To appearWatermarking techniques are used to help identifying copies of publicly released information. They consist in applying a slight and secretmodification to the data before its release, in a way that should berobust, i.e. remain recognizable even in (reasonably) modifiedcopies of the data.In this paper, we present new results about the robustness of watermarking schemes against arbitrary attackers, and the formalization of those results in\coq. We used the \alea library, which formalizes probability theoryand models probabilistic programs using a simple monadic translation.This work illustrates the strengths and particularities of the inducedstyle of reasoning about probabilistic programs. Our technique for provingrobustness is adapte...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteein...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
A watermarking scheme for programs embeds some information called a mark into a program while preser...
Software Watermarking is the process of transforming a program into a functionally equiv-alent “mark...
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
The analysis of the security of watermarking algorithms has received increasing attention since it h...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteein...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
A watermarking scheme for programs embeds some information called a mark into a program while preser...
Software Watermarking is the process of transforming a program into a functionally equiv-alent “mark...
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
The analysis of the security of watermarking algorithms has received increasing attention since it h...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
A software watermarking scheme can embed a message into a program while preserving its functionality...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteein...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...