Contents
Academic literature on the topic 'Filigranes numériques – Protection de l'information (informatique) – Offuscation (informatique)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Filigranes numériques – Protection de l'information (informatique) – Offuscation (informatique).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Dissertations / Theses on the topic "Filigranes numériques – Protection de l'information (informatique) – Offuscation (informatique)"
Badier, Hannah. "Transient obfuscation for HLS security : application to cloud security, birthmarking and hardware Trojan defense." Thesis, Brest, École nationale supérieure de techniques avancées Bretagne, 2021. https://tel.archives-ouvertes.fr/tel-03789700.
Full textThe growing globalization of the semiconductor supply chain, as well as the increasing complexity and diversity of hardware design flows, have lead to a surge in security threats: risks of intellectual property theft and reselling, reverse-engineering and malicious code insertion in the form of hardware Trojans during manufacturing and at design time have been a growing research focus in the past years. However, threats during highlevel synthesis (HLS), where an algorithmic description is transformed into a lower level hardware implementation, have only recently been considered, and few solutions have been given so far. In this thesis, we focus on how to secure designs during behavioral synthesis using either a cloud-based or an internal but untrusted HLS tool. We introduce a novel design time protection method called transient obfuscation, where the high-level source code is obfuscated using key-based techniques, and deobfuscated after HLS at register-transfer level. This two-step method ensures correct design functionality and low design overhead. We propose three ways to integrate transient obfuscation in different security mechanisms. First, we show how it can be used to prevent intellectual property theft and illegal reuse in a cloud-based HLS scenario. Then, we extend this work to watermarking, by exploiting the side-effects of transient obfuscation on HLS tools to identify stolen designs. Finally, we show how this method can also be used against hardware Trojans, both by preventing insertion and by facilitating detection
Doërr, Gwenaël. "Security issue and collusion attacks in video watermarking." Nice, 2005. http://www.theses.fr/2005NICE4016.
Full textDix ans après son apparition, le tatouage numérique est encore considéré comme une technologie jeune. En dépit du fait qu’il ait été introduit pour des applications ayant trait à la sécurité telles que la protection de droit d’auteur, quasiment aucune étude n’a été conduite afin d’évaluer la survie des tatouages insérés dans un environnement hostile. Dans cette thèse, il sera montré qu’un tel manque d’évaluation a aboutit à de graves failles de sécurité face à des analyses statistiques, que l’on appelle aussi des attaques par collusion. De telles attaques considèrent typiquement plusieurs documents tatoués et les combinent afin de produire des contenus non-tatoués. Ce danger est d’autant plus important lorsque de la vidéo numérique est considérée du fait que chaque trame vidéo peut être vue individuellement comme un document tatoué. Ensuite, différentes ripostes sont introduites pour combattre les faiblesses préalablement isolées. En particulier, le tatouage compensant le mouvement et le tatouage cohérent avec le signal seront étudiés afin d’obtenir un signal de tatouage qui présente les mêmes autosimilarités spatio-temporelles que le signal vidéo hôte
Galand, Fabien. "Construction de codes Z indice p à la puissance k linéaires de bonne distance minimale et schémas de dissimulation fondés sur les codes de recouvrement." Caen, 2004. http://www.theses.fr/2004CAEN2047.
Full textXie, Fuchun. "Tatouage sûr et robuste appliqué au traçage de documents multimédia." Phd thesis, Université Rennes 1, 2010. http://tel.archives-ouvertes.fr/tel-00592126.
Full textMeuel, Peter. "Insertion de données cachées dans des vidéos au format H. 264." Montpellier 2, 2009. http://www.theses.fr/2009MON20218.
Full textThis thesis targets two major issues cause by the massive adoption of the H. 264 video format: the privacy issue with closed-circuit television and the need of secure and robust watermarking methods for the video content. A first contribution adresses the privacy issue achieve the creation of a single video flow wich restraint the visual information of the filmed faces only to persons with the appropriate key. Performances of the results show the usability of the method in video-camera. The second contribution about the robust watermarking uses the secure watermarking state-of-the-art applied to video. On the opposite of crypting, the security of the method relies on the secret subspace for the insertion. The work explains the entire process for an adaptation to the H. 264 video format
Desoubeaux, Mathieu. "Codes de traçage de traîtres pour la protection de contenus numériques." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20228/document.
Full textIn Traitor Tracing, preventing leaks of a digital content comes with the personalization of each delivered copy. For multimedia content distribution, such as video on demand applications, the personalization depends on a joint construction between a code of unique sequences and a data hiding tool. The major issue is to keep tracing properties even in case of collusion attacks proceed by a coalition of traitors. Collusion attacks have to be counteract both on the code layer with anti-collusion construction and on the data hiding layer with robust watermarking. For large scale multimedia content distribution, it is necessary to tackle the problem of the code generation in a probabilistic manner. The binary code of Gabor Tardos is actually the best approach of probabilistic traitor tracing codes. However, for real valued signals prone to distortion constraint, which is the context in multimedia digital watermarking, Tardos binary fingerprints are no longer optimal in term of decoding error. Our work concerns several aspects of probabilistic codes construction. Firstly, we gives new accusation functions in the Tardos tracing framework with a non informed MAP (Maximum A Posteriori) decoder leading to decrease errors probabilities. Secondly, we proposed a joint construction of binary and real values codes so as to improve collusion robustness. Finally we focus on a hierarchical two layers codes construction which reduces the Tardos decoding complexity
Niyitegeka, David. "Composition de mécanismes cryptographiques et de tatouage pour la protection de données génétiques externalisées." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0225.
Full textNowadays, cloud computing allows researchers and health professionals to flexibly store and process large amounts of genetic data remotely, without a need to purchase and to maintain their own infrastructures. These data are especially used in genome-wide association studies (GWAS) in order to conduct the identification of genetic variants that are associated with some diseases. However, genetic data outsourcing or sharing in the cloud induces many security issues. In addition, a human genome is very sensitive by nature and represents the unique biological identity of its owner. The objective of this thesis work is to protect genetic data during their sharing, storage and processing. We have developped new security tools that are based on watermarking and cryptographic mechanisms, as well as on the combination of them. First, we have proposed a privacy-preserving method that allows to compute the secure collapsing method based on the logistic regression model using homomorphic encryption (HE). To overcome the computational and storage overhead of HE-based solutions, we have developed a framework that allows secure performing of GWAS for rare variants without increasing complexity compared to its nonsecure version. It is based on several security mechanisms including encryption. In parallel of these works, we have exploited the semantic security of some HE schemes so as to develop a dynamic watermarking method that allows integrity control for encrypted data. At last, we have developed a robust watermarking tool for GWAS data for traitor tracing purposes
Cu, Vinh Loc. "On the use of pattern recognition technique to develop data hiding schemes : application to document security." Thesis, La Rochelle, 2019. http://www.theses.fr/2019LAROS015.
Full textThe fast-growing information technologies and digital image technology over the past decades have made digital document images becoming more ubiquitous than ever. In reality, there have been variety of legal documents consisting of administrative and business documents such as certificate, diploma, contract, invoice, etc. These documents are in use in government agencies, banks, educational institutions and so on. Due to convenience of exchanging information, the genuine documents are often transferred from one place to another by using digital channels. The tampering of these documents during the transmission has become an unavoidable matter, especially in the field of cybercrime. Hence, the credibility and trustworthiness of the legal digital documents have been diminished, this often results in a serious aftermath with respect to criminal, economic and social issues. To secure the genuine digital documents against unauthorized interference, the field of document forensics has been evolved, and it has drawn much attention from researchers in the community of document analysis and recognition. One of the efficient solutions to address this matter is data hiding in conjunction with pattern recognition techniques. The objective of this work is to develop a data hiding framework as trustworthy as possible that enables to verify if a document is genuine or phony. The challenging problems dealt with in this thesis are: (1) extraction of enough stable features from the documents even in the presence of various distortions; and (2) be able to detect precisely hidden information embedded for securing documents from watermarked documents undergone real distortions caused by print-and-scan, or print-photocopy-scan processes. For the former issue, we address it by taking advantage of conventional pattern recognition techniques and deep learning based approaches. Specifically, we utilize well-known detectors to detect feature points from the documents, and propose a new feature point detector for developing a steganography scheme. To enhance feature stability against the real distortions, we approach to develop watermarking systems based on stable regions instead of feature points, which are based on the conventional techniques and fully convolutional networks (FCN). In addition, the generative adversarial networks (GAN) are also applied to produce a reference document, and character variations or fonts used for watermarking process. For the later issue, we have come up with two approaches to develop data hiding and detection algorithms: one is based on the changing of pixel intensities, and the other is relied on the shape of characters and symbols.The assessments show that our approaches are able to properly detect the hidden information when the watermarked documents are subjected to various distortions. In comparison with state-of-the-art methods, our approaches give competitive performance in terms of robustness with applications to various types of document
Lefèvre, Pascal. "Protection des contenus multimédias pour la certification des données." Thesis, Poitiers, 2018. http://www.theses.fr/2018POIT2273/document.
Full textFor more than twenty years, technology has become more and more easy to access. It is omnipresent in everyday life and is low cost. It allows anyone using a computer or a smartphone to visualize and modify digital contents. Also, with the impressive progress of online massive data storage (cloud), the quantity of digital contents has soared and continues to increase. To ensure the protection of intellectual property and copyright, knowing if an image has been modified or not is an important information in order to authenticate it. One approach to protect digital contents is digital watermarking. It consists in modifying an image to embed an invisible mark which can authenticate the image. In this doctorate thesis, we first study how to improve the robustness of digital image watermarking against image processings thanks to error correcting codes. By studying the error structure produced by the image processing applied on a watermarked image, we can find an optimal choice of error correcting code for the best correction performances. Also, we propose to integrate a new type of error correcting codes called rank metric codes for watermarking applications. Then, we propose to improve the invisibility of color image watermarking methods. At the embedding step, a host image suffers some distortions which are perceived differently in function of the color by the human visual system. We propose a biological model of color perception which allows one to minimize psychovisual distortions applied on the image to protect
Books on the topic "Filigranes numériques – Protection de l'information (informatique) – Offuscation (informatique)"
Ton, Kalker, Cox I. J, and Ro Yong Man, eds. Digitial watermarking: Second international workshop, IWDW 2003, Seoul, Korea, October 20-22, 2003 : revised papers. Berlin: Springer, 2004.
Find full text