Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Gaëtan Le Guelvouit"'
Publikováno v:
Annual Computer Security Applications Conference (ACSAC 2020)
Annual Computer Security Applications Conference (ACSAC 2020), Dec 2020, Austin, United States. ⟨10.1145/3427228.3427297⟩
ACSAC
Annual Computer Security Applications Conference (ACSAC 2020), Dec 2020, Austin, United States. ⟨10.1145/3427228.3427297⟩
ACSAC
International audience; Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usabi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c16f676026dfa2df25d0d7c862c83534
https://hal.science/hal-02965948
https://hal.science/hal-02965948
Publikováno v:
ACM Transactions on the Web
ACM Transactions on the Web, http://tweb.acm.org/, 2022, 16 (1), pp.1--62. ⟨10.1145/3478026⟩
ACM Transactions on the Web, 2022, 16 (1), pp.1--62. ⟨10.1145/3478026⟩
ACM Transactions on the Web, http://tweb.acm.org/, 2022, 16 (1), pp.1--62. ⟨10.1145/3478026⟩
ACM Transactions on the Web, 2022, 16 (1), pp.1--62. ⟨10.1145/3478026⟩
International audience; Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the curren
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::506b9bf0a7807616dad4b9741159e1a1
https://hal.archives-ouvertes.fr/hal-02870826/file/main.pdf
https://hal.archives-ouvertes.fr/hal-02870826/file/main.pdf
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020)
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Jul 2020, Lodz, Poland. pp.161-172, ⟨10.1007/978-3-030-50399-4_16⟩
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030503987
IMIS
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Jul 2020, Lodz, Poland. pp.161-172, ⟨10.1007/978-3-030-50399-4_16⟩
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030503987
IMIS
International audience; Browser fingerprinting consists in collecting attributes from a web browser to build a browser fingerprint. In this work, we assess the adequacy of browser fingerprints as an authentication factor, on a dataset of 4,145,408 fi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::123dee7448325b46d62762b8b34d4573
Publikováno v:
9th International Conference on Security of Information and Networks (SIN 2016)
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. ⟨10.1145/2947626.2947651⟩
SIN
9th International Conference on Security of Information and Networks (SIN 2016), Jul 2016, Newark, United States. ⟨10.1145/2947626.2947651⟩
SIN
More and more users prefer to share their photos through image-sharing platforms of social networks than using e-mail or personal webpages. It makes sharing easier, and most of the platforms allow the users to specify who can access to each image. It
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d94d3043df7dcacd14dcfcb7c12bf5b4
https://hal.inria.fr/hal-01344469
https://hal.inria.fr/hal-01344469
Publikováno v:
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016)
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
IH&MMSec
4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2016), Jun 2016, Vigo, Spain. p.185-186, ⟨10.1145/2909827.2933195⟩
IH&MMSec
In this paper, we show that, using the encryption algorithm of He et al., it is possible to ensure privacy protection for JPEG content on several widely used image-sharing platforms (e.g., Flickr, Pinterest, Google+ and Twitter).
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8b469c27b7d77d9c4361d5a64a95c08
https://hal.inria.fr/hal-01344472
https://hal.inria.fr/hal-01344472
Autor:
Gaëtan Le Guelvouit, Stéphane Pateux
Publikováno v:
Signal Processing: Image Communication. 18:283-296
In this paper, we consider the implementation of robust watermarking scheme for non-i.i.d. Gaussian signals and distortion based on perceptual metrics. We consider this problem as a communication problem and formulated it as a game between an attacke
Publikováno v:
Media Watermarking, Security, and Forensics
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a two-level approach with probabilistic traitor tracing codes. Codes are concatenated and decoded successively, the first one is used to decrease the
Publikováno v:
Media Forensics and Security
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a probabilistic traitor tracing code and an orthogonal zero-bit informed watermark. We use the well-known Tardos fingerprinting tracing function to r
Autor:
Bertrand Mathieu, Gaëtan Le Guelvouit
Publikováno v:
CCNC
Peer-to-Peer (P2P) delivery systems, such as eDonkey, Bittorrent, attracted many people who want to share files. Other P2P systems, used for broadcasting video contents, also gained in popularity (e.g., Live systems such as PPLive, PPStream, UUSee, e
Publikováno v:
2010 Fifth International Conference on Internet and Web Applications and Services.
File sharing applications using Peer-to-Peer (P2P) networks such as Bittorrent or eDonkey rapidly attracted a lot of people and proved the efficiency and interest of this P2P technology. Distribution of video and of live contents also experienced the