Watermarking techniques are used to help identifying copies of publicly released information. They consist in applying a slight and secret modification to the data before its release, in a way that should be robust, ie., remain recognizable even in (reasonably) modified copies of the data. In this paper, we present new results about the robustness of watermarking schemes against arbitrary attackers, and the formalization of those results in Coq. We used the ALEA library, which formalizes probability theory and models probabilistic programs using a simple monadic translation. This work illustrates the strengths and particularities of the induced style of reasoning about probabilistic programs. Our technique for proving robustness is adapted ...
Software Watermarking is the process of transforming a program into a functionally equiv-alent “mark...
This paper presents an application of statis-tical machine learning to the field of water-marking. W...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
The analysis of the security of watermarking algorithms has received increasing attention since it h...
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteein...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
76 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This conclusion calls for a de...
A watermarking scheme for programs embeds some information called a mark into a program while preser...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
Software Watermarking is the process of transforming a program into a functionally equiv-alent “mark...
This paper presents an application of statis-tical machine learning to the field of water-marking. W...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
The analysis of the security of watermarking algorithms has received increasing attention since it h...
Abstract A watermarking scheme for a public‐key cryptographic functionality enables the embedding of...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteein...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
76 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This conclusion calls for a de...
A watermarking scheme for programs embeds some information called a mark into a program while preser...
As we dive into the digital era, there is growing concern about the amount of personal digital infor...
Software Watermarking is the process of transforming a program into a functionally equiv-alent “mark...
This paper presents an application of statis-tical machine learning to the field of water-marking. W...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...