Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Vincent Itier"'
Publikováno v:
Applied Mathematical Modelling
Applied Mathematical Modelling, 2023, 114, pp.94-113. ⟨10.1016/j.apm.2022.09.034⟩
Applied Mathematical Modelling, 2023, 114, pp.94-113. ⟨10.1016/j.apm.2022.09.034⟩
International audience; Dimensionality reduction methods construct a low dimensional or reduced space. Complex structural mechanics problems can be approximated on a low dimensional space with a Reduced-Order Model or surrogate model. For instance, P
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03ad88036b90c46f770a1c6e83eb099c
https://hal.science/hal-03830762/document
https://hal.science/hal-03830762/document
Publikováno v:
IEEE International Workshop on Information Forensics and Security (WIFS 2022)
IEEE International Workshop on Information Forensics and Security (WIFS 2022), Dec 2022, Shanghai, China. ⟨10.1109/WIFS55849.2022.9975430⟩
IEEE International Workshop on Information Forensics and Security (WIFS 2022), Dec 2022, Shanghai, China. ⟨10.1109/WIFS55849.2022.9975430⟩
International audience; Within an operational framework, covers used by a steganographer are likely to come from different sensors and different processing pipelines than the ones used by researchers for training their steganalysis models. Thus, a pe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fd55103ec8a47bb9903af0d0cb36fe1d
http://arxiv.org/abs/2211.03447
http://arxiv.org/abs/2211.03447
Publikováno v:
GRETSI 2022-Colloque Francophone de Traitement du Signal et des Images
GRETSI 2022-Colloque Francophone de Traitement du Signal et des Images, Sep 2022, Nancy, France
HAL
GRETSI 2022-Colloque Francophone de Traitement du Signal et des Images, Sep 2022, Nancy, France
HAL
International audience; This article studies a domain adaptation strategy applied to digital forensics on images. In order to perform a forensic analysis, the operator is using a labelled source base enabling to train a model. Within an operational f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::2765470a3f5c4f02b463fb11b318b979
https://hal.science/hal-03704712
https://hal.science/hal-03704712
Publikováno v:
Multimedia Security 2
Multimedia Security 2, John Wiley & Sons, Ltd, pp.91-128, 2022, Online ISBN: 9781119987390 Print ISBN: 9781789450279. ⟨10.1002/9781119987390.ch4⟩
Multimedia Security 2, John Wiley & Sons, Ltd, pp.91-128, 2022, Online ISBN: 9781119987390 Print ISBN: 9781789450279. ⟨10.1002/9781119987390.ch4⟩
International audience; This chapter explains the basics of cryptography, while a description of image encryption. It provides a survey of the state of the art in Joint Photographic Experts Group (JPEG) crypto-compression, designed as a solution to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ee56c4d4461649885b3ab927e0507f36
https://hal.science/hal-03778589
https://hal.science/hal-03778589
Publikováno v:
Multimedia Security 1
Multimedia Security 1, Chapter 7, Wiley, pp.219-246, 2022, 978-1-78945-026-2 / 9781119901808. ⟨10.1002/9781119901808.ch7⟩
Multimedia Security 1, Chapter 7, Wiley, pp.219-246, 2022, 978-1-78945-026-2 / 9781119901808. ⟨10.1002/9781119901808.ch7⟩
International audience; This chapter presents the challenges of the data hiding methods, as well as the constraints linked to the structure of three-dimensional (3D) meshes, in particular its impact on the synchronization step. It describes a recent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7b2975d2ada156f3244d115e70646d33
https://hal.science/hal-03601274
https://hal.science/hal-03601274
Publikováno v:
WIFS 2021 : IEEE International Workshop on Information Forensics and Security
WIFS 2021 : IEEE International Workshop on Information Forensics and Security, Dec 2021, Montpellier, France
HAL
IEEE International Workshop on Information Forensics and Security (WIFS 2021)
IEEE International Workshop on Information Forensics and Security (WIFS 2021), Dec 2021, Montpellier, France
WIFS 2021 : IEEE International Workshop on Information Forensics and Security, Dec 2021, Montpellier, France
HAL
IEEE International Workshop on Information Forensics and Security (WIFS 2021)
IEEE International Workshop on Information Forensics and Security (WIFS 2021), Dec 2021, Montpellier, France
International audience; Domain adaptation is a major issue for doing practical forensics. Since examined images are likely to come from a different development pipeline compared to the ones used for training our models, that may disturb them by a lot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec6b6bdb9b8459bd884da04d3077daba
https://hal.archives-ouvertes.fr/hal-03374780v1/document
https://hal.archives-ouvertes.fr/hal-03374780v1/document
Les maillages 3D sont largement utilisés dans l'industrie dans des domaines très différents tels que le jeu vidéo, le diagnostic médical, la CAO ou l’impression 3D. Dans ce contexte, les techniques d'insertion de données cachées sont intére
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58bc75da903d9be3d61930114e90a921
https://doi.org/10.51926/iste.9026.ch7
https://doi.org/10.51926/iste.9026.ch7
Publikováno v:
Multimedia Tools and Applications
Multimedia Tools and Applications, Springer Verlag, 2021, 80 (9), pp.13215-13233. ⟨10.1007/s11042-020-10326-5⟩
Multimedia Tools and Applications, 2021, 80 (9), pp.13215-13233. ⟨10.1007/s11042-020-10326-5⟩
Multimedia Tools and Applications, Springer Verlag, 2021, 80 (9), pp.13215-13233. ⟨10.1007/s11042-020-10326-5⟩
Multimedia Tools and Applications, 2021, 80 (9), pp.13215-13233. ⟨10.1007/s11042-020-10326-5⟩
Today, it has become very easy to manipulate digital images using image processing tools and software such as Adobe Photoshop ( https://www.adobe.com/products/photoshop.html ). Tampering with images by splicing is an operation that consists of cuttin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f578bea927597de7c913fddcc359b72a
https://hal-lirmm.ccsd.cnrs.fr/lirmm-03475299
https://hal-lirmm.ccsd.cnrs.fr/lirmm-03475299
Publikováno v:
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers, 2020, 30 (3), pp.646-660. ⟨10.1109/tcsvt.2019.2894520⟩
IEEE Transactions on Circuits and Systems for Video Technology, Institute of Electrical and Electronics Engineers, 2020, 30 (3), pp.646-660. ⟨10.1109/tcsvt.2019.2894520⟩
International audience; The rising popularity of social networks and cloud computing has greatly increased number of JPEG compressed image exchanges. In this context, the security of the transmission channel and/or the cloud storage can be susceptibl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ccf9c4560d1b86e06633fadceab9183
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02023980/file/08624571.pdf
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02023980/file/08624571.pdf
Publikováno v:
8th International Conference on Image Processing Theory, Tools and Applications (IPTA 2018)
8th International Conference on Image Processing Theory, Tools and Applications (IPTA 2018), Nov 2018, Xi'an, China. pp.1-6
IPTA
HAL
8th International Conference on Image Processing Theory, Tools and Applications (IPTA 2018), Nov 2018, Xi'an, China. pp.1-6
IPTA
HAL
International audience; JPEG is the most used image compression algorithm but block wise DCT compression methods produce artifacts due to coefficient quantization. JPEG decompression can be seen as a reconstruction problem constrained by quantization
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::69c2a152263ee766f24be5fa79d2059f
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02023964/document
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02023964/document