Дисертації з теми "Sécurité 3D"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-15 дисертацій для дослідження на тему "Sécurité 3D".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Bennour, Zouaoui Jihane. "Sécurité multimédia et objets vidéo 3D." Paris, ENST, 2008. http://www.theses.fr/2008ENST0004.
Повний текст джерелаIn all the published 3D watermarking techniques, users are assumed to access the 3D watermarking datafile to extract/detect the mark. Having observed that in many cases the 3D datafile is not accessible at the extractionstep, we propose a completely different approach. It consists in watermarking 3D objects and retrieving the mark from 2D images or videos having used the 3D synthetic object, thus protecting the visual representation of the object. Several tests are proposed for various environments showing the performance and limits of our asymmetric approach. The second part of the thesis introduces a more classic 3D watermarking application in which both insertion and extraction are performed on the 3D object itself. The originality of this 3D watermarking algorithm is the use of the silhouette to embed the mark, and the introduction of the characteristic views notion. We have also used the silhouette to hide additional information related to the 3D model. For this purpose, we proposed a blind polygonal-line watermarking technique that has capacity
Kabil, Alexandre. "CyberCOP 3D : visualisation 3D interactive et collaborative de l'état de sécurité d'un système informatique." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0166.
Повний текст джерелаThe aim of this thesis was to study the use of Collaborative Virtual Environments (CVE) for the analysis of the state of security of computer systems, also called Cyber Situational Awareness (CSA). After studying CSA’s models and tools, we have had the opportunity to visit the Security Operations Centers (SOCs) of four industrial partners of the CyberCNI chair, in order to better understand the needs and expectations of cyber analysts. These visits were made as part of a collaborative activity analysis protocol and have allowed us to propose a model, the 3D Cyber-COP. Based on this model and a model of the WannaCry ransomware, we have developed a CVE and a simplified scenario engine that allows users to design their own alert analysis scenarios. We have also performed a usability evaluation of a virtual environment for alert analysis, with a panel of novice users
Rolland-Nevière, Xavier. "Tatouage 3D robuste." Thesis, Nice, 2014. http://www.theses.fr/2014NICE4083/document.
Повний текст джерела3D models are valuable assets widely used in the industry and likely to face piracy issues. This dissertation deals with robust mesh watermarking that is used for traitor-Tracing. Following a review of state-Of-The-Art 3D watermarking systems, the robustness of several content adaptation transforms are benchmarked. An embedding domain robust against pose is investigated, with a thickness estimation based on a robust distance function to a point cloud constructed from some mesh diameters. A benchmark showcases the performance of this domain that provides a basis for robust watermarking in 3D animations. For static meshes, modulating the radial distances is an efficient approach to watermarking. It has been formulated as a quadratic programming problem minimizing the geometric distortion while embedding the payload in the radial distances. This formulation is leveraged to create a robust watermarking framework, with the integration of the spread-Transform, integral reference primitives, arbitrarily selected relocation directions and alternate metrics to minimize the distortion perceived. Benchmarking results showcase the benefits of these add-Ons w.r.t the fidelity vs. robustness watermarking trade-Off. The watermark security is then investigated with two obfuscation mechanisms and a series of attacks that highlight the remaining limitations. A resynchronization approach is finally integrated to deal with cropping attacks. The resynchronization embeds land-Marks in a configuration that conveys synchronization information that will be lost after cropping. During the decoding, this information is blindly retrieved and significant robustness improvements are achieved
Itier, Vincent. "Nouvelles méthodes de synchronisation de nuages de points 3D pour l'insertion de données cachées." Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS017/document.
