An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images P Puteaux, W Puech IEEE transactions on information forensics and security 13 (7), 1670-1681, 2018 | 351 | 2018 |
A reversible data hiding method for encrypted images W Puech, M Chaumont, O Strauss Security, forensics, steganography, and watermarking of multimedia contents …, 2008 | 326 | 2008 |
Processing full-waveform lidar data: modelling raw signals A Chauve, C Mallet, F Bretar, S Durrieu, MP Deseilligny, W Puech International archives of photogrammetry, remote sensing and spatial …, 2007 | 237 | 2007 |
Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames Z Shahid, M Chaumont, W Puech IEEE Transactions on Circuits and Systems for Video Technology 21 (5), 565-576, 2011 | 205 | 2011 |
Two-level QR code for private message sharing and document authentication I Tkachenko, W Puech, C Destruel, O Strauss, JM Gaudin, C Guichard IEEE Transactions on Information Forensics and Security 11 (3), 571-583, 2015 | 166 | 2015 |
Visual protection of HEVC video by selective encryption of CABAC binstrings Z Shahid, W Puech ieee transactions on multimedia 16 (1), 24-36, 2013 | 138 | 2013 |
A comprehensive process of reverse engineering from 3D meshes to CAD models R Bénière, G Subsol, G Gesquière, F Le Breton, W Puech Computer-Aided Design 45 (11), 1382-1393, 2013 | 122 | 2013 |
Advanced full-waveform lidar data echo detection: Assessing quality of derived terrain and tree height models in an alpine coniferous forest A Chauve, C Vega, S Durrieu, F Bretar, T Allouis, M Pierrot Deseilligny, ... International Journal of Remote Sensing 30 (19), 5211-5228, 2009 | 114 | 2009 |
A new crypto-watermarking method for medical images safe transfer W Puech, JM Rodrigues 2004 12th European Signal Processing Conference, 1481-1484, 2004 | 114 | 2004 |
A recursive reversible data hiding in encrypted images method with a very high payload P Puteaux, W Puech IEEE Transactions on Multimedia 23, 636-650, 2020 | 88 | 2020 |
Crypto-compression of medical images by selective encryption of DCT W Puech, JM Rodrigues 2005 13th European signal processing conference, 1-4, 2005 | 82 | 2005 |
Digital image restoration by Wiener filter in 2D case A Khireddine, K Benmahammed, W Puech Advances in Engineering Software 38 (7), 513-516, 2007 | 78 | 2007 |
Robots in ecology: welcome to the machine D Grémillet, W Puech, V Garçon, T Boulinier, Y Le Maho Open Journal of Ecology 2 (2), 49-57, 2012 | 67 | 2012 |
Adaptive steganography by oracle (ASO) S Kouider, M Chaumont, W Puech 2013 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2013 | 64 | 2013 |
Selective encryption of human skin in JPEG images JM Rodrigues, W Puech, AG Bors 2006 International conference on image processing, 1981-1984, 2006 | 61 | 2006 |
A survey of reversible data hiding in encrypted images–the first 12 years P Puteaux, SY Ong, KS Wong, W Puech Journal of Visual Communication and Image Representation 77, 103085, 2021 | 59 | 2021 |
Ghost detection and removal in high dynamic range images D Sidibe, W Puech, O Strauss 2009 17th European Signal Processing Conference, 2240-2244, 2009 | 59 | 2009 |
Lossless 3D steganography based on MST and connectivity modification P Amat, W Puech, S Druon, JP Pedeboy Signal Processing: Image Communication 25 (6), 400-412, 2010 | 55 | 2010 |
Recompression of JPEG crypto-compressed images without a key V Itier, P Puteaux, W Puech IEEE Transactions on Circuits and Systems for Video Technology 30 (3), 646-660, 2019 | 52 | 2019 |
EPE-based huge-capacity reversible data hiding in encrypted images P Puteaux, W Puech 2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018 | 48 | 2018 |