Watermarking techniques are used to help identifying copies of publicly released information. They consist in applying a slight and secret modification to the data before its release, in a way that should be robust, ie., remain recognizable even in (reasonably) modified copies of the data. In this paper, we present new results about the robustness of watermarking schemes against arbitrary attackers, and the formalization of those results in Coq. We used the ALEA library, which formalizes probability theory and models probabilistic programs using a simple monadic translation. This work illustrates the strengths and particularities of the induced style of reasoning about probabilistic programs. Our technique for proving robustness is adapted ...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Special issue on Security of Data Hiding TechnologiesThe analysis of the security of watermarking al...
International audienceAsymmetric schemes belong to second generation of watermarking. Whereas their ...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
International audienceWe introduce the concept of reliability in watermarking as the ability of asse...
We propose a methodology for planting watermarks in text from an autoregressive language model that ...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Special issue on Security of Data Hiding TechnologiesThe analysis of the security of watermarking al...
International audienceAsymmetric schemes belong to second generation of watermarking. Whereas their ...
Watermarking techniques are used to help identifying copies of publicly released information. They c...
To appearWatermarking techniques are used to help identifying copies of publicly released informatio...
This paper presents the main ideas of the proof of a watermarking algorithm in the Coq proof assista...
International audienceThis paper presents yet another attempt towards robust and secure watermarking...
International audienceThis chapter deals with applications where watermarking is a security primitiv...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are...
Watermarking generative models consists of planting a statistical signal (watermark) in a model’s ou...
Watermarking generative models consists of planting a statistical signal (watermark) in a model's ou...
International audienceWe introduce the concept of reliability in watermarking as the ability of asse...
We propose a methodology for planting watermarks in text from an autoregressive language model that ...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Special issue on Security of Data Hiding TechnologiesThe analysis of the security of watermarking al...
International audienceAsymmetric schemes belong to second generation of watermarking. Whereas their ...