About
59
Publications
47,842
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,129
Citations
Introduction
Publications
Publications (59)
Ce rapport présente les trois principales techniques d’informatique confidentielle, ayant pour but de protéger les données en cours d’utilisation:
- Le chiffrement homomorphe ;
- Le calcul multipartite sécurisé ;
- Les environnements d'éxécution de confiance.
In this paper, we present a novel method to compute decision rules to build a more accurate interpretable machine learning model, denoted as ExMo. The ExMo interpretable machine learning model consists of a list of IF...THEN... statements with a decision rule in the condition. This way, ExMo naturally provides an explanation for a prediction using...
In this paper, we present a novel method to compute decision rules to build a more accurate interpretable machine learning model, denoted as ExMo. The ExMo interpretable machine learning model consists of a list of IF...THEN... statements with a decision rule in the condition. This way, ExMo naturally provides an explanation for a prediction using...
In this paper, we present a novel method to compute decision rules to build a more accurate interpretable machine learning model, denoted as ExMo. The ExMo interpretable machine learning model consists of a list of IF...THEN... statements with a decision rule in the condition. This way, ExMo naturally provides an explanation for a prediction using...
The application of machine learning to support the processing of large datasets holds promise in many industries, including financial services. However, practical issues for the full adoption of machine learning remain with the focus being on understanding and being able to explain the decisions and predictions made by complex models. In this paper...
The application of machine learning to support the processing of large datasets holds promise in many industries, including financial services. However, practical issues for the full adoption of machine learning remain with the focus being on understanding and being able to explain the decisions and predictions made by complex models. In this paper...
The foreseen growing role of outsourced machine learning services is raising concerns about the privacy of user data. Several technical solutions are being proposed to address the issue. Hardware security modules in cloud data centres appear limited to enterprise customers due to their complexity, while general multi-party computation techniques re...
The foreseen growing role of outsourced machine learning services is raising concerns about the privacy of user data. This paper proposes a variety of protocols for privacy-preserving regression and classification that (i) only require additively homomorphic encryption algorithms, (ii) limit interactions to a mere request and response, and (iii) th...
This paper proposes a new privacy-enhancing, context-aware user authentication system, ConSec, which uses a transformation of general location-sensitive data, such as GPS location, barometric altitude and noise levels, collected from the user's device, into a representation based on locality-sensitive hashing (LSH). The resulting hashes provide a d...
This paper proposes a new privacy-enhancing, context-aware user authentication system, ConSec, which uses a transformation of general location-sensitive data, such as GPS location, barometric altitude and noise levels, collected from the user's device, into a representation based on Locality-Sensitive-Hashing (LSH). This enables numerical computati...
The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control...
The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control...
The Internet of Things (IoT) is projected to significantly impact consumer finance, through greater customer personalisation, more frictionless payments, and novel pricing schemes. The lack of deployed applications, however, renders it difficult to evaluate potential security risks, which is further complicated by the presence of novel, IoT-specifi...
Reputation systems provide an effective way to build a web of trust on the Internet. They consider the history of interactions between peers to establish a measure for a reputation that can itself be used to support a trust decision. Decentralised reputations systems (DRS) rely on a decentralised computer architecture and a distributed ledger to st...
Fifteen years ago we published the book Information Hiding Techniques for Steganography and Digital Watermarking, which turned out to be one of first scientific books on the topic. Back then, the field was in its infancy; the scientific community had just started to explore how information could be embedded invisibly or inaudibly in multimedia data...
Expanded into two volumes, the Second Edition of Springers Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive...
Billions of dollars allegedly lost to piracy of multi- media have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to rerecording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden in a host signal. In this paper, w...
There is a wide consensus among feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, an...
Due to the inherent combination of image, video, audio and 3D-models in new MPEG standards like MPEG-4, robust 3D-watermarking is becoming more and more popular to ensure data authenticity and integrity. Beside the design of 3D-watermarking schemes, the evaluation is necessary. In the paper we analyze currently proposed 3D watermarking algorithms f...
MPEG-4 is an international object-based standard that provides technological basis for digital television, interactive graphics and multimedia applications. These objects can be natural or synthetic e.g. textures, 3D objects, videos or sounds. In this paper we suggest an integrity approach to protect the content of MPEG-4 data. The essential part o...
Billions of dollars allegedly lost to piracy of multimedia content have recenfiy triggered the industry to rethink the way music and films are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms rely to a certain extent on watermarking. A watermark is an im...
