default search action
William Puech
Person information
- affiliation: LIRMM Montpellier, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Nicolas M. Dibot, Julien P. Renoult, William Puech:
Generation and Editing of Mandrill Faces: Application to Sex Editing and Assessment. CoRR abs/2409.12705 (2024) - 2023
- [j55]Salma Ben Mamia, Pauline Puteaux, William Puech, Kais Bouallegue:
From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption. IEEE Access 11: 49350-49366 (2023) - [j54]Karama Abdelhedi, Faten Chaabane, William Puech, Chokri Ben Amar:
A Novel Robust Spread Spectrum Watermarking Scheme for 3D Video Traitor Tracing. IEEE Access 11: 93487-93499 (2023) - [j53]Nicolas M. Dibot, Sonia Tieo, Tamra C. Mendelson, William Puech, Julien P. Renoult:
Sparsity in an artificial neural network predicts beauty: Towards a model of processing-based aesthetics. PLoS Comput. Biol. 19(12) (2023) - [j52]Pauline Puteaux, Felix Yriarte, William Puech:
A Secret JPEG Image Sharing Method Over GF(2M) Galois Fields. IEEE Trans. Circuits Syst. Video Technol. 33(6): 3030-3042 (2023) - [j51]Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy:
A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption. IEEE Trans. Multim. 25: 7196-7207 (2023) - [j50]Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy:
3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain. ACM Trans. Multim. Comput. Commun. Appl. 19(5s): 175:1-175:20 (2023) - [c160]Bianca Jansen Van Rensburg, Adrian G. Bors, William Puech, Jean-Pierre Pedeboy:
Simultaneous Watermarking and Draco 3D Object Compression Method. ICIP 2023: 725-729 - [c159]Cyril Bergeron, Catherine Lamy-Bergot, Wassim Hamidouche, William Puech:
Selective Secret Sharing Scheme for Privacy of Image and Video Compressed in MPEG-Like Formats. MMSP 2023: 1-6 - [c158]Erwan Reinders, Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech:
MSB-Based Reversible Data-Hiding in Encrypted 3D Object Using a Hamiltonian Path. MMSP 2023: 1-6 - 2022
- [j49]Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy:
The First Draco 3D Object Crypto-Compression Scheme. IEEE Access 10: 10566-10574 (2022) - [j48]Salma Ben Mamia, William Puech, Kais Bouallegue:
Generation of chaotic attractors using neurons with multidentrites. Int. J. Model. Identif. Control. 40(1): 92-104 (2022) - [j47]Sébastien Beugnon, Bianca Jansen Van Rensburg, Naima Amalou, William Puech, Jean-Pierre Pedeboy:
A 3D Visual Security (3DVS) score to measure the visual security level of selectively encrypted 3D objects. Signal Process. Image Commun. 108: 116832 (2022) - [c157]Maxime Chapuis, Mathieu Lafourcade, William Puech, Gérard Guillerm, Noura Faraj:
Pose estimation of teeth in pathological dental models. 3D Imaging and Applications 2022: 1-6 - [c156]Salma Ben Mamia, William Puech, Kais Bouallegue:
Impact of neuron network on the generation of chaotic attractors. CoDIT 2022: 332-336 - [c155]Maxime Chapuis, Mathieu Lafourcade, William Puech, Gérard Guillerm, Noura Faraj:
Animating and Adjusting 3D Orthodontic Treatment Objectives. VISIGRAPP (1: GRAPP) 2022: 60-67 - [c154]Felix Yriarte, Pauline Puteaux, William Puech:
A Joint Secret Image Sharing and Jpeg Compression Scheme. ICIP 2022: 581-585 - [c153]Laura Bertojo, William Puech:
Correction of Secret Images Reconstructed from Noised Shared Images. IPTA 2022: 1-6 - [c152]Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy:
Draco-Based Selective Crypto-Compression Method of 3D objects. IPTA 2022: 1-6 - [c151]Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy:
A Hierarchical Decryption Method for an Eco-Friendly Securing of 3D Objects. MMSP 2022: 1-6 - [e9]Tyler Bell, William Puech, Robert Sitnik:
3D Imaging and Applications 2022, online, January 15-26, 2022. Society for Imaging Science and Technology 2022 [contents] - 2021
- [j46]Paul Tresson, Dominique Carval, Philippe Tixier, William Puech:
Hierarchical Classification of Very Small Objects: Application to the Detection of Arthropod Species. IEEE Access 9: 63925-63932 (2021) - [j45]Pauline Puteaux, SimYing Ong, KokSheik Wong, William Puech:
A survey of reversible data hiding in encrypted images - The first 12 years. J. Vis. Commun. Image Represent. 77: 103085 (2021) - [j44]Vincent Itier, Olivier Strauss, Laurent Morel, William Puech:
Color noise correlation-based splicing detection for image forensics. Multim. Tools Appl. 80(9): 13215-13233 (2021) - [j43]Pauline Puteaux, William Puech:
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 31(9): 3338-3351 (2021) - [j42]Pauline Puteaux, William Puech:
Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans. Inf. Forensics Secur. 16: 2445-2446 (2021) - [j41]Pauline Puteaux, William Puech:
A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload. IEEE Trans. Multim. 23: 636-650 (2021) - [c150]Karama Abdelhedi, Faten Chaabane, William Puech, Chokri Ben Amar:
Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video. CAIP (1) 2021: 58-68 - [c149]Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy:
Homomorphic Two Tier Reversible Data Hiding In Encrypted 3D Objects. ICIP 2021: 3068-3072 - [c148]Arnaud Soulier, Pauline Puteaux, Frédéric Comby, William Puech:
Lossless Satellite Data Compression for Real-Time Navigation of Autonomous Vehicles. MMSP 2021: 1-6 - [e8]Tyler Bell, William Puech, Robert Sitnik:
3D Imaging and Applications 2021, online, January 11-28, 2021. Society for Imaging Science and Technology 2021 [contents] - 2020
- [j40]Pauline Puteaux, Manon Vialle, William Puech:
Homomorphic Encryption-Based LSB Substitution for High Capacity Data Hiding in the Encrypted Domain. IEEE Access 8: 108655-108663 (2020) - [j39]Vincent Itier, Pauline Puteaux, William Puech:
Recompression of JPEG Crypto-Compressed Images Without a Key. IEEE Trans. Circuits Syst. Video Technol. 30(3): 646-660 (2020) - [c147]Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech:
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. EUSIPCO 2020: 725-729 - [c146]Pauline Puteaux, William Puech:
Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images. IPTA 2020: 1-6 - [e7]William Puech, Robert Sitnik:
3D Measurement and Data Processing 2020, Burlingame, CA, USA, January 26-30, 2020. Society for Imaging Science and Technology 2020 [contents]
2010 – 2019
- 2019
- [j38]Sébastien Beugnon, William Puech, Jean-Pierre Pedeboy:
Format-Compliant Selective Secret 3-D Object Sharing Scheme. IEEE Trans. Multim. 21(9): 2171-2183 (2019) - [c145]Silvère Gauthier, William Puech, Roseline Bénière, Gérard Subsol:
CAD-driven Pattern Recognition in Reverse Engineered Models. VISIGRAPP (1: GRAPP) 2019: 244-254 - [c144]Sébastien Beugnon, William Puech, Jean-Pierre Pedeboy:
A Format-compliant Selective Secret 3D Object Sharing Scheme Based on Shamir's Scheme. ICASSP 2019: 2657-2661 - [c143]Sébastien Beugnon, Pauline Puteaux, William Puech:
Privacy Protection for Social Media Based on A Hierarchical Secret Image Sharing Scheme. ICIP 2019: 679-683 - [c142]Pauline Puteaux, William Puech:
Image Analysis and Processing in the Encrypted Domain. ICIP 2019: 3020-3022 - [c141]Paul Tresson, Philippe Tixier, William Puech, Dominique Carval:
Insect interaction analysis based on object detection and CNN. MMSP 2019: 1-6 - [e6]William Puech, Robert Sitnik:
3D Measurement and Data Processing 2019, Burlingame, CA, USA, January 13-17, 2019. Society for Imaging Science and Technology 2019 [contents] - 2018
- [j37]Amit Kumar Singh, Zhihan Lv, Seungmin Rho, Sanjay Kumar Singh, Xiaojun Chang, William Puech:
IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications. IEEE Access 6: 79005-79009 (2018) - [j36]Pauline Puteaux, William Puech:
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images. IEEE Trans. Inf. Forensics Secur. 13(7): 1670-1681 (2018) - [c140]Pauline Puteaux, William Puech:
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size. EUSIPCO 2018: 161-165 - [c139]Silvère Gauthier, William Puech, Roseline Bénière, Gérard Subsol:
Orientation Beautification of Reverse Engineered Models. VISIGRAPP (1: GRAPP) 2018: 91-100 - [c138]Iuliia Tkachenko, Florentin Kucharczak, Christophe Destruel, Olivier Strauss, William Puech:
Copy Sensitive Graphical Code Quality Improvement Using a Super-Resolution Technique. ICIP 2018: 3808-3812 - [c137]Sebastien Beugnon, William Puech, Jean-Pierre Pedeboy:
From Visual Confidentiality To Transparent Format-Compliant Selective Encryption Of 3D Objects. ICME Workshops 2018: 1-6 - [c136]Vincent Itier, Florentin Kucharczak, Olivier Strauss, William Puech:
Interval-valued JPEG decompression for artifact suppression. IPTA 2018: 1-6 - [c135]Christophe Destruel, Vincent Itier, Olivier Strauss, William Puech:
Color Noise-Based Feature for Splicing Detection and Localization. MMSP 2018: 1-6 - [c134]Pauline Puteaux, William Puech:
EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images. WIFS 2018: 1-7 - [e5]William Puech, Robert Sitnik:
3D Image Processing, Measurement (3DIPM), and Applications 2018, Burlingame, CA, USA, January 28 - February 1, 2018. Society for Imaging Science and Technology 2018 [contents] - 2017
- [j35]Silvère Gauthier, William Puech, Roseline Bénière, Gérard Subsol:
Analysis of digitized 3D mesh curvature histograms for reverse engineering. Comput. Ind. 92-93: 67-83 (2017) - [j34]Pol Kennel, William Puech, Frédéric Comby:
Visualization framework of digital paintings based on visual saliency for cultural heritage. Multim. Tools Appl. 76(1): 561-575 (2017) - [j33]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
A two-stage traitor tracing scheme for hierarchical fingerprints. Multim. Tools Appl. 76(12): 14405-14435 (2017) - [j32]Vincent Itier, William Puech:
High capacity data hiding for 3D point clouds based on Static Arithmetic Coding. Multim. Tools Appl. 76(24): 26421-26445 (2017) - [j31]Jean-Marie Moureaux, Andreas Uhl, Khalifa Djemal, William Puech:
Special issue on Medical Image Communication, Computing and Security. Signal Process. Image Commun. 59: 1-2 (2017) - [c133]Silvère Gauthier, William Puech, Roseline Bénière, Gérard Subsol:
Digitized 3D mesh segmentation based on curvature analysis. 3D Image Processing, Measurement (3DIPM), and Applications 2017: 33-38 - [c132]Souha Jallouli, Sonia Zouari, Atef Masmoudi, William Puech, Nouri Masmoudi:
A preprocessing technique for improving the compression performance of JPEG 2000 for images with sparse or locally sparse histograms. EUSIPCO 2017: 1912-1916 - [c131]Zhenyu Li, Sebastien Beugnon, William Puech, Adrian G. Bors:
Rethinking the high capacity 3D steganography: Increasing its resistance to steganalysis. ICIP 2017: 510-414 - [c130]Noe Le Philippe, Vincent Itier, William Puech:
Visual saliency-based confidentiality metric for selective crypto-compressed JPEG images. ICIP 2017: 4347-4351 - [c129]Pauline Puteaux, William Puech:
Reversible data hiding in encrypted images based on adaptive local entropy analysis. IPTA 2017: 1-6 - [c128]Pauline Puteaux, William Puech:
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction. Media Watermarking, Security, and Forensics 2017: 10-15 - [c127]Vincent Itier, William Puech:
How to recompress a JPEG crypto-compressed image? Media Watermarking, Security, and Forensics 2017: 36-43 - [c126]Iuliia Tkachenko, Christophe Destruel, Olivier Strauss, William Puech:
Sensitivity of different correlation measures to print-and-scan process. Media Watermarking, Security, and Forensics 2017: 121-127 - [c125]Sebastien Beugnon, William Puech, Jean-Pierre Pedeboy:
An efficient lossless (2, n) secret image sharing based on Blakley's scheme. MMSP 2017: 1-6 - [p1]Pol Kennel, Frédéric Comby, William Puech:
Visual Saliency for the Visualization of Digital Paintings. Visual Content Indexing and Retrieval with Psycho-Visual Models 2017: 211-232 - [e4]William Puech, Robert Sitnik:
3D Image Processing, Measurement (3DIPM), and Applications 2017, Burlingame, CA, USA, January 29 - February 2, 2017. Society for Imaging Science and Technology 2017 [contents] - 2016
- [j30]Atef Masmoudi, Afif Masmoudi, William Puech:
A New Semiparametric Finite Mixture Model-Based Adaptive Arithmetic Coding for Lossless Image Compression. Circuits Syst. Signal Process. 35(4): 1163-1186 (2016) - [j29]Meha Hachani, Azza Ouled Zaid, William Puech:
Segmentation-based compression scheme for 3D animated models. Signal Image Video Process. 10(6): 1065-1072 (2016) - [j28]Naveed Islam, Zafar Shahid, William Puech:
Denoising and error correction in noisy AES-encrypted images using statistical measures. Signal Process. Image Commun. 41: 15-27 (2016) - [j27]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Centrality bias measure for high density QR code module recognition. Signal Process. Image Commun. 41: 46-60 (2016) - [j26]Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, Christian Guichard:
Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 571-583 (2016) - [c124]Vincent Itier, Adrian G. Bors, William Puech, Jean-Pierre Pedeboy:
Secure High Capacity Data Hiding for 3d Meshes. 3D Image Processing, Measurement (3DIPM), and Applications 2016: 1-7 - [c123]Meha Hachani, Azza Ouled Zaid, William Puech:
Rate-Distortion Optimized Compression Algorithm for 3D Triangular Mesh Sequences. DCC 2016: 600 - [c122]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel, Jean-Marc Gaudin:
Printed document authentication using two level or code. ICASSP 2016: 2149-2153 - [c121]Noe Le Philippe, William Puech, Christophe Fiorio:
Phylogeny of JPEG images by ancestor estimation using missing markers on image pairs. IPTA 2016: 1-6 - [c120]Pauline Puteaux, Dave Trinel, William Puech:
High-capacity data hiding in encrypted images using MSB prediction. IPTA 2016: 1-6 - [c119]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel:
Experimental study of Print-and-Scan impact as random process. Media Watermarking, Security, and Forensics 2016: 1-11 - [c118]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
An EM-based estimation for a two-level traitor tracing scheme. SMC 2016: 3594-3599 - [e3]William Puech, Robert Sitnik:
3D Image Processing, Measurement (3DIPM), and Applications 2016, San Francisco, California, USA, February 14-18, 2016. Society for Imaging Science and Technology 2016 [contents] - 2015
- [j25]Vincent Itier, Nicolas Tournier, William Puech, Gérard Subsol, Jean-Pierre Pedeboy:
Analysis of an EMST-based path for 3D meshes. Comput. Aided Des. 64: 22-32 (2015) - [j24]Meha Hachani, Azza Ouled Zaid, William Puech:
Global three-dimensional-mesh indexing based on structural analysis and geometrical signatures. IET Comput. Vis. 9(6): 926-936 (2015) - [j23]Azza Ouled Zaid, Meha Hachani, William Puech:
Wavelet-based high-capacity watermarking of 3-D irregular meshes. Multim. Tools Appl. 74(15): 5897-5915 (2015) - [j22]Atef Masmoudi, William Puech, Afif Masmoudi:
An improved lossless image compression based arithmetic coding using mixture of non-parametric distributions. Multim. Tools Appl. 74(23): 10605-10619 (2015) - [c117]Vincent Itier, William Puech, Gilles Gesquière, Jean-Pierre Pedeboy:
Joint synchronization and high capacity data hiding for 3D meshes. Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2015: 939305 - [c116]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
A QR-code based audio watermarking technique for tracing traitors. EUSIPCO 2015: 51-55 - [c115]Anas Kharboutly, William Puech, Gérard Subsol, Denis Hoa:
Improving sensor noise analysis for CT-Scanner identification. EUSIPCO 2015: 2411-2415 - [c114]Iuliia Tkachenko, William Puech, Olivier Strauss, Christophe Destruel, Jean-Marc Gaudin, Christian Guichard:
Rich QR Code for Multimedia Management Applications. ICIAP (2) 2015: 383-393 - [c113]Vincent Itier, William Puech, Jean-Pierre Pedeboy:
Highcapacity data-hiding for 3D meshes based on static arithmetic coding. ICIP 2015: 4575-4579 - [c112]Faten Chaabane, Maha Charfeddine, William Puech, Chokri Ben Amar:
Towards a Blind MAP-Based Traitor Tracing Scheme for Hierarchical Fingerprints. ICONIP (4) 2015: 505-512 - [c111]Pol Kennel, Frédéric Comby, William Puech:
Automatic generation of video from digital paintings for cultural heritage. IPTA 2015: 218-223 - [c110]Anas Kharboutly, William Puech, Gérard Subsol, Denis Hoa:
Advanced sensor noise analysis for CT-scanner identification from its 3D images. IPTA 2015: 325-330 - [c109]Tristan D'Anzi, William Puech, Christophe Fiorio, Jérémie François:
Hue class equalization to improve a hierarchical image retrieval system. IPTA 2015: 561-566 - [e2]Robert Sitnik, William Puech:
Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2015, San Francisco, California, USA, February 10-12, 2015. SPIE Proceedings 9393, SPIE 2015, ISBN 978-1-6284-1483-7 [contents] - 2014
- [j21]Loic Dubois, William Puech, Jacques Blanc-Talon:
Smart selective encryption of H.264/AVC videos using confidentiality metrics. Ann. des Télécommunications 69(11-12): 569-583 (2014) - [j20]Atef Masmoudi, William Puech:
Lossless chaos-based crypto-compression scheme for image protection. IET Image Process. 8(12): 671-686 (2014) - [j19]Zafar Shahid, William Puech:
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings. IEEE Trans. Multim. 16(1): 24-36 (2014) - [c108]Meha Hachani, Azza Ouled Zaid, William Puech:
3D mesh indexing based on structural analysis. Three-Dimensional Image Processing, Measurement (3DIPM), and Applications 2014: 901305 - [c107]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Fighting against forged documents by using textured image. EUSIPCO 2014: 790-794 - [c106]Meha Hachani, Azza Ouled Zaid, William Puech:
Segmentation of 3D dynamic meshes based on Reeb graph approach. EUSIPCO 2014: 2175-2179 - [c105]Meha Hachani, Azza Ouled Zaid, William Puech:
Segmentation-based 3D dynamic mesh compression scheme. EUVIP 2014: 1-6 - [c104]Ahmed Salmi El Boumnini El Hassani, Benjamin Gilles, William Puech, Mohammed El Hassouni, Mohammed Rziza:
Hierarchical MRI segmentation of the musculoskeletal system using texture analysis and topologigcal constraints. EUVIP 2014: 1-6 - [c103]Anas Kharboutly, William Puech, Gérard Subsol, Denis Hoa:
CT-Scanner identification based on sensor noise analysis. EUVIP 2014: 1-5 - [c102]Meha Hachani, Azza Ouled Zaid, William Puech:
3D non-rigid pattern recognition based on structural analysis. ICIP 2014: 3131-3135 - [c101]Vincent Itier, William Puech, Adrian G. Bors:
Cryptanalysis aspects in 3-D watermarking. ICIP 2014: 4772-4776 - [c100]Atef Masmoudi, Afif Masmoudi, William Puech:
An efficient adaptive arithmetic coding for block-based lossless image compression using mixture models. ICIP 2014: 5646-5650 - [c99]Meha Hachani, Azza Ouled Zaid, William Puech:
Kinematic Reeb Graph Extraction Based on Heat Diffusion. ICPR 2014: 3981-3986 - [c98]Iuliia Tkachenko, William Puech, Olivier Strauss, Jean-Marc Gaudin, Christophe Destruel, Christian Guichard:
Improving the module recognition rate of high density QR codes (Version 40) by using centrality bias. IPTA 2014: 155-160 - 2013
- [j18]Roseline Bénière, Gérard Subsol, Gilles Gesquière, François Le Breton, William Puech:
A comprehensive process of reverse engineering from 3D meshes to CAD models. Comput. Aided Des. 45(11): 1382-1393 (2013) - [j17]Marc Chaumont, William Puech, Christian Lahanier:
