Skip to main content
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a probabilistic traitor tracing code and an orthogonal zero-bit informed watermark. We use the well-known Tardos fingerprinting tracing... more
    • by 
    •   2  
      Digital WatermarkingTraitor tracing
A popular and effective method to protect professional content against illegal distribution is to use watermarking, which inserts a robust and imperceptible fingerprint in the data using complex information hiding techniques. Video DNA... more
    • by 
    •   2  
      Quality of ExperienceVideo Watermarking
This paper presents a new decoder for probabilistic binary traitor tracing codes under the marking assumption. It is based on a binary hypothesis testing rule which integrates a collusion channel relaxation so as to obtain numerical and... more
    • by 
    •   3  
      Traitor tracingActive FingerprintingTardos codes
    • by 
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a two-level approach with probabilistic traitor tracing codes. Codes are concatenated and decoded successively, the first one is used to... more
    • by 
    •   3  
      Traitor tracingActive FingerprintingTardos codes
    • by 
    •   9  
      MathematicsComputer ScienceAlgorithmProbabilistic Logic
This paper presents a traitor tracing method dedicated to video content distribution. It is based on a probabilistic traitor tracing code and an orthogonal zero-bit informed watermark. We use the well-known Tardos fingerprinting tracing... more
    • by 
    •   8  
      EngineeringComputer ScienceDigital WatermarkingProbabilistic Logic
In this paper, we propose a novel inpainting algorithm combining the advantages of PDE-based schemes and examplar-based approaches. The proposed algorithm relies on the use of structure tensors to define the filling order priority and... more
    • by  and +2
    •   3  
      Image ProcessingTemplate matchingEigenvalues and Eigenfunctions
The principles which have been prevailing so far for designing communication systems rely on Shannon's source and channel coding separation theorem [1]. This theorem states that source and channel optimum performance bounds can be... more
    • by  and +1
    •   11  
      Biomedical EngineeringChannel CodingCommunication SystemIterative Decoding
    • by 
    •   9  
      Image ProcessingSpeech AcousticsHardwareDiscrete Cosine Transform
This paper addresses the issue of robust transmission of Variable Length Codes (VLCs) encoded sources over error-prone channels. A new class of codes, called self-multiplexed codes, is introduced. Their performance in terms of compression... more
    • by 
    • by 
= h4[n]; IMPULSE RESPONSE h4[n] (WITH A SCALING FAnOR/4096) n 0 1 2 3 4 5 6 7
    • by 
We consider the problem of sending two correlated random sources over a Gaussian multiple-access channel. The sources are assumed to be temporally memoryless. The performance criterion is the MSE and we seek linear transceivers that... more
    • by 
We consider distributed linear transceivers for sending a secondorder wide-sense stationary process observed by two noisy sensors over a Gaussian multiple-access channel (MAC). We derive the minimum mean-square error (MSE) distributed... more
    • by 
    •   8  
      Channel CodingSensor NetworkSpectrumSecond Order
A multiple description scalar quantization (MDSQ) based coding system can be regarded as a source coder (quantizer) followed by a channel coder, i.e. the combination of index and codeword assignment. The redundancy, or the correlation... more
    • by  and +1
    •   6  
      Image ProcessingRate ControlIndexationMultiple Description Coding
The development of 'Beyond 3G'-B3G-or '4G' networks and applications, with all-IP based ubiquitous and seamless service provisioning across heterogeneous infrastructures, presents a number of challenges beyond existing capabilities... more
    • by 
    •   20  
      Distributed ComputingChannel CodingNetwork ManagementMobile IP
Overcomplete frame expansions have been introduced recently as signal representations resilient to erasures on packet networks such as the Internet and wireless networks. This paper is dedicated to a broad analysis of a class of frames... more
    • by 
    •   5  
      Mechanical EngineeringDigital Signal ProcessingWireless NetworkMean square error
This paper addresses the issue of robust and progressive transmission of signals (e.g., images, video) encoded with variable length codes (VLCs) over error-prone channels. This paper first describes bitstream construction methods offering... more
    • by 
    •   2  
      Electrical And Electronic EngineeringError Resilience
This paper introduces source-channel adaptive rate control (SARC), a new congestion control algorithm for layered video transmission in large multicast groups. In order to solve the well-known feedback implosion problem in large multicast... more
    • by 
    • Electrical And Electronic Engineering