Search

Your search keyword '"William Puech"' showing total 99 results

Search Constraints

Start Over You searched for: Author "William Puech" Remove constraint Author: "William Puech" Topic 020201 artificial intelligence & image processing Remove constraint Topic: 020201 artificial intelligence & image processing
99 results on '"William Puech"'

Search Results

1. Homomorphic Encryption-Based LSB Substitution for High Capacity Data Hiding in the Encrypted Domain

2. Homomorphic Two Tier Reversible Data Hiding In Encrypted 3D Objects

3. CFB-then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images

4. Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images

5. Hierarchical classification of very small objects: Application to the detection of arthropod species

6. A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload

7. Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images

8. Recompression of JPEG crypto-compressed images without a key

9. IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications

10. Insect interaction analysis based on object detection and CNN

11. Image Analysis and Processing in the Encrypted Domain

12. Privacy Protection for Social Media Based on A Hierarchical Secret Image Sharing Scheme

13. A Format-compliant Selective Secret 3D Object Sharing Scheme Based on Shamir’s Scheme

14. Format-Compliant Selective Secret 3D Object Sharing Scheme

15. A survey of reversible data hiding in encrypted images – The first 12 years

16. Interval-valued JPEG decompression for artifact suppression

17. Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique

18. Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size

19. From Visual Confidentiality To Transparent Format-Compliant Selective Encryption Of 3D Objects

20. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images

21. Visualization framework of digital paintings based on visual saliency for cultural heritage

22. Reversible data hiding in encrypted images based on adaptive local entropy analysis

23. Special issue on Medical Image Communication, Computing and Security

24. Analysis of digitized 3D mesh curvature histograms for reverse engineering

25. Visual saliency-based confidentiality metric for selective crypto-compressed JPEG images

26. Sensitivity of different correlation measures to print-and-scan process

27. High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

28. High capacity data hiding for 3D point clouds based on Static Arithmetic Coding

29. A two-stage traitor tracing scheme for hierarchical fingerprints

30. Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings

31. A robust and secure perceptual hashing system based on a quantization step analysis

32. Phylogeny of JPEG images by ancestor estimation using missing markers on image pairs

33. High-capacity data hiding in encrypted images using MSB prediction

34. A New Semiparametric Finite Mixture Model-Based Adaptive Arithmetic Coding for Lossless Image Compression

35. Two-Level QR Code for Private Message Sharing and Document Authentication

36. Rate-Distortion Optimized Compression Algorithm for 3D Triangular Mesh Sequences

37. Denoising and error correction in noisy AES-encrypted images using statistical measures

38. Centrality bias measure for high density QR code module recognition

39. Segmentation-based compression scheme for 3D animated models

40. Lossless 3D steganography based on MST and connectivity modification

41. An improved lossless image compression based arithmetic coding using mixture of non-parametric distributions

42. Automatic generation of video from digital paintings for cultural heritage

43. Towards a Blind MAP-Based Traitor Tracing Scheme for Hierarchical Fingerprints

44. Hue class equalization to improve a hierarchical image retrieval system

45. A QR-code based audio watermarking technique for tracing traitors

46. Rich QR Code for Multimedia Management Applications

47. Analysis of an EMST-based path for 3D meshes

48. Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias

49. Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors

50. Protection of JPEG compressed e-comics by selective encryption

Catalog

Books, media, physical & digital resources