William Puech
William Puech
Full Professor - LIRMM - Univ. Montpellier - CNRS
Geverifieerd e-mailadres voor lirmm.fr - Homepage
Geciteerd door
Geciteerd door
A reversible data hiding method for encrypted images
W Puech, M Chaumont, O Strauss
Security, forensics, steganography, and watermarking of multimedia contents …, 2008
An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images
P Puteaux, W Puech
IEEE transactions on information forensics and security 13 (7), 1670-1681, 2018
Processing full-waveform lidar data: modelling raw signals
A Chauve, C Mallet, F Bretar, S Durrieu, M Pierrot-Deseilligny, W Puech
ISPRS Workshop Laser Scanning and SilviLaser (LS SL) 36, 102-107, 2007
Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames
Z Shahid, M Chaumont, W Puech
IEEE Transactions on Circuits and Systems for Video Technology 21 (5), 565-576, 2011
Two-level QR code for private message sharing and document authentication
I Tkachenko, W Puech, C Destruel, O Strauss, JM Gaudin, C Guichard
IEEE Transactions on Information Forensics and Security 11 (3), 571-583, 2015
Visual protection of HEVC video by selective encryption of CABAC binstrings
Z Shahid, W Puech
ieee transactions on multimedia 16 (1), 24-36, 2013
A comprehensive process of reverse engineering from 3D meshes to CAD models
R Bénière, G Subsol, G Gesquière, F Le Breton, W Puech
Computer-Aided Design 45 (11), 1382-1393, 2013
Advanced full-waveform lidar data echo detection: Assessing quality of derived terrain and tree height models in an alpine coniferous forest
A Chauve, C Vega, S Durrieu, F Bretar, T Allouis, M Pierrot Deseilligny, ...
International Journal of Remote Sensing 30 (19), 5211-5228, 2009
A new crypto-watermarking method for medical images safe transfer
W Puech, JM Rodrigues
2004 12th European Signal Processing Conference, 1481-1484, 2004
Crypto-compression of medical images by selective encryption of DCT
W Puech, JM Rodrigues
2005 13th European signal processing conference, 1-4, 2005
Digital image restoration by Wiener filter in 2D case
A Khireddine, K Benmahammed, W Puech
Advances in Engineering Software 38 (7), 513-516, 2007
Adaptive steganography by oracle (ASO)
S Kouider, M Chaumont, W Puech
2013 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2013
Robots in ecology: welcome to the machine
D Grémillet, W Puech, V Garçon, T Boulinier, Y Le Maho
Open Journal of Ecology 2 (2), 49-57, 2012
Selective encryption of human skin in JPEG images
JM Rodrigues, W Puech, AG Bors
2006 International conference on image processing, 1981-1984, 2006
A recursive reversible data hiding in encrypted images method with a very high payload
P Puteaux, W Puech
IEEE Transactions on Multimedia 23, 636-650, 2020
Ghost detection and removal in high dynamic range images
D Sidibe, W Puech, O Strauss
2009 17th European Signal Processing Conference, 2240-2244, 2009
Lossless 3D steganography based on MST and connectivity modification
P Amat, W Puech, S Druon, JP Pedeboy
Signal Processing: Image Communication 25 (6), 400-412, 2010
Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC
Z Shahid, M Chaumont, W Puech
Signal, Image and Video Processing 7, 75-93, 2013
A DCT-based data-hiding method to embed the color information in a JPEG grey level image
M Chaumont, W Puech
2006 14th European Signal Processing Conference, 1-5, 2006
SSB-4 System of Steganography using bit 4
JM Rodrigues, JR Rios, W Puech
WIAMIS: Workshop on Image Analysis for Multimedia Interactive Services, 2004
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20