default search action
Pauline Puteaux
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2020
- [b1]Pauline Puteaux:
Analyse et traitement des images dans le domaine chiffré. (Image analysis and processing in the encrypted domain). University of Montpellier, France, 2020
Journal Articles
- 2024
- [j12]Moctar Abdoul Latif Sawadogo, Furkan Pala, Gurkirat Singh, Imen Selmi, Pauline Puteaux, Alice Othmani:
PTSD in the wild: a video database for studying post-traumatic stress disorder recognition in unconstrained environments. Multim. Tools Appl. 83(14): 42861-42883 (2024) - [j11]Jan Butora, Pauline Puteaux, Patrick Bas:
Errorless Robust JPEG Steganography Using Outputs of JPEG Coders. IEEE Trans. Dependable Secur. Comput. 21(4): 2394-2406 (2024) - 2023
- [j10]Salma Ben Mamia, Pauline Puteaux, William Puech, Kais Bouallegue:
From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption. IEEE Access 11: 49350-49366 (2023) - [j9]Pauline Puteaux, Felix Yriarte, William Puech:
A Secret JPEG Image Sharing Method Over GF(2M) Galois Fields. IEEE Trans. Circuits Syst. Video Technol. 33(6): 3030-3042 (2023) - [j8]Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy:
3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain. ACM Trans. Multim. Comput. Commun. Appl. 19(5s): 175:1-175:20 (2023) - 2021
- [j7]Pauline Puteaux, SimYing Ong, KokSheik Wong, William Puech:
A survey of reversible data hiding in encrypted images - The first 12 years. J. Vis. Commun. Image Represent. 77: 103085 (2021) - [j6]Pauline Puteaux, William Puech:
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 31(9): 3338-3351 (2021) - [j5]Pauline Puteaux, William Puech:
Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans. Inf. Forensics Secur. 16: 2445-2446 (2021) - [j4]Pauline Puteaux, William Puech:
A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload. IEEE Trans. Multim. 23: 636-650 (2021) - 2020
- [j3]Pauline Puteaux, Manon Vialle, William Puech:
Homomorphic Encryption-Based LSB Substitution for High Capacity Data Hiding in the Encrypted Domain. IEEE Access 8: 108655-108663 (2020) - [j2]Vincent Itier, Pauline Puteaux, William Puech:
Recompression of JPEG Crypto-Compressed Images Without a Key. IEEE Trans. Circuits Syst. Video Technol. 30(3): 646-660 (2020) - 2018
- [j1]Pauline Puteaux, William Puech:
An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images. IEEE Trans. Inf. Forensics Secur. 13(7): 1670-1681 (2018)
Conference and Workshop Papers
- 2023
- [c16]Erwan Reinders, Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech:
MSB-Based Reversible Data-Hiding in Encrypted 3D Object Using a Hamiltonian Path. MMSP 2023: 1-6 - 2022
- [c15]Felix Yriarte, Pauline Puteaux, William Puech:
A Joint Secret Image Sharing and Jpeg Compression Scheme. ICIP 2022: 581-585 - [c14]Felix Yriarte, Pauline Puteaux, Iuliia Tkachenko:
A Two-Step Method for Ensuring Printed Document Integrity using Crossing Number Distances. WIFS 2022: 1-6 - 2021
- [c13]Pauline Puteaux, Vincent Itier, Patrick Bas:
Combining Forensics and Privacy Requirements for Digital Images. EUSIPCO 2021: 806-810 - [c12]Pauline Puteaux, Iuliia Tkachenko:
Crossing Number Features: From Biometrics to Printed Character Matching. ICDAR Workshops (1) 2021: 437-450 - [c11]Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy:
Homomorphic Two Tier Reversible Data Hiding In Encrypted 3D Objects. ICIP 2021: 3068-3072 - [c10]Arnaud Soulier, Pauline Puteaux, Frédéric Comby, William Puech:
Lossless Satellite Data Compression for Real-Time Navigation of Autonomous Vehicles. MMSP 2021: 1-6 - 2020
- [c9]Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech:
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. EUSIPCO 2020: 725-729 - [c8]Pauline Puteaux, William Puech:
Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images. IPTA 2020: 1-6 - 2019
- [c7]Sébastien Beugnon, Pauline Puteaux, William Puech:
Privacy Protection for Social Media Based on A Hierarchical Secret Image Sharing Scheme. ICIP 2019: 679-683 - [c6]Pauline Puteaux, William Puech:
Image Analysis and Processing in the Encrypted Domain. ICIP 2019: 3020-3022 - 2018
- [c5]Pauline Puteaux, William Puech:
Noisy Encrypted Image Correction based on Shannon Entropy Measurement in Pixel Blocks of Very Small Size. EUSIPCO 2018: 161-165 - [c4]Pauline Puteaux, William Puech:
EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images. WIFS 2018: 1-7 - 2017
- [c3]Pauline Puteaux, William Puech:
Reversible data hiding in encrypted images based on adaptive local entropy analysis. IPTA 2017: 1-6 - [c2]Pauline Puteaux, William Puech:
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction. Media Watermarking, Security, and Forensics 2017: 10-15 - 2016
- [c1]Pauline Puteaux, Dave Trinel, William Puech:
High-capacity data hiding in encrypted images using MSB prediction. IPTA 2016: 1-6
Informal and Other Publications
- 2022
- [i3]Moctar Abdoul Latif Sawadogo, Furkan Pala, Gurkirat Singh, Imen Selmi, Pauline Puteaux, Alice Othmani:
PTSD in the Wild: A Video Database for Studying Post-Traumatic Stress Disorder Recognition in Unconstrained Environments. CoRR abs/2209.14085 (2022) - [i2]Jan Butora, Pauline Puteaux, Patrick Bas:
Errorless Robust JPEG Steganography using Outputs of JPEG Coders. CoRR abs/2211.04750 (2022) - 2021
- [i1]Pauline Puteaux, Vincent Itier, Patrick Bas:
Combining Forensics and Privacy Requirements for Digital Images. CoRR abs/2103.03569 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint