Name
Affiliation
Papers
WILLIAM PUECH
LIRMM Laboratory, UMR 5506 CNRS,University of Montpellier II,Montpellier Cedex 05,France
174
Collaborators
Citations 
PageRank 
183
535
76.74
Referers 
Referees 
References 
1029
1863
1397
Search Limit
1001000
Title
Citations
PageRank
Year
Animating and Adjusting 3D Orthodontic Treatment Objectives00.342022
The First Draco 3D Object Crypto-Compression Scheme.00.342022
A 3D Visual Security (3DVS) score to measure the visual security level of selectively encrypted 3D objects00.342022
Correction of Secret Images Reconstructed from Noised Shared Images00.342022
Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video.00.342021
A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload60.522021
Rebuttal: On The Security Of Reversible Data Hiding In Encrypted Images By Msb Prediction00.342021
Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images00.342020
A Format-Compliant Selective Secret 3d Object Sharing Scheme Based On Shamir'S Scheme00.342019
Format-Compliant Selective Secret 3D Object Sharing Scheme00.342019
Copy Sensitive Graphical Code Quality Improvement Using A Super-Resolution Technique00.342018
From Visual Confidentiality To Transparent Format-Compliant Selective Encryption Of 3D Objects10.372018
Color Noise-Based Feature for Splicing Detection and Localization10.342018
IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications.00.342018
Visual Saliency-Based Confidentiality Metric For Selective Crypto-Compressed Jpeg Images10.382017
How to recompress a JPEG crypto-compressed image?00.342017
A preprocessing technique for improving the compression performance of JPEG 2000 for images with sparse or locally sparse histograms.00.342017
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction.20.402017
A two-stage traitor tracing scheme for hierarchical fingerprints.00.342017
High capacity data hiding for 3D point clouds based on Static Arithmetic Coding.60.422017
Special issue on Medical Image Communication, Computing and Security.00.342017
Reversible data hiding in encrypted images based on adaptive local entropy analysis10.352017
Visualization framework of digital paintings based on visual saliency for cultural heritage.10.372017
Secure High Capacity Data Hiding for 3d Meshes.00.342016
Experimental study of Print-and-Scan impact as random process.00.342016
Printed document authentication using two level or code.00.342016
Denoising and error correction in noisy AES-encrypted images using statistical measures30.452016
High-capacity data hiding in encrypted images using MSB prediction00.342016
Segmentation-based compression scheme for 3D animated models.10.362016
Centrality bias measure for high density QR code module recognition.00.342016
An Em-Based Estimation For A Two-Level Traitor Tracing Scheme00.342016
Two-Level QR Code for Private Message Sharing and Document Authentication80.662016
Automatic generation of video from digital paintings for cultural heritage00.342015
Hue Class Equalization To Improve A Hierarchical Image Retrieval System00.342015
Wavelet-based high-capacity watermarking of 3-D irregular meshes80.472015
Joint synchronization and high capacity data hiding for 3D meshes40.432015
Highcapacity data-hiding for 3D meshes based on static arithmetic coding.00.342015
Hierarchical MRI segmentation of the musculoskeletal system using texture analysis and topologigcal constraints00.342014
CT-Scanner identification based on sensor noise analysis50.442014
Cryptanalysis aspects in 3-D watermarking10.352014
An efficient adaptive arithmetic coding for block-based lossless image compression using mixture models00.342014
Segmentation-based 3D dynamic mesh compression scheme00.342014
3D non-rigid pattern recognition based on structural analysis00.342014
Visual Protection of HEVC Video by Selective Encryption of CABAC Binstrings311.192014
Lossless chaos-based crypto-compression scheme for image protection70.492014
H.264/AVC video watermarking for active fingerprinting based on Tardos code.20.442013
Discovering unexpected information using a building energy visualization tool00.342013
Considering the reconstruction loop for data hiding of intra- and inter-frames of H.264/AVC.60.472013
A comprehensive process of reverse engineering from 3D meshes to CAD models120.512013
Confidentiality metrics and Smart Selective Encryption for HD H.264/AVC videos10.362013
  • 1
  • 2