Повний текст джерелаThis thesis addresses issues relating to the protection of 3D object meshes. For instance, these objects can be created using CAD tool developed by the company STRATEGIES. In an industrial context, 3D meshes creators need to have tools in order to verify meshes integrity, or check permission for 3D printing for example.In this context we study data hiding on 3D meshes. This approach allows us to insert information in a secure and imperceptible way in a mesh. This may be an identifier, a meta-information or a third-party content, for instance, in order to transmit secretly a texture. Data hiding can address these problems by adjusting the trade-off between capacity, imperceptibility and robustness. Generally, data hiding methods consist of two stages, the synchronization and the embedding. The synchronization stage consists of finding and ordering available components for insertion. One of the main challenges is to propose an effective synchronization method that defines an order on mesh components. In our work, we propose to use mesh vertices, specifically their geometric representation in space, as basic components for synchronization and embedding. We present three new synchronisation methods based on the construction of a Hamiltonian path in a vertex cloud. Two of these methods jointly perform the synchronization stage and the embedding stage. This is possible thanks to two new high-capacity embedding methods (from 3 to 24 bits per vertex) that rely on coordinates quantization. In this work we also highlight the constraints of this kind of synchronization. We analyze the different approaches proposed with several experimental studies. Our work is assessed on various criteria including the capacity and imperceptibility of the embedding method. We also pay attention to security aspects of the proposed methods
Lamielle, S. "Contribution à la compréhension du comportement de l'abdomen lors d'un chargement dynamique frontal par une ceinture de sécurité." Phd thesis, Université Claude Bernard - Lyon I, 2008. http://tel.archives-ouvertes.fr/tel-00543990.
Повний текст джерелаBeugnon, Sébastien. "Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS097.
Повний текст джерелаWith the increase of data exchange and latest technological and social developments, multimedia contents are becoming an important part of global trafic. Today, 3D objects are used in a large number of applications, for example, medical applications, simulations, video games, animation and special effects. 3D object usage by the general public has become a lucrative market that can take the form of 3D object downloading platforms with various 3D formats.This thesis, in collaboration with the company STRATEGIES, concerns the 3D object protection, and more particularly 3D meshes against fradulent and illegal uses. These 3D meshes represent surface models of shoes and leather goods produced by customers using digital solutions proposed by STRATEGIES. First, we propose a new method to insert secret data much more efficiently in terms of execution time on very large meshes than the previous method developed in collaboration with the company STRATEGIES. We are also exploring selective encryption approaches to control access to very high quality content according to user needs. In this context, we propose to use selective encryption approaches on the geometric data of 3D objects in order to protect the visual content of these objects according to different use cases and different data representations.In a second research axis, we study the application of secret sharing methods to the domain of 3D objects. Secret sharing is an approach that seeks to divide secret content between multiple users and allows certain subgroups of users to reconstruct the secret. Secret sharing is a redundancy system that allows you to reconstruct the secret even if some users have lost their information. Secret 3D object sharing is a poorly researched domain used to protect a 3D object between collaborators. We propose new secret 3D object sharing methods using selective encryption approaches and providing hierarchical properties where users have different access rights to 3D content based on their position in a hierarchical structure.Finally, the third research axis developed in this thesis deals with the analysis of the visual confidentiality of 3D objects selectively encrypted more or less strongly. Indeed, depending on the scenario, our 3D selective encryption methods provide results that can be more or less recognizable by users. However, the metrics used to evaluate the quality of 3D objects do not distinguish two selectively encrypted 3D objects with different levels of confidentiality. So, we present the construction of a databse of selectively encrypted 3D objects in order to realize subjective assessments of visual confidentiality and try to build a new metric correlated with evaluations obtained by the human visual system
Toulminet, Gwenaëlle. "Extraction des contours 3D des obstacles par stéréovision pour l'aide à la conduite automobile." INSA de Rouen, 2002. http://www.theses.fr/2002ISAM0011.
Повний текст джерелаJansen, van rensburg Bianca. "Sécurisation des données 3D par insertion de données cachées et par chiffrement pour l'industrie de la mode." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMONS044.
Повний текст джерелаOver the last few decades, 3D objects have become an essential part of everyday life, in both private and professional contexts. These 3D objects are often stored on the cloud and transferred over networks many times during their existence, where they are susceptible to malicious attacks. Therefore, 3D object security, such as encryption or data hiding, is essential. Encryption is used to protect the visual confidentiality of the 3D object's content. Selective encryption schemes can also be used, where part of a component, such as a part of each vertex, is encrypted. Data hiding is generally used to protect the copyright or the authenticity of the 3D object. However, when a 3D object is encrypted, a third party such as a server may need to embed data in the confidential 3D object. In this case, data hiding in the encrypted domain is performed. In many applications, 3D objects often consist of millions of vertices, and so storing and sharing them online is expensive, time consuming and not environmentally friendly. Consequently, 3D object compression is essential. In this work, we present three contributions in different research areas. First, we present our work on a new method to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method allows us to embed several secret messages in the encrypted domain with a high-capacity. These messages can be extracted in the plaintext domain after the 3D object decryption. To the best of our knowledge, we are the first to propose a data hiding method in the encrypted domain where the high-capacity watermark is conserved in the plaintext domain after the 3D object is decrypted. The encryption and the data hiding in the encrypted domain are format compliant and without size expansion, despite the use of the Paillier cryptosystem. Then, we present our work on an evaluation metric for the visual security level of selectively encrypted 3D objects. We present a new dataset composed of evaluated selectively encrypted 3D objects. We propose a model to determine the security parameters according to a desired security level. Finally, we detail our proposed 3DVS score which serves to measure the visual security level of selectively encrypted 3D objects. We also present a method which allows us to hierarchically decrypt an encrypted 3D object according to a generated ring of keys. This ring consists of a set of keys that allow a stronger or weaker decryption of the encrypted 3D object. Each hierarchically decrypted 3D object has a different visual security level, where the 3D object is more or less visually accessible. Our method is essential when it comes to preventing trade secrets from being leaked from within a company or by exterior attackers. It is also ecologically friendly and more secure than traditional selective encryption methods. Finally, we present our work on joint security and compression methods based on Google's 3D object compression method Draco, where we integrate a security step in Draco, which is becoming the new industry standard. These security steps are encryption, selective encryption and watermarking
Song, Qiang. "Design of synthetic diffractive structures for 3D visualization applications and their fabrication by a novel parallel-write two-photon polymerization process." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0199.
Повний текст джерелаDiffractive Optical Elements (DOEs) are now widely used in academic and industrial applications due to their ultrathin, compact characteristics and their highly flexible manipulation of light wave-fronts. Despite these excellent properties, the scope of DOE applications is often limited by the fact that most DOEs are designed to generate only 2D projected patterns, and even more importantly, for use only with monochromatic, coherent, often collimated, laser sources. The cost and eye safety constraints of laser sources severely restrict DOE visualisation applications such as security holograms, and the 2D nature of the generated patterns limits virtual or augmented reality applications. To overcome these restrictions, this thesis targets the design and fabrication of wavelength selective 3D diffractive structures which can produce a perceived multiple view-angle “floating” 3D object behind the DOE substrate when illuminated by readily available and cheap white LED sources. In an initial approach we develop and experimentally validate a series of novel design algorithms for conventional optically “thin” DOE structures under incoherent, divergent illumination; first to project 2D patterns, then to create virtual 2D images and finally virtual 3D patterns. In a second stage, we leverage the capacities of optically “thick”, Bragg-like structures to introduce spectral selectivity (towards colour output patterns) and improve diffraction. Since the thin element approximation is invalid when designing optically thick 3D photonic structures we develop a particle swarm optimization algorithm based on a rigorous diffraction model to design highly innovative optically thick synthetic diffractive structures. The cost-effective fabrication of such proposed fully 3Dmicro- and nano-photonics structures is highly challenging when using current traditional lithographic techniques which are generally limited, in practice, to the fabrication of 2D or 2.5D structures. To this end, an advanced prototype massively parallelized two-photon polymerization (2PP) photoplotter for the fabrication of large area fully 3D photonic structures is currently being developed by the IMT Atlantique Optics Department. We present our contributions to the design and development of the critical, high uniformity illumination modules for the new prototype 2PP photoplotter. The research and development in this thesis contributes to the broadening of DOE applications to fields which are currently inaccessible. The developed design methods can also find applications in holographic display fields such as automotive augmented reality
Ab, Wahid Mastura. "Flight guidance along 3D+T trajectories and space indexed traffic management." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30196/document.
Повний текст джерелаWith the increase in air traffic, surely a question of flight efficiency (delays), environment impact and safety arise. This calls for improvements in accuracy of spatial and temporal trajectory tracking. The first main objective of this thesis is to contribute to the synthesis of a space-indexed nonlinear guidance control law for transportation aircraft presenting enhanced tracking performances and to explore the performances and feasibility of a flight guidance control law which is developed based on a space-indexed reference to track a 3D+T reference trajectory using nonlinear dynamic inversion control. The proposed guidance control law present reduced tracking errors and able to meet more easily overfly time constraints. Before presenting the main approaches for the design of the 3D+T guidance control laws; the modern flight guidance and flight dynamics of transportation aircraft, including explicitly wind components are first introduced. Then, a description of the current and modern air traffic organization including the organization of air traffic in high density flow will be shown and this will lead to a description of the Airstreams concept. This proposed concept is to organize main traffic flows in congested airspace along airstreams which are characterized by a three dimensional (3D) common reference track (ASRT). Finally, a scenario to perform basic maneuvers inside the airstream following a 3D+T trajectory using a common space-indexed will be developed and will be used to illustrate the traffic management along an airstream
Moreau, Baptiste. "Modélisation statistique de la géométrie 3D de la cage thoracique à partir d'images médicales en vue de personnaliser un modèle numérique de corps humain pour la biomécanique du choc automobile." Thesis, Montpellier, 2018. http://www.theses.fr/2018MONTS030/document.
Повний текст джерелаRoad safety is a major issue of public health and personal safety. According to the World Health Organization (WHO), nearly 1.2 million people die each year worldwide due to road accidents (2015). According to accident data, 36.7% of serious injuries are caused by thoracic injuries (Page et al., 2012). The aim of biomechanics in passive safety is to improve our understanding of the human body in order to build better tools for assessing the risk of injury.Numerical human body models are used to virtually simulate the conditions of an accident. Today, they are increasingly used by car manufacturers and equipment manufacturers to better understand injury mechanisms. However, they exist only in few sizes and do not take into account the morphological variations observed in the population.3D medical imaging gives access to the geometries of the different anatomical structures that make up the human body. Today, hospitals are full of 3D images covering a very large part of the population in terms of age, body size and sex.The overall objective of this thesis is to statistically model the 3D geometry of the rib cage from medical images in order to personalize a numerical human body model to simulate car crash conditions.The first objective is to develop a segmentation process based on CT-scans in order to obtain geometric data adapted to the construction of a statistical model of shape of the rib cage.The second objective is to build a statistical model of the shape of the rib cage, taking into account its articulated structure.The third objective is to use the statistical model of the rib cage to deform a numerical human body model, in order to study the influence of certain parameters on the risk of injury
Baklouti, Zeineb. "Système de planification de chemins aériens en 3D : préparation de missions et replanification en cas d'urgence." Thesis, Valenciennes, 2018. http://www.theses.fr/2018VALE0033.
Повний текст джерелаHelicopter flight planning is a key factor in the aeronautics domain in order to ensure a safe mission at a reduced cost taking into consideration different environmental parameters like terrain, weather, emergency situations, etc. This challenge concerns both the mission preparation phase using a ground station and also during the flight to cope with a complex event (mechanical failure, dynamic obstacle, bad weather conditions, etc.). We quote as a first example a Search and Rescue mission that should be performed in limited time to locate persons in danger. To achieve that, the generated flight path must follow the terrain profile at relatively low altitudes crossing the predefined waypoints. The objective is to allow the pilot to locate a victim in a short time. Another example for a mission of medical assistance where the helicopter should ensure the comfort of patients as well as minimizing the flight time to respect critical situations. During the flight, when a complex event occurs such as engine failure, re-planning the mission becomes necessary in order to find a new path that could guarantee safe landing. Unfortunately, pilots do not benefit from an embedded 3D path planning system that enables dynamic mission re-planning in case of emergency. To tackle the challenge of generating an optimal flight plan, we proposed new path planning system dedicated to mission preparation and dynamic path re-planning during critical situations. The planning system can be deployed on a ground station or embedded as an avionic function in the aircraft. The achieved results are registered as a patent at National Institute of Intellectual Property and deployed inside Airbus Helicopters through several technology transfers. The system relies on 3D space discretization and shortest path planning techniques to generate automatically flexible path profiles that respect several. The proposed solution is generic and is able to adapt to the aircraft model, mission and the objective function to be minimized. The path planning system can offer solutions with different tradeoffs between timing and path quality within the available runtime depending on the criticality of the situation. The functioning of the path planning system consists mainly of two phases : preprocessing and routing phase. The preprocessing allows a multi-altitude discretization of the 3D space according to a given precision and generate automatically a navigation graph with a configurable density. The 3D routing phase calculates the path by considering a set of constraints such as horizontal and vertical angular limitations and the objective function such as distance, fuel, time, etc. During the graph exploration phase, the path planning system can communicate with the aircraft performance model to evaluate a given criterion. Automatic flight path generation is an essential building block for designing pilot assistance systems and autonomous aircraft. In summary, we succeeded to reach the industrial expectations namely : the evaluation of mission feasibility, performances improvement, navigation workload reduction, as well as improving the flight safety. In order to realize the proposed solution, we designed a new tool for automatic 3D flight path planning. We named our tool DTANAV : Demonstration Tool for Aircraft NAVigation. It allows to apply the proposed planning process on real scenarios. Through the tool interface, the user has the possibility to set the parameters related to the mission (starting point, end point, aircraft model, navigation ceiling, etc.). Other algorithmic parameters are defined in order to control the quality and the profile of the generated solution
Lyonnet, Florian. "Modélisation du Contrôle Non Destructif ultrasonore de tubes métalliques pour l’activité nucléaire : approche 3D, confrontation à l’expérience et prise en compte de différentes géométries de défauts réels." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS566.
Повний текст джерелаReagrding the safety of civil nuclear installations, the metallic cladding that contains the fissile material has a great significance. Before filling, each tube is controlled by means of an automated ultrasonic inspection. For the French manufacturer Framatome, improving this process can have a positive impact on both quality and productivity. Since 2010, Framatome is conducting a project for the development of a numerical model of its ultrasonic inspection. In this work we propose a 3D model based on three independent steps which allows the re-utilization of optimized calculations. This model is able to simulate the echoes recorded during the inspection of a flawed product. We present a decoupling between the calculation of the flaw diffracted field and the incident field in the pipe. Our model uses both a semi-analytical method and a Finite Difference method to assess the reference computations of several flaws and several control configurations (inspection angle). A highly parallelized coupling code is proposed to reconstruct the echo signals from the reference fields. The improvement in term of computation time is evaluated and the results are compared with experimental results measured on an automated ultrasonic bench
Amat, Philippe. "Digitalisation sécurisée d'objets 3D : application aux formes et aux lignes de style de chaussures." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2008. http://tel.archives-ouvertes.fr/tel-00320765.
Повний текст джерелаAlves, de Lima Danilo. "Sensor-based navigation applied to intelligent electric vehicles." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2191/document.
Повний текст джерелаAutonomous navigation of car-like robots is a large domain with several techniques and applications working in cooperation. It ranges from low-level control to global navigation, passing by environment perception, robot localization, and many others in asensor-based approach. Although there are very advanced works, they still presenting problems and limitations related to the environment where the car is inserted and the sensors used. This work addresses the navigation problem of car-like robots based on low cost sensors in urban environments. For this purpose, an intelligent electric vehicle was equipped with vision cameras and other sensors to be applied in three big areas of robot navigation : the Environment Perception, Local Navigation Control, and Global Navigation Management. In the environment perception, a 2D and 3D image processing approach was proposed to segment the road area and detect the obstacles. This segmentation approach also provides some image features to local navigation control.Based on the previous detected information, a hybrid control approach for vision based navigation with obstacle avoidance was applied to road lane following. It is composed by the validation of a Visual Servoing methodology (deliberative controller) in a new Image-based Dynamic Window Approach (reactive controller). To assure the car’s global navigation, we proposed the association of the data from digital maps in order tomanage the local navigation at critical points, like road intersections. Experiments in a challenging scenario with both simulated and real experimental car show the viabilityof the proposed methodology