6 results on '"William Puech"'
Search Results
2. A survey of reversible data hiding in encrypted images – The first 12 years
- Author
-
Simying Ong, KokSheik Wong, Pauline Puteaux, William Puech, Image & Interaction (ICAR), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), and University of Malaya [Kuala Lumpur, Malaisie]
- Subjects
Computer science ,Cloud computing ,02 engineering and technology ,Signal processing in the encrypted domain ,Computer security ,computer.software_genre ,Encryption ,Image encryption ,Upload ,Open research ,[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Electrical and Electronic Engineering ,Authentication ,business.industry ,020206 networking & telecommunications ,Information hiding ,Signal Processing ,Data hiding ,Table (database) ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,business ,computer ,Multimedia security - Abstract
International audience; In the last few years, with the increasing popularity of cloud computing and the availability of mobile smart devices as well as ubiquitous network connections, more and more users are uploading their personal data to remote servers. However, this can lead to significant security breaches, where confidentiality, integrity and authentication are constantly threatened. To overcome these multiple problems, multimedia data must be secured, for example by means of encryption before transmission and storage. In this survey, we look into the issues involved in handling encrypted multimedia data, and more specifically we focus on reversible data hiding in encrypted images (RDHEI). The aim of this survey is to present the birth and evolution of RDHEI methods over the last 12 years. We first highlight different classes and characteristics of RDHEI, then describe representative RDHEI methods. A comparison table is presented to summarize the key features and achievements of each representative RDHEI method considered in this survey. Finally, we share the future outlook of emerging applications and open research topics relevant to RDHEI for the next 12 years and beyond.
- Published
- 2021
- Full Text
- View/download PDF
3. A robust and secure perceptual hashing system based on a quantization step analysis
- Author
-
Abdellah Ait Ouahman, William Puech, Azhar Hadmi, Brahim Ait Es Said, Image & Interaction (ICAR), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Telecommunication and Network, Université Cadi Ayyad [Marrakech] (UCA), Elsevier, and Puech, William
- Subjects
Theoretical computer science ,Computer science ,Hash function ,0211 other engineering and technologies ,Image authentication ,02 engineering and technology ,Perceptual hashing ,Locality-sensitive hashing ,Quantization ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,021110 strategic, defence & security studies ,Robust hashing ,business.industry ,Universal hashing ,Dynamic perfect hashing ,Pattern recognition ,Image hashing ,Content identification ,Hash table ,[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV] ,[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV] ,Signal Processing ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Feature hashing ,business ,Multimedia security ,Software ,Double hashing - Abstract
International audience; Perceptual hashing is conventionally used for content identification and authentication. It has applications in database content search, watermarking and image retrieval. Most countermeasures proposed in the literature generally focus on the feature extraction stage to get robust features to authenticate the image, but few studies address the perceptual hashing security achieved by a cryptographic module. When a cryptographic module is employed [1], additional information must be sent to adjust the quantization step. In the perceptual hashing field, we believe that a perceptual hashing system must be robust, secure and generate a final perceptual hash of fixed length. This kind of system should send only the final perceptual hash to the receiver via a secure channel without sending any additional information that would increase the storage space cost and decrease the security. For all of these reasons, in this paper, we propose a theoretical analysis of full perceptual hashing systems that use a quantization module followed by a crypto-compression module. The proposed theoretical analysis is based on a study of the behavior of the extracted features in response to content-preserving/content-changing manipulations that are modeled by Gaussian noise. We then introduce a proposed perceptual hashing scheme based on this theoretical analysis. Finally, several experiments are conducted to validate our approach, by applying Gaussian noise, JPEG compression and low-pass filtering.
- Published
- 2013
- Full Text
- View/download PDF
4. Lossless 3D steganography based on MST and connectivity modification
- Author
-
Jean-Pierre Pedeboy, Sébastien Druon, William Puech, Philippe Amat, Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Image & Interaction (ICAR), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), Interactive Digital Humans (IDH), and Stratégies S.A. [Rungis]
- Subjects
Lossless compression ,Theoretical computer science ,Steganography ,020207 software engineering ,02 engineering and technology ,Minimum spanning tree ,Object (computer science) ,Information protection policy ,Data hiding Steganography Watermarking 3D triangular mesh Quadruple Graph scanning ,[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV] ,Information hiding ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Electrical and Electronic Engineering ,Digital watermarking ,Software ,Mathematics - Abstract
International audience; Data hiding has become increasingly important for many applications, like confidential transmission, video surveillance, military and medical applications. In this paper we present a new approach of 3D object data hiding without changing the position of vertices in the 3D space. The main idea of the proposed method is to find and to synchronize particular areas of the 3D objects used to embed the message. The embedding is carried out by changing the connectivity of edges in the selected areas composed of quadruples. The proposed approach of data hiding in 3D objects is based on minimum spanning tree (MST). This method is lossless in the sense that the positions of the vertices are remaining the same before and after embedding. Moreover the method is blind and does not depend of the order of the data in the files. This approach is very interesting when the 3D objects have been digitalized with high precision.
- Published
- 2010
- Full Text
- View/download PDF
5. Projection distortion analysis for flattened image mosaicing from straight uniform generalized cylinders
- Author
-
Ioannis Pitas, William Puech, Jean-Marc Chassery, and Adrian G. Bors
- Subjects
Surface (mathematics) ,business.industry ,Perspective (graphical) ,Coordinate system ,Image plane ,Ellipse ,Projection (mathematics) ,Intersection ,Artificial Intelligence ,Virtual image ,Signal Processing ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,Software ,Mathematics - Abstract
This paper presents a new approach for reconstructing images mapped or painted on straight uniform generalized cylinders (SUGC). A set of monocular images is taken from di!erent viewpoints in order to be mosaiced and to represent the entire scene in detail. The expressions of the SUGC's projection axis are derived from two cross-sections projected onto the image plane. Based on these axes we derive the SUGC localization in the camera coordinate system. We explain how we can "nd a virtual image representation when the intersection of the two axes is matched to the image center. We analyze the perspective distortions when #attening a scene which is mapped on a SUGC. We evaluate the lower and the upper bounds of the necessary number of views in order to represent the entire scene from a SUGC, by considering the distortions produced by perspective projection. A region matching based mosaicing method is proposed to be applied on the #attened images in order to obtain the complete scene. The mosaiced scene is visualized on a new synthetic surface by a mapping procedure. The proposed algorithm is used for the representation of mural paintings located on SUGCs with closed cross-sections (circles for columns), or opened cross-sections (ellipses or parabolas for vaults). 2001 Pattern Recognition Society. Published by Elsevier Science Ltd. All rights reserved.
- Published
- 2001
- Full Text
- View/download PDF
6. Cylindrical surface localization in monocular vision
- Author
-
Ioannis Pitas, William Puech, and Jean-Marc Chassery
- Subjects
Surface (mathematics) ,business.industry ,Coordinate system ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Spherical coordinate system ,Image (mathematics) ,Artificial Intelligence ,Signal Processing ,A priori and a posteriori ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Cylindrical coordinate system ,business ,Rotation (mathematics) ,Monocular vision ,Software ,ComputingMethodologies_COMPUTERGRAPHICS ,Mathematics - Abstract
In this paper we present a method to localize a cylindral surface with only one perspective view. Based on a priori knowledge we find two axes in the image in order to obtain the three rotation angles between the cylindrical surface coordinate system and the camera coordinate system. Various applications of the proposed method are presented.
- Published
- 1997
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.