Securing color information of an image by concealing the color palette. J. Syst. Softw. 86(3): 809-825 (2013) - [j16]Zafar Shahid, Marc Chaumont, William Puech:
Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC. Signal Image Video Process. 7(1): 75-93 (2013) - [j15]Zafar Shahid, Marc Chaumont, William Puech:
H.264/AVC video watermarking for active fingerprinting based on Tardos code. Signal Image Video Process. 7(4): 679-694 (2013) - [j14]Azhar Hadmi, William Puech, Brahim Ait Es Said, Abdellah Ait Ouahman:
A robust and secure perceptual hashing system based on a quantization step analysis. Signal Process. Image Commun. 28(8): 929-948 (2013) - [c97]Benoit Lange, Nancy Rodriguez, William Puech, Xavier Vasques:
Discovering unexpected information using a building energy visualization tool. Three-Dimensional Image Processing (3DIP) and Applications 2013: 86500Q - [c96]Boris Assanovich, William Puech, Iuliia Tkachenko:
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors. Communications and Multimedia Security 2013: 105-112 - [c95]Loic Dubois, William Puech, Jacques Blanc-Talon:
Confidentiality metrics and Smart Selective Encryption for HD H.264/AVC videos. EUSIPCO 2013: 1-5 - [c94]Auréline Quatrehomme, Ingrid Millet, Denis Hoa, Gérard Subsol, William Puech:
Assessment of an automatic system classifying hepatic lesions on multi-phase computer tomography images. EUSIPCO 2013: 1-5 - [c93]Michael Pinto, William Puech, Gérard Subsol:
Protection of JPEG compressed e-comics by selective encryption. ICIP 2013: 4588-4592 - [c92]Sarra Kouider, Marc Chaumont, William Puech:
Adaptive steganography by oracle (ASO). ICME 2013: 1-6 - [c91]Ines Bouzidi, Azza Ouled Zaid, Meha Hachani, William Puech:
Joint watermarking and progressive geometric compression of 3D meshes. IH&MMSec 2013: 209-214 - [c90]Zafar Shahid, William Puech:
A histogram shifting based RDH scheme for H.264/AVC with controllable drift. Media Watermarking, Security, and Forensics 2013: 86650S - [c89]Vincent Itier, William Puech, Jean-Pierre Pedeboy, Gilles Gesquière:
Construction of a unique robust hamiltonian path for a vertex cloud. MMSP 2013: 105-110 - [c88]Mathieu Desoubeaux, Cédric Herzet, William Puech, Gaëtan Le Guelvouit:
Enhanced blind decoding of tardos codes with new MAP-based functions. MMSP 2013: 283-288 - [c87]Zafar Shahid, William Puech:
Investigating the structure preserving encryption of high efficiency video coding (HEVC). Real-Time Image and Video Processing 2013: 86560N - [e1]William Puech, Marc Chaumont, Jana Dittmann, Patrizio Campisi:
ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '13, Montpellier, France, June 17-19, 2013. ACM 2013, ISBN 978-1-4503-2081-8 [contents] - [i1]Mathieu Desoubeaux, Cédric Herzet, William Puech, Gaëtan Le Guelvouit:
Enhanced blind decoding of Tardos codes with new map-based functions. CoRR abs/1305.7038 (2013) - 2012
- [j13]Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj-Said:
Joint trellis-coded quantization watermarking for JPEG2000 images. Ann. des Télécommunications 67(7-8): 407-421 (2012) - [c86]Roseline Bénière, Gérard Subsol, Gilles Gesquière, François Le Breton, William Puech:
Topology reconstruction for B-Rep modeling from 3D mesh in reverse engineering applications. Three-Dimensional Image Processing (3DIP) and Applications 2012: 82900M - [c85]Nicolas Tournier, William Puech, Gérard Subsol, Jean-Pierre Pedeboy:
3D multiresolution synchronization scheme based on feature point selection. Three-Dimensional Image Processing (3DIP) and Applications 2012: 829013 - [c84]Sarra Kouider, Marc Chaumont, William Puech:
Technical points about adaptive steganography by oracle (ASO). EUSIPCO 2012: 1703-1707 - [c83]William Puech, Zekeriya Erkin, Mauro Barni, Shantanu Rane, Reginald L. Lagendijk:
Emerging cryptographic challenges in image and video processing. ICIP 2012: 2629-2632 - [c82]Loic Dubois, William Puech, Jacques Blanc-Talon:
Reduced selective encryption of intra and inter frames of H.264/AVC using psychovisual metrics. ICIP 2012: 2641-2644 - [c81]Methaq Talib Gaata, William Puech, Sattar Sadkhn, Saad Hasson:
No-reference quality metric for watermarked images based on combining of objective metrics using neural network. IPTA 2012: 229-234 - [c80]Mathieu Desoubeaux, Gaëtan Le Guelvouit, William Puech:
Fast detection of Tardos codes with Boneh-Shaw types. Media Watermarking, Security, and Forensics 2012: 83030P - [c79]Naveed Islam, William Puech:
Noise removing in encrypted color images by statistical analysis. Media Watermarking, Security, and Forensics 2012: 83030U - [c78]Auréline Quatrehomme, Ingrid Millet, Denis Hoa, Gérard Subsol, William Puech:
Assessing the Classification of Liver Focal Lesions by Using Multi-phase Computer Tomography Scans. MCBR-CDS 2012: 80-91 - [c77]Ala Abu-Zahra, Zafar Shahid, Amjad Rattrout, William Puech:
