CINXE.COM

<?xml version="1.0" encoding="utf-8"?> <resource xmlns:datacite="http://datacite.org/schema/kernel-4" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://datacite.org/schema/kernel-4 https://schema.datacite.org/meta/kernel-4.4/metadata.xsd"><datacite:identifier identifierType="URL">https://hal.science/hal-03778586v1</datacite:identifier><datacite:creators><datacite:creator><datacite:creatorName>Itier, Vincent</datacite:creatorName><datacite:givenName>Vincent</datacite:givenName><datacite:familyName>Itier</datacite:familyName><datacite:nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org">0000-0002-5287-5998</datacite:nameIdentifier><datacite:affiliation>CRIStAL - Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 - Centrale Lille - Universit茅 de Lille - CNRS - Centre National de la Recherche Scientifique</datacite:affiliation><datacite:affiliation>IMT Nord Europe - Ecole nationale sup茅rieure Mines-T茅l茅com Lille Douai - IMT - Institut Mines-T茅l茅com [Paris]</datacite:affiliation></datacite:creator><datacite:creator><datacite:creatorName>Puteaux, Pauline</datacite:creatorName><datacite:givenName>Pauline</datacite:givenName><datacite:familyName>Puteaux</datacite:familyName><datacite:nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org">0000-0002-3236-4664</datacite:nameIdentifier><datacite:affiliation>ICAR - Image &amp; Interaction - LIRMM - Laboratoire d'Informatique de Robotique et de Micro茅lectronique de Montpellier - UM - Universit茅 de Montpellier - CNRS - Centre National de la Recherche Scientifique</datacite:affiliation></datacite:creator><datacite:creator><datacite:creatorName>Puech, William</datacite:creatorName><datacite:givenName>William</datacite:givenName><datacite:familyName>Puech</datacite:familyName><datacite:nameIdentifier nameIdentifierScheme="ORCID" schemeURI="http://orcid.org">0000-0001-9383-2401</datacite:nameIdentifier><datacite:affiliation>ICAR - Image &amp; Interaction - LIRMM - Laboratoire d'Informatique de Robotique et de Micro茅lectronique de Montpellier - UM - Universit茅 de Montpellier - CNRS - Centre National de la Recherche Scientifique</datacite:affiliation></datacite:creator></datacite:creators><datacite:titles><datacite:title xml:lang="fr">Crypto-compression d鈥檌mages</datacite:title></datacite:titles><datacite:publisher>HAL CCSD</datacite:publisher><datacite:subjects><datacite:subject xml:lang="en" subjectScheme="HAL" schemeURI="https://aurehal.archives-ouvertes.fr/domain/index" valueURI="INFO">[INFO] Computer Science [cs]</datacite:subject><datacite:subject xml:lang="en" subjectScheme="HAL" schemeURI="https://aurehal.archives-ouvertes.fr/domain/index" valueURI="INFO.INFO-CR">[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]</datacite:subject><datacite:subject xml:lang="en" subjectScheme="HAL" schemeURI="https://aurehal.archives-ouvertes.fr/domain/index" valueURI="INFO.INFO-TI">[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]</datacite:subject><datacite:subject xml:lang="en" subjectScheme="HAL" schemeURI="https://aurehal.archives-ouvertes.fr/domain/index" valueURI="INFO.INFO-TS">[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing</datacite:subject></datacite:subjects><datacite:contributors><datacite:contributor contributorType="ContactPerson"><datacite:contributorName>Puteaux, Pauline</datacite:contributorName></datacite:contributor></datacite:contributors><datacite:dates><datacite:date dateType="Submitted">2022-09-15 23:55:24</datacite:date><datacite:date dateType="Updated">2024-09-17 16:00:54</datacite:date><datacite:date dateType="Available">2022-09-15 23:55:24</datacite:date><datacite:date dateType="Issued">2021</datacite:date></datacite:dates><datacite:language>fr</datacite:language><datacite:resourceType resourceTypeGeneral="Text">Book sections</datacite:resourceType><datacite:alternateIdentifiers><datacite:alternateIdentifier alternateIdentifierType="DOI">10.51926/ISTE.9027.ch4</datacite:alternateIdentifier></datacite:alternateIdentifiers><datacite:version>1</datacite:version><datacite:descriptions><datacite:description xml:lang="fr" descriptionType="Abstract">La transmission et le stockage d'images JPEG peuvent 锚tre sensibles aux fuites de confidentialit茅. Dans ce chapitre, nous dressons un 茅tat de l'art des m茅thodes de chiffrement d'images JPEG, appel茅es m茅thodes de crypto-compression. Nous d茅crivons 茅galement une approche de recompression d'images crypto-compress茅es permettant de pr茅server le format JPEG ainsi que le niveau de s茅curit茅 de la m茅thode de chiffrement.</datacite:description></datacite:descriptions></resource>