The 1st International Workshop on Digital Watermarking (IWDW), the conference covering all aspects of digital watermarking, was held in Seoul, Korea from November 21 to 22, 2002. These proceedings contain 21 papers that were accepted for presentation at the conference. These papers were selected from 67 submissions including 3 invited papers. They...
There is one aspect of copy control that digital rights management technologies based on encryption do not address. It is the case when the high value content leaves the “digital world”, namely when it is converted to waveforms that can be heard or seen by people. To solve this problem, there has been a growing “interest” on digital watermarking, m...
Billions of dollarsallersv) lost to piracy of multimev- hae reE# tlytrigge=v the industry to re#x#] the way music and mo ie are distribute( Ase ncryption is ulne:(vto reEfifi(v-E:]) curre tly all copyright prote[xvme hanisms te# to re# on wate=Ev-E=[) A wateE [)) is an impev)### e se)=[ hidde into a host signal. In this pap ev we analyze the se()=E...
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7–9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scientific excellence and novelty by the program committee. We tried to have a balanced...
Billions of dollars allegedly lost to piracy of multimedia content have recently triggered the industry to rethink the way how music and movies are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms rely to certain extent on watermarking, i.e. hiding of im...
Intuitively, the security of a steganographic communication between two principals lies in the inability of an eavesdropper to distinguish cover-objects from stego-objects, that is objects which contain secret messages. A system should be already considered insecure, if an eavesdropper can suspect the presence of secret communication. Several defin...
There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality...
We briefly present the architecture of a public automated
evaluation service we are developing for still images, sound and video.
We also detail new tests that will be included in this platform. The set
of tests is related to audio data and addresses the usual equalisation
and normalisation but also time stretching, pitch shifting and specially
des...
One of the main problems, which darkens the future of digital watermarking technologies, is the lack of detailed evaluation of existing marking schemes. This lack of benchmarking of current algorithms is blatant and confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their...
Les méthodes de tatouage sont de plus en plus nombreuses. Néanmoins, il est difficile de les comparer et de trouver celle adaptée à ses besoins dans la mesure où les tests présentés sont très souvent différents. En effet, tant les médias employés que les transformations qu'ils subissent changent d'une étude à l'autre.
Dans cet article, nous présent...
Numéro special
http://documents.irevues.inist.fr/handle/2042/4464?show=full
Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all nece...
In this article we have used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance. The first group represents a set of requirements that can be verified using agreed series of tests; the second is a set of levels to which each functionality is evalu...
Digital watermarking remains a very empirical area of research so an immediate question which stands out is whether we can develop a comprehensive theory of information hiding, in the sense that Shannon provided us with a proof that one-time pad is secure regardless of the computational power of the opponent. Quite apart from intellectual curiosity...
Digital watermarking has been presented as a solution for
protection against illegal copying of multimedia objects and many
algorithms have been proposed. However, this technology does have
problems. One of them is that the requirements, tools and methodologies
for assessing the current technologies are almost nonexistent. The lack
of benchmarking...
After a brief reminder on the real difficulties that digital watermarking software still has to tackle – especially some random geometric attacks such as StirMark 1 – we present an early overview of on-going solutions to make the survival of the watermark possible. 1. TACKLE THE REAL PROBLEMS The recent literature on digital watermarking has introd...
Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other wo...
Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography. This situation is, however, changing rapidly and the first academic conference on this topic was organized in 1996. The main driving force is concern over protecting copyright; as audio, video and other wo...
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems...
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been proposed, but it is still difficult to have even a rough idea of their performances and hence to compare them. So we first describe some general attacks on audio and ima...
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been proposed, but it is still di#cult to have even a rough idea of their performances and hence to compare them. So we first describe some general attacks on audio and image...
There are a number of application areas in which we want to hide information or to stop someone else from doing so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes. There follow abstracts of mater...
Since the early 90's a number of papers on "robust" digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison and slows down progress in this area. To address this issue, we present an evaluation procedure of image watermarking systems. First we identify all nece...
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and tra#c security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches---many of them developed to hide encrypted copyright marks or serial numbers i...
Much research on Internet security has concentrated on generic mechanisms such as firewalls, IP authentication and protocols for large scale key distribution. However, once we start to look at specific applications, some quite different requirements appear. We set out to build an infrastructure that would support the reliable electronic distributio...
We present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-grained group access control. The tool comprises two proxies: one running on the server side and the other one on the client side. Typically the browser sends a query to the...
We undertook a project to secure the distribution of medical information using Wax. This is a proprietary hypertext-based system used for information such as treatment protocols, drug formularies, and teaching material. An initial attempt, using digital signatures (in line with a recent European standard) and certificates conforming to X.509 has th...
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by the...