Since the 1st, September 2013, I have been working as an Associate Professor at ENSICAEN. I am part of the E-payment & Biometrics team in the GREYC laboratory.

Interests:

  • Coding theory
  • Steganography
  • Privacy
Articles

Publications

Preprints

  • M. Barbier, H. Cheballah, and J.M. Le Bars. Properties and constructions of coincident functions. Preprint, July, 2015.
    arxiv bibtex
  • M. Barbier, and C. Munuera. Improving success probability and embedding efficiency in code based steganography. Preprint, February, 2013.
    arxiv bibtex PDF PS

Journals

  • G. Quintin, M. Barbier, and C. Chabot. On Generalized Reed-Solomon Codes Over Commutative and Noncommutative Rings. IEEE Transactions on Information Theory. Vol. 59, number 9, pp. 5882 - 5897, September, 2013.
    IEEE HAL bibtex
  • M. Barbier, C. Chabot, and G. Quintin. On Quasi-Cyclic Codes as a Generalization of Cyclic Codes. Finite Fields and Their Applications. Vol. 18, issue 5, pp. 904 - 919, September, 2012.
    elsevier arxiv bibtex PDF PS
  • C. Munuera, and M. Barbier. Wet paper codes and the dual distance in steganography. Advances in Mathematics of Communications. Vol. 6, number 3, pp. 237 - 285, August, 2012.
    AIMS arxiv bibtex

International conferences

  • L. Ghammam, M. Barbier, and C. Rosenberger. Enhancing the Security of Transformation Based Biometric Template Protection Schemes. Accepted for CYBERWORLDS, October, 2018.
    HAL bibtex
  • K. Atighehchi, and M. Barbier. Signature Renewal for Low Entropy Data. IEEE TrustCom 18, July, 2018.
    IEEE bibtex
  • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Retrieving Dates in Smart Card Dumps is as Hard as Finding a Needle in a Haystack. IEEE WIFS, December, 2017.
    IEEE HAL bibtex
  • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Memory carving can finally unveil your embedded personal data. ARES, pp. 9, August, 2017.
    ACM bibtex
  • T. Gougeon, M. Barbier, P. Larcharme, G. Avoine, and C. Rosenberger. Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. Applied Cryptography and Network Security, ACNS 16, pp. 592 - 608, June, 2016.
    springer HAL bibtex
  • M. Barbier, J.M. Le Bars, and C. Rosenberger. Image Watermarking With Biometric Data For Copyright Protection . ARES - MFSec, pp. 618 - 625, August, 2015.
    IEEE HAL bibtex PDF PS
  • M. Barbier. Re-encoding reformulation and application to Welch-Berlekamp algorithm. IEEE, ISIT'14, pp. 1782 - 1786, July, 2014.
    IEEE arxiv bibtex PDF PS
  • M. Barbier, C. Pernet, and G. Quintin. On the decoding of quasi-BCH codes. International Workshop on Coding and Cryptography, WCC 2013, April, 2013.
    arxiv bibtex PDF PS
  • D. Augot, M. Barbier, and C. Fontaine. Ensuring message embedding in wet paper steganography. Institute of Mathematics and its Applications International Conference - IMACC11, LNCS Vol. 7089, pp. 244 - 258, December, 2011.
    springer arxiv bibtex
  • D. Augot, M. Barbier, and A. Couvreur. List-decoding of binary Goppa codes up to the binary Johnson bound. IEEE, ITW'11, pp. 229 - 233, October, 2011.
    IEEE arxiv bibtex PDF PS
  • M. Barbier, and P. Barreto. Key Reduction of McEliece's Cryptosystem Using List Decoding. IEEE, ISIT'11, pp. 2681 - 2685, August, 2011.
    IEEE arxiv bibtex
  • M. Barbier. New Set of Codes for the Maximum-Likelihood Decoding Problem. YACC'10, October, 2010.
    arxiv bibtex PDF PS

National conferences

  • M. Barbier, and C. Rosenberger. Tatouage d'images avec des données biométriques révocables pour la preuve de propriété. SAR-SSI 14, May, 2014.
    bibtex
  • M. Barbier, and P-L Cayrel. Attaques algébriques. MajecSTIC'08, November, 2008.
    bibtex PDF PS

Miscellaneous

  • M. Barbier. Décodage en liste et application à la sécurité de l'information. PhD Thesis at École Polytechnique, December, 2011.
    HAL HAL bibtex PDF
  • D. Augot, M. Barbier, and A. Couvreur. List-decoding of binary Goppa codes up to the binary Johnson bound. Technical report, December, 2010.
    arxiv bibtex PDF PS
Software

stegocurve

Description

The primary goal of stegocurve is to provide a simple tool for plotting curve from code based steganography. This is a standalone ANSI-C tool. It can be used for Unix and Windows computers. Any feedback is appreciated. stegocurve is under the GPLv3 licence.

All remarks or suggestions are useful, let me know by e-mail.

Download

You can download all the releases:

Documentation

You can find the full documentation generated by Doxygen in the archive, or for the lastest release in online documentation.

Students
Teaching
Miscellaneaous
  • PhD defence participation:
    • 17-11-04: reviewer of the Birahime Diouf's thesis (Dakar - Senegal);
    • 17-10-04: co-advisor of the Thomas Gougeon's thesis (Caen - France);
    • 15-05-08: reviewer of the Idy Diop's thesis (Dakar - Senegal);
    • 12-05-11: reviewer for the european mention of the Lorena Ronquillo's thesis (Barcelona - Spain);
  • Jointly in charge of the Cryptology seminary of University of Caen.
  • Organization committee:
  • Programme committee:
    • CYBER 2017 and 2018;
    • IH&MMSEC 2013, 2014 and 2015;
    • APVP 2014;
    • JC2S 2011, 2012 and 2013.
  • GREYC scientific leader for the Projet Investissement d'Avenir (PIA - french project) ID-Blockchain, from 2016 to 2018. This is an identity management project on a blockchain; respectful of user's privacy and trust of web.
Contact
morgan.barbier{AT}ensicaen.fr
ENSICAEN - GREYC
6, Boulevard Maréchal Juin
14 000 Caen CEDEX
France
+33 (0)2 31 45 81 79
FB - room 330