Skip to main content

Showing 1–9 of 9 results for author: Guelvouit, G L

Searching in archive cs. Search in all archives.
.
  1. FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

    Authors: Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit

    Abstract: Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., additional collection time). In this work, we propose FPSelect, an attribute selection framework allowing verifiers to tune their browser fingerprinting prob… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  2. A Large-scale Empirical Analysis of Browser Fingerprints Properties for Web Authentication

    Authors: Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit, Alexandre Garel

    Abstract: Modern browsers give access to several attributes that can be collected to form a browser fingerprint. Although browser fingerprints have primarily been studied as a web tracking tool, they can contribute to improve the current state of web security by augmenting web authentication mechanisms. In this paper, we investigate the adequacy of browser fingerprints for web authentication. We make the li… ▽ More

    Submitted 3 October, 2021; v1 submitted 16 June, 2020; originally announced June 2020.

    Journal ref: ACM Transactions on the Web, Volume 16, Issue 1, February 2022, Article 4, pp 1 62

  3. "Guess Who ?" Large-Scale Data-Centric Study of the Adequacy of Browser Fingerprints for Web Authentication

    Authors: Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit

    Abstract: Browser fingerprinting consists in collecting attributes from a web browser to build a browser fingerprint. In this work, we assess the adequacy of browser fingerprints as an authentication factor, on a dataset of 4,145,408 fingerprints composed of 216 attributes. It was collected throughout 6 months from a population of general browsers. We identify, formalize, and assess the properties for brows… ▽ More

    Submitted 22 June, 2021; v1 submitted 19 May, 2020; originally announced May 2020.

  4. arXiv:1305.7038  [pdf, ps, other

    cs.CR cs.IT

    Enhanced blind decoding of Tardos codes with new map-based functions

    Authors: Mathieu Desoubeaux, Cédric Herzet, William Puech, Gaëtan Le Guelvouit

    Abstract: This paper presents a new decoder for probabilistic binary traitor tracing codes under the marking assumption. It is based on a binary hypothesis testing rule which integrates a collusion channel relaxation so as to obtain numerical and simple accusation functions. This decoder is blind as no estimation of the collusion channel prior to the accusation is required. Experimentations show that using… ▽ More

    Submitted 30 May, 2013; originally announced May 2013.

  5. arXiv:0811.4702  [pdf, ps, other

    cs.IT cs.MM

    Information-theoretic resolution of perceptual WSS watermarking of non i.i.d. Gaussian signals

    Authors: Stéphane Pateux, Gaëtan Le Guelvouit, Christine Guillemot

    Abstract: The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel. We revisit the problem in light of a more general characterization of the watermark channel and of weighted distortion measures. Considering spread spectrum based information hiding, we release the usual assumption of an i.i.d. cover signal. The game-theoretic r… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 4 pages, 3 figures

    Journal ref: Proc. European Signal Processing Conf., Toulouse, France, Sep. 2002

  6. arXiv:0811.4700  [pdf, other

    cs.MM cs.IT

    Trellis-coded quantization for public-key steganography

    Authors: Gaëtan Le Guelvouit

    Abstract: This paper deals with public-key steganography in the presence of a passive warden. The aim is to hide secret messages within cover-documents without making the warden suspicious, and without any preliminar secret key sharing. Whereas a practical attempt has been already done to provide a solution to this problem, it suffers of poor flexibility (since embedding and decoding steps highly depend o… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 4 pages, 5 figures

  7. Informed stego-systems in active warden context: statistical undetectability and capacity

    Authors: Sofiane Braci, Claude Delpha, Rémy Boyer, Gaëtan Le Guelvouit

    Abstract: Several authors have studied stego-systems based on Costa scheme, but just a few ones gave both theoretical and experimental justifications of these schemes performance in an active warden context. We provide in this paper a steganographic and comparative study of three informed stego-systems in active warden context: scalar Costa scheme, trellis-coded quantization and spread transform scalar Co… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 6 pages, 8 figures

    Journal ref: Proc. IEEE Conf. on Multimedia Signal Processing, Cairns, Australia, Oct. 2008

  8. The Good, the Bad, and the Ugly: three different approaches to break their watermarking system

    Authors: Gaëtan Le Guelvouit, Teddy Furon, François Cayre

    Abstract: The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandit who's always only looking out for himself. Against the backdrop of the BOWS contest, they search for a watermark in gold buried in three images. Each knows only a portion of the gold's exact location, so for the momen… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 8 pages, 8 figures

    Journal ref: Proc. IS&T/SPIE Electronic Imaging, vol. 6505, San Jose, CA, Jan. 2007

  9. arXiv:0811.4483  [pdf, ps, other

    cs.MM cs.IT

    Wide spread spectrum watermarking with side information and interference cancellation

    Authors: Gaëtan Le Guelvouit, Stéphane Pateux

    Abstract: Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum of a set of carrier vectors, which are modulated by the bits to be embedded. To extract these embedded bits, weighted correlations between the watermarked document and the carriers are computed. Unfortunately, even wit… ▽ More

    Submitted 28 November, 2008; originally announced November 2008.

    Comments: 12 pages, 8 figures

    Journal ref: Proc. IS&T/SPIE Electronic Imaging, vol. 5020, Santa Clara, CA, Jan. 2003