Marc Chaumont
Marc Chaumont
Associate Professor, HDR (accredited to supervise research), Hors Classe, University of Nîmes, LIRMM
Adresse e-mail validée de lirmm.fr - Page d'accueil
Titre
Citée par
Citée par
Année
A reversible data hiding method for encrypted images
W Puech, M Chaumont, O Strauss
Security, forensics, steganography, and watermarking of multimedia contents …, 2008
2062008
Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames
Z Shahid, M Chaumont, W Puech
IEEE Transactions on Circuits and Systems for Video Technology 21 (5), 565-576, 2011
1712011
Camera model identification with the use of deep convolutional neural networks
A Tuama, F Comby, M Chaumont
2016 IEEE International workshop on information forensics and security (WIFS …, 2016
1642016
Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch
L Pibre, J Pasquet, D Ienco, M Chaumont
Electronic Imaging 2016 (8), 1-11, 2016
147*2016
Yedroudj-net: An efficient CNN for spatial steganalysis
M Yedroudj, F Comby, M Chaumont
2018 IEEE International Conference on Acoustics, Speech and Signal …, 2018
912018
Coral reef fish detection and recognition in underwater videos by supervised machine learning: Comparison between Deep Learning and HOG+ SVM methods
S Villon, M Chaumont, G Subsol, S Villéger, T Claverie, D Mouillot
International Conference on Advanced Concepts for Intelligent Vision Systems …, 2016
552016
A deep learning method for accurate and fast identification of coral reef fishes in underwater images
S Villon, D Mouillot, M Chaumont, ES Darling, G Subsol, T Claverie, ...
Ecological informatics 48, 238-244, 2018
492018
Adaptive steganography by oracle (ASO)
S Kouider, M Chaumont, W Puech
2013 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2013
482013
Deep learning in steganography and steganalysis
M Chaumont
Digital Media Steganography, 321-349, 2020
422020
Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC
Z Shahid, M Chaumont, W Puech
Signal, Image and Video Processing 7 (1), 75-93, 2013
402013
Steganalysis with cover-source mismatch and a small learning database
J Pasquet, S Bringay, M Chaumont
2014 22nd European Signal Processing Conference (EUSIPCO), 2425-2429, 2014
342014
A DCT-based data-hiding method to embed the color information in a JPEG grey level image
M Chaumont, W Puech
2006 14th European Signal Processing Conference, 1-5, 2006
342006
Camera model identification based machine learning approach with high order statistics features
A Tuama, F Comby, M Chaumont
2016 24th European Signal Processing Conference (EUSIPCO), 1183-1187, 2016
322016
Data hiding in H. 264 video for lossless reconstruction of region of interest
P Meuel, M Chaumont, W Puech
2007 15th European Signal Processing Conference, 2301-2305, 2007
272007
Selective and scalable encryption of enhancement layers for dyadic scalable H. 264/AVC by scrambling of scan patterns
Z Shahid, M Chaumont, W Puech
2009 16th IEEE International Conference on Image Processing (ICIP), 1273-1276, 2009
242009
How to augment a small learning set for improving the performances of a CNN-based steganalyzer?
M Yedroudj, M Chaumont, F Comby
Electronic Imaging 2018 (7), 317-1-317-7, 2018
232018
Pelican: deep architecture for the light curve analysis
J Pasquet, J Pasquet, M Chaumont, D Fouchez
Astronomy & Astrophysics 627, A21, 2019
222019
Color image steganalysis based on steerable gaussian filters bank
H Abdulrahman, M Chaumont, P Montesinos, B Magnier
Proceedings of the 4th ACM workshop on Information Hiding and Multimedia …, 2016
222016
Fast protection of H. 264/AVC by selective encryption of CABAC
Z Shahid, M Chaumont, W Puech
2009 IEEE International Conference on Multimedia and Expo, 1038-1041, 2009
212009
Robust and real-time 3d-face model extraction
M Chaumont, B Beaumesnil
IEEE International Conference on Image Processing 2005 3, III-461, 2005
212005
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20