security technologies for movie protection. ACM Multimedia 2010: 1515-1516 - [c25]Xiaoying Feng, Gwenaël J. Doërr:
FLD-based detection of re-compressed speech signals. MM&Sec 2010: 43-48
2000 – 2009
- 2009
- [j6]Vinod Pankajakshan, Gwenaël J. Doërr, Prabin Kumar Bora:
Detection of motion-incoherent components in video streams. IEEE Trans. Inf. Forensics Secur. 4(1): 49-58 (2009) - 2008
- [c24]Gwenaël J. Doërr, Ton Kalker:
Design rules for interoperable domains: controlling content dilution and content sharing. Digital Rights Management Workshop 2008: 39-50 - [c23]Giacomo Cancelli, Gwenaël J. Doërr, Ingemar J. Cox, Mauro Barni:
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema. ICIP 2008: 1288-1291 - [c22]Patrick Bas, Gwenaël J. Doërr:
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. MM&Sec 2008: 227-232 - [c21]Giacomo Cancelli, Gwenaël J. Doërr, Mauro Barni, Ingemar J. Cox:
A comparative study of +/- steganalyzers. MMSP 2008: 791-796 - [e1]Teddy Furon, François Cayre, Gwenaël J. Doërr, Patrick Bas:
Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4567, Springer 2008, ISBN 978-3-540-77369-6 [contents] - 2007
- [c20]Patrick Bas, Gwenaël J. Doërr:
Practical Security Analysis of Dirty Paper Trellis Watermarking. Information Hiding 2007: 174-188 - [c19]Jun Zhang, Ingemar J. Cox, Gwenaël J. Doërr:
Steganalysis for LSB Matching in Images with High-frequency Noise. MMSP 2007: 385-388 - [c18]Chin Kiong Wang, Gwenaël J. Doërr, Ingemar J. Cox:
Trellis coded modulation to improve dirty paper trellis watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050G - 2006
- [j5]Jean-Luc Dugelay, Stéphane Roche, Christian Rey, Gwenaël J. Doërr:
Still-image watermarking robust to local geometric distortions. IEEE Trans. Image Process. 15(9): 2831-2842 (2006) - [j4]Gwenaël J. Doërr, Jean-Luc Dugelay, Darko Kirovski:
On the Need for Signal-Coherent Watermarks. IEEE Trans. Multim. 8(5): 896-904 (2006) - [c17]Chin Kiong Wang, Gwenaël J. Doërr, Ingemar J. Cox:
Toward a Better Understanding of Dirty Paper Trellis Codes. ICASSP (2) 2006: 233-236 - [c16]Ingemar J. Cox, Gwenaël J. Doërr, Teddy Furon:
Watermarking Is Not Cryptography. IWDW 2006: 1-15 - [c15]P. Vinod, Gwenaël J. Doërr, Prabin Kumar Bora:
Assessing motion-coherency in video watermarking. MM&Sec 2006: 114-119 - [c14]Qiao Li, Gwenaël J. Doërr, Ingemar J. Cox:
Spread Transform Dither Modulation using a Perceptual Model. MMSP 2006: 98-102 - 2005
- [c13]Lin Lin, Gwenaël J. Doërr, Ingemar J. Cox, Matthew L. Miller:
An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking. ICIP (1) 2005: 697-700 - [c12]Gwenaël J. Doërr, Jean-Luc Dugelay:
A Countermeasur to Resist Block Replacement Attacks. ICIP (1) 2005: 965-968 - [c11]Gwenaël J. Doërr, Jean-Luc Dugelay:
How to Combat Block Replacement Attacks?. Information Hiding 2005: 161-175 - [c10]Gwenaël J. Doërr, Jean-Luc Dugelay:
Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. IWDW 2005: 216-230 - [c9]Gwenaël J. Doërr, Jean-Luc Dugelay:
Collusion issue in video watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2005: 685-696 - 2004
- [j3]Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox:
Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. 13(6): 792-807 (2004) - [j2]Gwenaël J. Doërr, Jean-Luc Dugelay:
Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Signal Process. 52(10): 2955-2964 (2004) - [c8]Gwenaël J. Doërr, Jean-Luc Dugelay:
Danger of low-dimensional watermarking subspaces. ICASSP (3) 2004: 93-96 - [c7]Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé:
Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. MM&Sec 2004: 133-142 - [c6]Gwenaël J. Doërr, Jean-Luc Dugelay:
Secure background watermarking based on video mosaicing. Security, Steganography, and Watermarking of Multimedia Contents 2004: 304-314 - 2003
- [j1]Gwenaël J. Doërr, Jean-Luc Dugelay:
A guide tour of video watermarking. Signal Process. Image Commun. 18(4): 263-282 (2003) - [c5]Gwenaël J. Doërr, Jean-Luc Dugelay:
New intra-video collusion attack using mosaicing. ICME 2003: 505-508 - [c4]Gwenaël J. Doërr, Jean-Luc Dugelay:
Secure Video Watermarking via Embedding Strength Modulation. IWDW 2003: 340-354 - 2002
- [c3]Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox:
Dirty-paper trellis codes for watermarking. ICIP (2) 2002: 129-132 - [c2]Christian Rey, Gwenaël J. Doërr, Gabriela Csurka, Jean-Luc Dugelay:
Toward generic image dewatermarking? ICIP (3) 2002: 633-636 - [c1]Matthew L. Miller, Gwenaël J. Doërr, Ingemar J. Cox:
Informed Embedding for Multi-bit Watermarks. IWDW 2002: 13-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint