Publications

© COPYRIGHT NOTICE
All the documents on this server are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Conference / Workshop Publications

  1. B. Chupeau, A. Robert, S. Baudry, and G. DoŽrr, "Impact of Screencasting on Video Temporal Synchronization", in Proceedings of the IEEE International Conference on Image Processing, pp. 3912-3916, 2016 Download paper
  2. H. Sheikh-Faridul and G. DoŽrr, "A Population of Eagles, Horses, and Moles: Perceptual Sensitivity to Watermark Disparity Coherence", in Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 1-6, 2015 Download paper
  3. H. Sheikh-Faridul and G. DoŽrr, "Outlier Aggregation to Pick Up Scattered Watermark Energy", in Proceedings of the IEEE International Conference on Image Processing, pp. 2485-2489, 2015 Download paper
  4. A. Hajj-Ahmad, S. Baudry, B. Chupeau, and G. DoŽrr, "Flicker Forensics for Pirate Devices Identification" [Best Student Paper Award], in Proceedings of the ACM International Workshop on Information Hiding and Multimedia Security, pp. 75-84, 2015 Download paper via ACM's Author-Izer
  5. X. Rolland-NeviŤre, G. DoŽrr, and P. Alliez, "Anti-Cropping Blind Resynchronization for 3D Watermarking" [Best Student Paper in the IFS track], in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 1702-1706, 2015 Download paper
  6. H. Sheikh-Faridul, G. DoŽrr, and S. Baudry, "Disparity Estimation and Disparity-coherent Watermarking", in Media Watermarking, Security, and Forensics XVII, Proceedings of SPIE 9409, pp. 94090O, 2015 Download paper
  7. B. Chupeau, S. Baudry, and G. DoŽrr, "Forensic Characterization of Pirated Movies: Digital Cinema Cam vs. Optical Disc Rip", in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 155-160, 2014 Download paper
  8. S. Baudry, B. Chupeau, M. de Vito, and G. DoŽrr, "Modeling the Flicker Effect in Camcorded Videos to Improve Watermark Robustness", in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 42-47, 2014 Download paper
  9. X. Rolland-NeviŤre, G. DoŽrr, and P. Alliez, "Security Analysis of Radial-based 3D Watermarking Systems", in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 30-35, 2014 Download paper
  10. X. Rolland-NeviŤre, G. DoŽrr, and P. Alliez, "Spread Transform and Roughness-based Shaping to Improve 3D Watermarking based on Quadratic Programming", in Proceedings of the IEEE International Conference on Image Processing, pp. 4777-4781, 2014 Download paper
  11. M. Eluard, Y. Maetz, and G. DoŽrr, "Impact of Geometry-preserving Encryption on Rendering Time" [top 10% award], in Proceedings of the IEEE International Conference on Image Processing, pp. 4787-4791, 2014 Download paper
  12. P. Anton del Pino, A. Monsifrot, C. Salmon-Legagneur, and G. DoŽrr, "Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism", in Proceedings of the International Conference on Security and Cryptography, pp. 253-260, 2014 Download paper
  13. A. Robert, O. Alvarez, and G. DoŽrr, "Adjusting Bit-stream Video Watermarking Systems to Cope with HTTP Adaptive Streaming Transmission", in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 7416-7419, 2014 Download paper
  14. C. Burini, S. Baudry, and G. DoŽrr, "Blind Detection for Disparity-coherent Stereo Video Watermarking", in Media Watermarking, Security, and Forensics XVI, Proceedings of SPIE 9028, pp. 90280B, 2014 Download paper
  15. M. Eluard, Y. Maetz, and G. DoŽrr, "Geometry-preserving Encryption for 3D Meshes", in Actes de COmpression et REprťsentation des Signaux Audiovisuels, pp. 7-12, 2013 Download paper
  16. J.J. Moreira-Pťrez, B. Chupeau, G. DoŽrr and S. Baudry, "Exploring Color Information to Characterize Camcorder Piracy", in Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 132-137, 2013 Download paper
  17. A. Robert and G. DoŽrr, "Impact of Content Mastering on the Throughput of a Bit Stream Video Watermarking System", in Proceedings of the IEEE International Conference on Image Processing, pp. 4532-4535, 2013 Download paper
  18. B. Chupeau, S. Baudry, and G. DoŽrr, "Semi-blind Automatic Temporal Registration for Video Watermarking Systems", in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2853-2856, 2013 Download paper
  19. C. Ben Zid, S. Baudry, and G. DoŽrr, "A Sneak Peek into the Camcorder Path", in Media Watermarking, Security, and Forensics XV, Proceedings of SPIE 8665, pp. 86650E, 2013 Download paper
  20. X.-M. Chen, M. Arnold, P. Baum, and G. DoŽrr, "AC-3 Bit Stream Watermarking", in Proceedings of the IEEE Workshop on Information Forensics and Security, pp. 181-186, 2012 Download paper
  21. X. Rolland-NeviŤre, B. Chupeau, G. DoŽrr, and L. Blondť, "Forensic Characterization of Camcorded Movies: Digital Cinema versus Celluloid Film Prints", in Media Watermarking, Security, and Forensics XIV, Proceedings of SPIE 8303, pp. 83030R, 2012 Download paper
  22. M. Arnold, P. Baum, M. Alonso, U. Gries, and G. DoŽrr, "Simulating Large-scale Acoustic Path Benchmarking", in Media Watermarking, Security, and Forensics XIV, Proceedings of SPIE 8303, pp. 83030T, 2012 Download paper
  23. J. Franco-Contreras, S. Baudry, and G. DoŽrr, "Virtual View Invariant Domain for 3D Video Blind Watermarking", in Proceedings of the IEEE International Conference on Image Processing, pp. 2817-2820, 2011 Download paper
  24. X. Feng, G. DoŽrr, and I. J. Cox, "An Energy-based Method for the Forensic Detection of Re-sampled Images", in Proceedings of the IEEE International Conference on Multimedia and Expo, pp. 1-6, 2011 Download paper
  25. M. Arnold, X.-M. Chen, P. G. Baum, and G. DoŽrr, "Improving Tonality Estimation for Audio Watermarking", in Proceedings of Information Hiding 2011, LNCS 6958, pp. 223-237, 2011 Download paper
  26. X.-M. Chen, G. DoŽrr, M. Arnold, and P. G. Baum, "Efficient Coherent Phase Quantization for Audio Watermarking", in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1844-1847, 2011 Download paper
  27. X. Feng and G. DoŽrr, "FLD-based Detection of Re-compressed Speech Signals", in Proceedings of the 12th ACM Workshop on Multimedia and Security, pp. 43-48, 2010 Download paper via ACM's Author-Izer
  28. X. Feng and G. DoŽrr, "JPEG Recompression Detection", in Media Forensics and Security II, Proceedings of SPIE 7541, pp. 75410J, 2010 Download paper
  29. G. DoŽrr and T. Kalker, "Design Rules for Interoperable Domains - Controlling Content Dilution and Content Sharing", in Proceedings of the Eighth ACM DRM Workshop, pp. 39-49, 2008 Download paper via ACM's Author-Izer
  30. G. Cancelli, M. Barni, G. DoŽrr and I. J. Cox, "A Comparative Study of Ī1 Steganalyzers", in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp. 791-796, 2008 Download paper
  31. P. Bas and G. DoŽrr, "Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes", in Proceedings of the ACM Multimedia and Security Workshop, pp. 227-232, 2008 Download paper via ACM's Author-Izer
  32. G. Cancelli, G. DoŽrr, M. Barni and I. J. Cox, "Detection of Ī1 LSB Steganography Based on the Amplitude of Histogram Local Extrema", in Proceedings of the IEEE International Conference on Image Processing, pp. 1288-1291, 2008 Download paper
  33. J. Zhang, G. DoŽrr and I. J. Cox, "Steganalysis for LSB Matching in Images with High Frequency Noise", in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp. 385-388, 2007 Download paper
  34. P. Bas and G. DoŽrr, "Practical Security Analysis of Dirty Paper Trellis Watermarking", in Proceedings of Information Hiding 2007, LNCS 4567, pp. 174-188, 2007 Download paper
  35. C. Wang, G. DoŽrr and I. J. Cox, "Trellis Coded Modulation to Improve Dirty Paper Trellis Watermarking", in Security, Steganography and Watermarking of Multimedia Contents IX, Proceedings of SPIE 6505, pp. 65050G, 2007 Download paper
  36. I. J. Cox, G. DoŽrr and T. Furon, "Watermarking is not Cryptography" [invited paper], in Proceedings of the 5th International Workshop on Digital Watermarking, LNCS 4283, pp. 1-15, 2006 Download paper
  37. Q. Li, G. DoŽrr and I. J. Cox, "Spread-Transform Dither Modulation using a Perceptual Model", in Proceedings of the IEEE International Workshop on Multimedia Signal Processing, pp. 98-102, 2006 Download paper
  38. V. Pankajakshan, G. DoŽrr and P. K. Bora, "Assessing Motion Coherency in Video Watermarking", in Proceedings of the ACM Multimedia and Security Workshop, pp. 114-119, 2006 Download paper via ACM's Author-Izer
  39. C. Wang, G. DoŽrr and I. J. Cox, "Toward a Better Understanding of Dirty Paper Trellis Codes", in Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, vol. II, pp. 233-236, 2006 Download paper
  40. In French G. DoŽrr and J.-L. Dugelay, "Problťmatique de la Collusion en Tatouage Vidťo - Attaques et Ripostes", in Actes de COmpression et REprťsentation des Signaux Audiovisuels, pp. 153-158, 2005 Download paper
  41. G. DoŽrr and J.-L. Dugelay, "Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy", in Proceedings of the 4th International Workshop on Digital Watermarking, LNCS 3710, pp.216-230, 2005 Download paper
  42. G. DoŽrr and J.-L. Dugelay, "A Countermeasure to Resist Block Replacement Attacks", in Proceedings of the IEEE International Conference on Image Processing, vol. I, pp. 965-968, 2005 Download paper
  43. L. Lin, I. J. Cox, G. DoŽrr and M. L. Miller, "An Efficient Algorithm for Informed Embedding of Dirty Paper Trellis Codes for Watermarking", in Proceedings of the IEEE International Conference on Image Processing, vol. I, pp. 697-700, 2005 Download paper
  44. G. DoŽrr and J.-L. Dugelay, "How to Combat Block Replacement Attacks?", in Proceedings of the 7th Information Hiding Workshop, LNCS 3727, pp. 161-175, 2005 Download paper
  45. G. DoŽrr and J.-L. Dugelay, "Signal Coherent Watermarking in Video", in Proceedings of the 6th International Workshop on Image Analysis for Multimedia Interactive Services, 2005 Download paper
  46. G. DoŽrr, C. Rey and J.-L. Dugelay, "Watermark Resynchronization based on Elastic Graph Matching", in Proceedings of the International Conference on Sciences of Electronic, Technologies of Information and Telecommunications, 2005 Download paper
  47. G. DoŽrr and J.-L. Dugelay, "Collusion Issue in Video Watermarking", in Security, Steganography and Watermarking of Multimedia Contents VII, Proceedings of SPIE 5681, pp. 685-696, 2005 Download paper
  48. G. DoŽrr, J.-L. Dugelay and L. Grangť, "Exploiting Self-Similarities to Defeat Digital Watermarking Systems - A Case Study on Still Images", in Proceedings of the ACM Multimedia and Security Workshop, pp. 133-142, 2004 Download paper via ACM's Author-Izer
  49. G. DoŽrr and J.-L. Dugelay, "Danger of Low-Dimensional Watermarking Subspaces", in Proceedings of the IEEE International Conference On Acoustics, Speech and Signal Processing, vol. III, pp. 93-96, 2004 Download paper
  50. G. DoŽrr and J.-L. Dugelay, "Secure Background Watermarking Based on Video Mosaicing", in Security, Steganography and Watermarking of Multimedia Contents VI, Proceedings of SPIE 5306, pp. 304-314, 2004 Download paper
  51. G. DoŽrr and J.-L. Dugelay, "Secure Video Watermarking Via Embedding Strength Modulation", in Proceedings of the Second International Workshop on Digital Watermarking, LNCS 2939, pp. 340-354, 2003 Download paper
  52. G. DoŽrr and J.-L. Dugelay, "New Intra-Video Collusion Attack Using Mosaicing", in Proceedings of the IEEE International Conference on Multimedia & Expo, vol. II, pp. 505-508, 2003 Download paper
  53. M. L. Miller, G. J. DoŽrr and I. J. Cox, "Informed Embedding for Multi-Bit Watermarks", in Proceedings of the First International Workshop on Digital Watermarking, LNCS 2613, pp. 13-21, 2002 Download paper.
  54. C. Rey, G. DoŽrr, J.-L. Dugelay and G. K. Csurka, "Toward Generic Image Dewatermarking?", in Proceedings of the IEEE International Conference on Image Processing, vol. III, pp. 633-636, 2002 Download paper
  55. M. L. Miller, G. J. DoŽrr and I. J. Cox, "Dirty-Paper Trellis Codes for Watermarking", in Proceedings of the IEEE International Conference on Image Processing, vol. II, pp. 129-132, 2002 Download paper