Vincent Itier
YOU?
Author Swipe
View article: Pick the Largest Margin for Robust Detection of Splicing
Pick the Largest Margin for Robust Detection of Splicing Open
Despite advancements in splicing detection, practitioners still struggle to fully leverage forensic tools from the literature due to a critical issue: deep learning-based detectors are extremely sensitive to their trained instances. Simple…
View article: Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis
Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis Open
The proliferation of image manipulation for unethical purposes poses significant challenges in social networks. One particularly concerning method is Image Steganography, allowing individuals to hide illegal information in digital images w…
View article: Leveraging Data Geometry to Mitigate CSM in Steganalysis
Leveraging Data Geometry to Mitigate CSM in Steganalysis Open
In operational scenarios, steganographers use sets of covers from various sensors and processing pipelines that differ significantly from those used by researchers to train steganalysis models. This leads to an inevitable performance gap w…
View article: Using Set Covering to Generate Databases for Holistic Steganalysis
Using Set Covering to Generate Databases for Holistic Steganalysis Open
Within an operational framework, covers used by a steganographer are likely\nto come from different sensors and different processing pipelines than the ones\nused by researchers for training their steganalysis models. Thus, a performance\n…
View article: Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics
Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics Open
Domain adaptation is a major issue for doing practical forensics. Since examined images are likely to come from a different development pipeline compared to the ones used for training our models, that may disturb them by a lot, degrading t…
View article: Combining Forensics and Privacy Requirements for Digital Images
Combining Forensics and Privacy Requirements for Digital Images Open
This paper proposes to study the impact of image selective encryption on both\nforensics and privacy preserving mechanisms. The proposed selective encryption\nscheme works independently on each bitplane by encrypting the s most\nsignifican…
View article: Combining Forensics and Privacy Requirements for Digital Images
Combining Forensics and Privacy Requirements for Digital Images Open
This paper proposes to study the impact of image selective encryption on both forensics and privacy preserving mechanisms. The proposed selective encryption scheme works independently on each bitplane by encrypting the s most significant b…
View article: Recompression of JPEG Crypto-Compressed Images Without a Key
Recompression of JPEG Crypto-Compressed Images Without a Key Open
The rising popularity of social networks and cloud computing has greatly increased a number of JPEG compressed image exchanges. In this context, the security of the transmission channel and/or the cloud storage can be susceptible to privac…
View article: Interval-valued JPEG decompression for artifact suppression
Interval-valued JPEG decompression for artifact suppression Open
International audience
View article: Color Noise-Based Feature for Splicing Detection and Localization
Color Noise-Based Feature for Splicing Detection and Localization Open
Images that have been altered and more specifically spliced together have invaded the digital domain due to the ease with which we are able to copy and paste them. To detect such forgeries the digital image processing community is proposin…
View article: Visual saliency-based confidentiality metric for selective crypto-compressed JPEG images
Visual saliency-based confidentiality metric for selective crypto-compressed JPEG images Open
International audience
View article: How to recompress a JPEG crypto-compressed image?
How to recompress a JPEG crypto-compressed image? Open
This paper presents a new method, of recompressing a JPEG crypto-compressed image. In this project, we propose a cryptocompression method which allows recompression without any information about the encryption key. The recompression can be…
View article: Semantic Correspondence Across 3D Models for Example-based Modeling
Semantic Correspondence Across 3D Models for Example-based Modeling Open
Modeling 3D shapes is a specialized skill not affordable to most novice artists due to its complexity and tediousness. At the same time, databases of complex models ready for use are becoming widespread, and can help the modeling task in a…
View article: Secure High Capacity Data Hiding for 3d Meshes
Secure High Capacity Data Hiding for 3d Meshes Open
International audience
View article: Highcapacity data-hiding for 3D meshes based on static arithmetic coding
Highcapacity data-hiding for 3D meshes based on static arithmetic coding Open
3D meshes are widely used today in very different domains for example; game, medical diagnostic, CAD (computed aided design) or more recently 3-D printing. In this paper, we provide a new data hiding method that has a huge capacity, cp = 3…
View article: Joint synchronization and high capacity data hiding for 3D meshes
Joint synchronization and high capacity data hiding for 3D meshes Open
International audience