Independent Protection of Different Layers in Spatially Scalable Video Coding. ANT/MobiWIS 2012: 240-246 - 2011
- [j12]Zafar Shahid, Marc Chaumont, William Puech:
Fast Protection of H.264/AVC by Selective Encryption of CAVLC and CABAC for I and P Frames. IEEE Trans. Circuits Syst. Video Technol. 21(5): 565-576 (2011) - [c76]Roseline Bénière, Gérard Subsol, Gilles Gesquière, François Le Breton, William Puech:
Recovering primitives in 3D CAD meshes. Three-Dimensional Imaging, Interaction, and Measurement 2011: 78640R - [c75]Nicolas Tournier, William Puech, Gérard Subsol, Jean-Pierre Pedeboy:
Finding robust vertices for 3D synchronization based on Euclidean minimum spanning tree. Three-Dimensional Imaging, Interaction, and Measurement 2011: 78640W - [c74]Nuhman ul Haq, Khizar Hayat, Neelum Noreen, William Puech:
Image Sharpening by DWT-Based Hysteresis. ACIVS 2011: 429-436 - [c73]Nicolas Tournier, Gérard Subsol, William Puech, Jean-Pierre Pedeboy:
3D Data Hiding for Enhancement and Indexation on Multimedia Medical Data. MIAD 2011: 43-51 - [c72]Auréline Quatrehomme, Denis Hoa, Gérard Subsol, William Puech:
Content-based Computer Tomography Image Retrieval on a Whole-body Anatomical Reference Set: Methods and Preliminary Results. MIAD 2011: 52-61 - [c71]Nuhman ul Haq, Khizar Hayat, Syed Hamad Sherazi, William Puech:
Segmentation through DWT and adaptive morphological closing. EUSIPCO 2011: 31-35 - [c70]Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj-Said:
A Joint Trellis Coded Quantization (TCQ) data hiding scheme in the JPEG2000 part 2 coding framework. EUSIPCO 2011: 1110-1114 - [c69]Loic Dubois, William Puech, Jacques Blanc-Talon:
Fast protection of H.264/AVC by reduced selective encryption of CAVLC. EUSIPCO 2011: 2185-2189 - [c68]Naveed Islam, William Puech:
Decryption of noisy encrypted images by statistical analysis. EUVIP 2011: 192-198 - [c67]Azhar Hadmi, William Puech, Brahim Ait Es Said, Abdellah Ait Ouahman:
Statistical analysis of the quantization stage of robust perceptual image hashing. EUVIP 2011: 274-279 - [c66]Zafar Shahid, William Puech:
Synchronization of texture and depth map by data hiding for 3D H.264 video. ICIP 2011: 2773-2776 - [c65]Ali Beddiaf, William Puech, Mohamed Chaouki Babahenini:
Topological synchronization mechanism for robust watermarking on 3D semi-regular meshes. ICME 2011: 1-6 - [c64]Methaq Talib Gaata, William Puech, Sattar Sadkhn:
Digital watermarking method based on fuzzy image segmentation technique. ISSPIT 2011: 218-223 - [c63]Mathieu Desoubeaux, Gaëtan Le Guelvouit, William Puech:
Probabilistic fingerprinting codes used to detect traitor zero-bit watermark. Media Forensics and Security 2011: 78800W - [c62]Naveed Islam, William Puech, Robert Brouzet:
Comparison of three solutions to correct erroneous blocks to extract an image of a multiplicative homomorphic cryptosystem. Media Forensics and Security 2011: 788004 - [c61]Benoit Lange, Herve Rey, Xavier Vasques, William Puech, Nancy Rodriguez:
Visualization assisted by parallel processing. Parallel Processing for Imaging Applications 2011: 78720B - [c60]Benoit Lange, Nancy Rodriguez, William Puech, Herve Rey, Xavier Vasques:
A 3D particle visualization system for temperature management. Visualization and Data Analysis 2011: 78680T - [c59]Marc Chaumont, Dalila Goudia, William Puech:
Hyper-cube watermarking scheme. Visual Information Processing and Communication 2011: 78820B - [c58]Dalila Goudia, Marc Chaumont, William Puech, Naima Hadj-Said:
A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme. Visual Information Processing and Communication 2011: 78820C - [c57]Loic Dubois, William Puech, Jacques Blanc-Talon:
Smart selective encryption of CAVLC for H.264/AVC video. WIFS 2011: 1-6 - 2010
- [j11]Khizar Hayat, William Puech, Naveed Islam, Gilles Gesquière:
Seamless Heterogeneous 3D Tessellation via DWT Domain Smoothing and Mosaicking. EURASIP J. Adv. Signal Process. 2010 (2010) - [j10]Khizar Hayat, William Puech, Gilles Gesquière:
Adaptively synchronous scalable spread spectrum (A4S) data-hiding strategy for three-dimensional visualization. J. Electronic Imaging 19(2): 023011 (2010) - [j9]Atef Masmoudi, William Puech, Mohamed Salim Bouhlel:
Efficient adaptive arithmetic coding based on updated probability distribution for lossless image compression. J. Electronic Imaging 19(2): 023014 (2010) - [j8]Atef Masmoudi, William Puech, Mohamed Salim Bouhlel:
An Efficient PRBG Based on Chaotic Map and Engel Continued Fractions. J. Softw. Eng. Appl. 3(12): 1141-1147 (2010) - [j7]Philippe Amat, William Puech, Sébastien Druon, Jean-Pierre Pedeboy:
Lossless 3D steganography based on MST and connectivity modification. Signal Process. Image Commun. 25(6): 400-412 (2010) - [c56]Nicolas Tournier, William Puech, Gérard Subsol, Jean-Pierre Pedeboy:
Sensitivity analysis of Euclidean minimum spanning tree. Three-Dimensional Image Processing (3DIP) and Applications 2010: 75260G - [c55]Afif Masmoudi, Mohamed Salim Bouhlel, William Puech:
A new image cryptosystem based on chaotic map and continued fractions. EUSIPCO 2010: 1504-1508 - [c54]Zafar Shahid, Marc Chaumont, William Puech:
Over the real-time selective encryption of AVS video coding standard. EUSIPCO 2010: 2116-2120 - [c53]Roseline Bénière, Gérard Subsol, William Puech, Gilles Gesquière, François Le Breton:
Decomposition of a 3D Triangular Mesh into Quadrangulated Patches. GRAPP 2010: 96-103 - [c52]Zafar Shahid, Marc Chaumont, William Puech:
Spread spectrum-based watermarking for Tardos code-based fingerprinting for H.264/AVC video. ICIP 2010: 2105-2108 - [c51]Zafar Shahid, Marc Chaumont, William Puech:
Selective encryption of C2DVLC of AVS video coding standard for I & P frames. ICME 2010: 1655-1660 - [c50]Azhar Hadmi, William Puech, Brahim Ait Es Said, Abdellah Ait Ouahman:
Analysis of the robustness of wavelet-based perceptual signatures. IPTA 2010: 112-117 - [c49]Khizar Hayat, William Puech, Gilles Gesquière:
Seamless heterogeneous tessellation via smoothing and mosaicking in the DWT domain. Visual Information Processing and Communication 2010: 75430W
2000 – 2009
- 2009
- [c48]Desire Sidibé, Olivier Strauss, William Puech:
Automatic background generation from a sequence of images based on robust mode estimation. Digital Photography 2009: 72500 - [c47]Zafar Shahid, Peter Meuel, Marc Chaumont, William Puech:
Considering the reconstruction loop for watermarking of intra and inter frames OF H.264/AVC. EUSIPCO 2009: 1794-1798 - [c46]Atef Masmoudi, William Puech, Mohamed Salim Bouhlel:
A generalized continued fraction-based asynchronous stream cipher for image protection. EUSIPCO 2009: 1829-1833 - [c45]Khizar Hayat, William Puech, Gilles Gesquière:
Seamless joining of tiles of varying resolutions for online 3D terrain visualization by DWT domain smoothing. EUSIPCO 2009: 2112-2116 - [c44]Zafar Shahid, Marc Chaumont, William Puech:
Fast protection of H.264/AVC by selective encryption of CABAC for I & P frames. EUSIPCO 2009: 2201-2205 - [c43]Desire Sidibé, William Puech, Olivier Strauss:
Ghost detection and removal in High Dynamic Range Images. EUSIPCO 2009: 2240-2244 - [c42]Zafar Shahid, Marc Chaumont, William Puech:
Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns. ICIP 2009: 1273-1276 - [c41]Khizar Hayat, William Puech, Gilles Gesquière, Gérard Subsol:
3D facial visualization through adaptive spread spectrum synchronous scalable (A4S) data hiding. ICIP 2009: 2473-2476 - [c40]Zafar Shahid, Marc Chaumont, William Puech:
Fast protection of H.264/AVC by selective encryption of CABAC. ICME 2009: 1038-1041 - [c39]Adrien Chauve, Frédéric Bretar, Sylvie Durrieu, Marc Pierrot-Deseilligny, William Puech:
FullAnalyze: A Research Tool for Handling, Processing and Analyzing Full-waveform Lidar Data. IGARSS (4) 2009: 841-844 - [c38]Naveed Islam, William Puech, Robert Brouzet:
A Homomorphic Method for Sharing Secret Images. IWDW 2009: 121-135 - [c37]Khizar Hayat, William Puech, Gilles Gesquière:
An adaptive spread spectrum (SS) synchronous data hiding strategy for scalable 3D terrain visualization. VDA 2009: 724308 - 2008
- [j6]Khizar Hayat, William Puech, Gilles Gesquière:
Scalable 3-D Terrain Visualization Through Reversible JPEG2000-Based Blind Data Hiding. IEEE Trans. Multim. 10(7): 1261-1276 (2008) - [c36]Philippe Amat, William Puech, Sébastien Druon, Jean-Pierre Pedeboy:
Lossless data hiding method based on MST and topology changes of 3D triangular mesh. EUSIPCO 2008: 1-5 - [c35]Marc Chaumont, William Puech:
A 8-bit-grey-level image embedding its 512 color palette. EUSIPCO 2008: 1-5 - [c34]Khizar Hayat, William Puech, Gilles Gesquière:
A lossy JPEG2000-based data hiding method for scalable 3D terrain visualization. EUSIPCO 2008: 1-5 - [c33]Khizar Hayat, William Puech, Gilles Gesquière:
Scalable data hiding for online textured 3D terrain visualization. ICME 2008: 217-220 - [c32]Marc Chaumont, William Puech:
Attack by colorization of a grey-level image hiding its color palette. ICME 2008: 1537-1540 - [c31]William Puech, Marc Chaumont, Olivier Strauss:
A reversible data hiding method for encrypted images. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68191E - 2007
- [j5]A. Khireddine, Khier Benmahammed, William Puech:
Digital image restoration by Wiener filter in 2D case. Adv. Eng. Softw. 38(7): 513-516 (2007) - [j4]William Puech, José M. Rodrigues, J. E. Develay-Morice:
A new fast reversible method for image safe transfer. J. Real Time Image Process. 2(1): 55-65 (2007) - [c30]Peter Meuel, Marc Chaumont, William Puech:
Data hiding in H.264 video for lossless reconstruction of region of interest. EUSIPCO 2007: 2301-2305 - [c29]Khizar Hayat, William Puech, Gilles Gesquière:
An efficient data-hiding method based on lossless JPEG2000 for a scalable and synchronized visualization of 3D terrains. EUSIPCO 2007: 2519-2523 - [c28]Philippe Amat, William Puech, Sébastien Druon, Jean-Pierre Pedeboy:
A data hiding method based on the topology change of a 3D triangular mesh. EUSIPCO 2007: 2524-2528 - [c27]Marc Chaumont, William Puech:
A Grey-Level Image Embedding its Color Palette. ICIP (1) 2007: 389-392 - [c26]Marc Chaumont, William Puech:
A fast and efficient method to protect color images. VCIP 2007: 65081T - [c25]Marc Chaumont, William Puech:
3D-face model tracking based on a multi-resolution active search. VCIP 2007: 65081U - [c24]Khizar Hayat, William Puech, Gilles Gesquière, Marc Chaumont:
Wavelet-based data hiding of DEM in the context of real-time 3D visualization. Visualization and Data Analysis 2007: 64950N - [c23]Marc Chaumont, William Puech:
Fast Protection of the Color of High Dimension Digital Painting Images. WIAMIS 2007: 60 - [c22]William Puech, José M. Rodrigues, Adrian G. Bors:
Analysis and Cryptanalysis of a Selective Encryption Method for JPEG Images. WIAMIS 2007: 77 - 2006
- [j3]Khalifa Djemal, William Puech, Bruno Rossetto:
Automatic Active Contours Propagation in a Sequence of Medical Images. Int. J. Image Graph. 6(2): 267-292 (2006) - [c21]José M. Rodrigues, William Puech, Adrian G. Bors:
A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher. CGIV 2006: 34-39 - [c20]Marc Chaumont, William Puech:
A Color Image Hidden in a Grey-Level Image. CGIV 2006: 226-231 - [c19]Jean-Luc Toutant, William Puech, Christophe Fiorio:
Minimizing Data-Hiding Noise in Color JPEG Images by Adapting the Quantization. CGIV 2006: 387-391 - [c18]Marc Chaumont, William Puech:
A DCT-based data-hiding method to embed the color information in a JPEG grey level image. EUSIPCO 2006: 1-5 - [c17]José M. Rodrigues, William Puech, Adrian G. Bors:
Selective Encryption of Human Skin in JPEG Images. ICIP 2006: 1981-1984 - [c16]Alexandre Martin, Gilles Gesquière, William Puech, Sébastien Thon:
Real-time 3D visualization of DEM combined with a robust DCT based data-hiding method. Visualization and Data Analysis 2006: 60600G - 2005
- [c15]Gregory Lo-Varco, William Puech:
Safe ROIs of color images by inductive data hiding. EUSIPCO 2005: 1-4 - [c14]William Puech, José M. Rodrigues:
Crypto-compression of medical images by selective encryption of DCT. EUSIPCO 2005: 1-4 - [c13]Gregory Lo-Varco, William Puech:
DCT-based data hiding for securing ROI of color images. ICIP (2) 2005: 1086-1089 - [c12]Géraldine Joffre, William Puech, Frédéric Comby, Jacques Joffre:
High dynamic range images from digital cameras raw data. SIGGRAPH Posters 2005: 72 - 2004
- [c11]Gregory Lo-Varco, William Puech, Michel Dumas:
DCT-Based Watermarking Method Using Color Components. CGIV 2004: 146-150 - [c10]William Puech, José M. Rodrigues:
A new crypto-watermarking method for medical images safe transfer. EUSIPCO 2004: 1481-1484 - 2003
- [c9]Moez Bouchouicha, Mohamed Moncef Ben Khelifa, William Puech:
A non-linear camera calibration with genetic algorithms. ISSPA (2) 2003: 189-192 - 2002
- [c8]William Puech, Philippe Montesinos, Michel Dumas:
Color Image Watermarking Robust to JPEG Compression. CGIV 2002: 81-85 - [c7]Khalifa Djemal, William Puech, Bruno Rossetto:
Active contours propagation in a medical images sequence with a local estimation. EUSIPCO 2002: 1-4 - 2001
- [j2]William Puech, Adrian G. Bors, Ioannis Pitas, Jean-Marc Chassery:
Projection distortion analysis for flattened image mosaicing from straight uniform generalized cylinders. Pattern Recognit. 34(8): 1657-1670 (2001) - 2000
- [c6]William Puech, Guy Passail, Vincent Ricordel:
Analysis and optimisation of 3D reconstruction method of the aorta from a tomographic images sequence. EUSIPCO 2000: 1-4
1990 – 1999
- 1998
- [c5]William Puech, Jean-Marc Chassery:
Curvature variation of projected cross-sections from straight uniform generalized cylinders. EUSIPCO 1998: 1-4 - 1997
- [j1]William Puech, Jean-Marc Chassery, Ioannis Pitas:
Cylindrical surface localization in monocular vision. Pattern Recognit. Lett. 18(8): 711-722 (1997) - [c4]Adrian G. Bors, William Puech, Ioannis Pitas, Jean-Marc Chassery:
Mosaicing of Flattened Images from Straight Homogeneous Generalized Cylinders. CAIP 1997: 122-129 - [c3]Adrian G. Bors, William Puech, Ioannis Pitas, Jean-Marc Chassery:
Perspective distortion analysis for mosaicing images painted on cylindrical surfaces. ICASSP 1997: 3049-3052 - 1996
- [c2]William Puech, Jean-Marc Chassery:
Curved surface reconstruction using monocular vision. EUSIPCO 1996: 1-4 - [c1]William Puech, Jean-Marc Chassery, Adrian G. Bors, Ioannis Pitas:
Mosaicing of paintings on curved surfaces. WACV 1996: 44-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint