4.5 Article

Securing color information of an image by concealing the color palette

Journal

JOURNAL OF SYSTEMS AND SOFTWARE
Volume 86, Issue 3, Pages 809-825

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.jss.2012.11.042

Keywords

Data hiding; Color protection; Color palette scanning; Palette reordering; Digital painting; Cultural heritage

Funding

  1. ANR ARA SSIA (Agence Nationale de la Recherche, Action de Recherche Amont, Securite Systemes Embarques et Intelligence Ambiante) [ANR-05-SSIA-0017-05]

Ask authors/readers for more resources

This paper deals with a method to protect the color information of images by providing free access to the corresponding gray level images. Only with a secret key and the gray level images, it is then possible to view the images in color. The approach is based on a color reordering algorithm after a quantization step. Based on a layer scanning algorithm, the color reordering generates gray level images and makes it possible to embed the color palette into the gray level images using a data hiding algorithm. This work was carried out in the framework of a project aimed at providing limited access to the private digital painting database of the Louvre Museum in Paris, France. (C) 2012 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Color noise correlation-based splicing detection for image forensics

Vincent Itier, Olivier Strauss, Laurent Morel, William Puech

Summary: This paper proposes a method to detect and localize image tampering by analyzing the correlation of image noise across the RGB color channels. By detecting blocks spanning across two areas with different color noise correlations and introducing a learning phase using a Random Forest Classifier, the experimental results on the Columbia database show very good results compared to other state-of-the-art methods.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Review Entomology

The challenge of biological control of Cosmopolites sordidus Germar (Col. Curculionidae): A review

Paul Tresson, Philippe Tixier, William Puech, Dominique Carval

Summary: The banana weevil, a major pest of banana and plantain, poses challenges for biological control due to its behavior and resistance. Traditional methods have limitations, leading to a shift towards conservation biological control with a focus on ants. There is currently a lack of information on the role of vertebrates in regulating the banana weevil.

JOURNAL OF APPLIED ENTOMOLOGY (2021)

Article Computer Science, Information Systems

A survey of reversible data hiding in encrypted images-The first 12 years

Pauline Puteaux, SimYing Ong, KokSheik Wong, William Puech

Summary: This article discusses the issues involved in handling encrypted multimedia data, with a focus on reversible data hiding in encrypted images. It summarizes the birth and evolution of these methods over the past 12 years and provides insights into future applications and research topics in the field.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2021)

Article Biodiversity Conservation

Leveraging social media and deep learning to detect rare megafauna in video surveys

Laura Mannocci, Sebastien Villon, Marc Chaumont, Nacim Guellati, Nicolas Mouquet, Corina Iovan, Laurent Vigliola, David Mouillot

Summary: The study proposes a method to use social media videos for training deep-learning models to detect rare megafauna species in the field, demonstrating that social media images can effectively train deep-learning models, and the addition of a small number of field images can significantly improve detection accuracy.

CONSERVATION BIOLOGY (2022)

Article Engineering, Electrical & Electronic

CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images

Pauline Puteaux, William Puech

Summary: This article introduces a new encryption mode called CFB-then-ECB, and proposes a new method for correcting noisy encrypted images, which can correct incorrect pixel blocks in encrypted images while preserving image structure without increasing data size.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2021)

Article Computer Science, Information Systems

The First Draco 3D Object Crypto-Compression Scheme

Bianca Jansen Van Rensburg, William Puech, Jean-Pierre Pedeboy

Summary: 3D objects are crucial in industry and often need to be compressed, especially for web uploads and real-time rendering. Google's Draco system is becoming the industry standard for compressing geometric mesh or point cloud structured 3D objects. This paper proposes a new method that integrates encryption into Draco compression by adding an AES encryption step. The proposed method is efficient and results in a reconstructed 3D object identical to standard Draco compression.

IEEE ACCESS (2022)

Article Biodiversity Conservation

Putting eagle rays on the map by coupling aerial video-surveys and deep learning

L. Desgarnier, D. Mouillot, L. Vigliola, M. Chaumont, L. Mannocci

Summary: This study utilized deep learning technology to automatically detect and map vulnerable eagle rays in aerial videos, offering a potential breakthrough for monitoring ray populations in coral reef ecosystems.

BIOLOGICAL CONSERVATION (2022)

Article Astronomy & Astrophysics

Mitigation Strategies to Improve Reproducibility of Poverty Estimations From Remote Sensing Images Using Deep Learning

J. Machicao, A. Ben Abbes, L. Meneguzzi, P. L. P. Correa, A. Specht, R. David, G. Subsol, D. Vellenich, R. Devillers, S. Stall, N. Mouquet, M. Chaumont, L. Berti-Equille, D. Mouillot

Summary: The challenges of reproducibility and replicability in computer science experiments, particularly those involving deep learning techniques, have attracted attention in recent years. This article evaluates the reproducibility of three deep learning experiments analyzing visual indicators from satellite and street imagery, and proposes a checklist to improve reproducibility based on FAIR principles.

EARTH AND SPACE SCIENCE (2022)

Letter Dermatology

A deep-learning algorithm to localize basal cell carcinoma foci on Mohs surgery frozen sections

Hugo Bonnefille, Marwan Abbas, Pascal Roger, Francois Habib, Farzaneh Masset, Marc Chaumont, Gerard Subsol, Pierre E. Stoebner

JOURNAL OF THE EUROPEAN ACADEMY OF DERMATOLOGY AND VENEREOLOGY (2023)

Article Computer Science, Information Systems

3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain

Bianca Jansen Van Rensburg, Pauline Puteaux, William Puech, Jean-Pierre Pedeboy

Summary: In this article, a new method is proposed to obtain a watermarked 3D object from high-capacity data hiding in the encrypted domain. The method utilizes the homomorphic properties of the Paillier cryptosystem and allows embedding multiple secret messages in the encrypted domain, which can be extracted in the plain-text domain after decryption.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2023)

Article Astronomy & Astrophysics

Astronomical image time series classification using CONVolutional attENTION (ConvEntion)

Anass Bairouk, Marc Chaumont, Dominique Fouchez, Jerome Paquet, Frederic Comby, Julian Bautista

Summary: The treatment of astronomical image time series has gained attention due to the increase in surveys and the availability of large amounts of data. This study proposes a deep learning approach called ConvEntion for classifying space objects directly using images. The results show an increase in classification accuracy compared to state-of-the-art approaches.

ASTRONOMY & ASTROPHYSICS (2023)

Article Engineering, Electrical & Electronic

A Secret JPEG Image Sharing Method Over GF(2M) Galois Fields

Pauline Puteaux, Felix Yriarte, William Puech

Summary: With the rise of cloud and social networks, JPEG images have become important in image transmission and storage. This paper proposes a secret JPEG image sharing approach that ensures visual security and solves the issue of secret key loss. It uses Shamir's secret sharing scheme over Galois fields during the JPEG Huffman coding step.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Computer Science, Information Systems

From Diffusion to Confusion of RGB Pixels Using a New Chaotic System for Color Image Encryption

Salma Ben Mamia, Pauline Puteaux, William Puech, Kais Bouallegue

Summary: Over the past decade, the transmission and archiving of images over digital and social networks has greatly increased. To ensure their security, a new color image encryption scheme based on a single scroll chaotic system is proposed in this paper, using neurons with two dendrites. Three different approaches are developed based on this scheme, demonstrating that color pixel component scrambling can act as both a permutation and a substitution, ensuring confusion and diffusion properties. Experimental results show that encrypted color images can be efficiently obtained using the proposed scheme, with comparable attack analyses to current state-of-the-art methods.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Hierarchical Classification of Very Small Objects: Application to the Detection of Arthropod Species

Paul Tresson, Dominique Carval, Philippe Tixier, William Puech

Summary: The study introduces a robust method based on hierarchical classification for performing small object detection in the presence of constraints in biological datasets. The proposed method outperforms a global detector in terms of less confusion between classes, smaller impact, and obtaining a higher mAP.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A Recursive Reversible Data Hiding in Encrypted Images Method With a Very High Payload

Pauline Puteaux, William Puech

Summary: The proposed method in this study introduces a new technique for reversible data hiding in encrypted images with high payload, involving recursive processing of all bit-planes in the image, prediction errors, reversible adaptation, encryption, and embedding without the need for preprocessing steps.

IEEE TRANSACTIONS ON MULTIMEDIA (2021)

Review Computer Science, Software Engineering

A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, M. Ali Babar

Summary: This study provides a comprehensive view of the challenges and critical success factors in the design, implementation, and evaluation stages of phishing education, training, and awareness (PETA). The findings highlight the need to address human-centric issues, bridge users' knowledge gaps, and adopt personalized approaches to enhance defense against phishing attacks.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Performability evaluation of NoSQL-based storage systems☆

Carlos Araujo, Meuse Oliveira Jr., Bruno Nogueira, Paulo Maciel, Eduardo Tavares

Summary: This paper proposes a method based on stochastic Petri nets for evaluating the consistency levels of storage systems based on NoSQL DBMS. The method takes into account different consistency levels and redundant nodes, and estimates the system's availability, throughput, and the probability of accessing the newest data. Experimental results demonstrate the practical feasibility of this approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Review Computer Science, Software Engineering

Monitoring tools for DevOps and microservices: A systematic grey literature review

L. Giamattei, A. Guerriero, R. Pietrantuono, S. Russo, I. Malavolta, T. Islam, M. Dinga, A. Koziolek, S. Singh, M. Armbruster, J. M. Gutierrez-Martinez, S. Caro-Alvaro, D. Rodriguez, S. Weber, J. Henss, E. Fernandez Vogelin, F. Simon Panojo

Summary: This article presents the results of a systematic study on the available monitoring tools for DevOps and microservices. It provides a classification and analysis of these tools, aiming to be a useful reference for researchers and practitioners in this field.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Harmonizing DevOps taxonomies - A grounded theory study

Jessica Diaz, Jorge Perez, Isaque Alves, Fabio Kon, Leonardo Leite, Paulo Meirelles, Carla Rocha

Summary: This paper presents empirical research on the structure of DevOps teams in software-producing organizations to better understand the organizational structure and characteristics of teams adopting DevOps. A theory of DevOps taxonomies is built through analysis, and its consistency with other taxonomies is tested.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Managing the changing understanding of benefits in software initiatives

Sinan Sigurd Tanilkan, Jo Erskine Hannay

Summary: When deciding to develop new software, it is important to have a clear understanding of the intended benefits. However, our research shows that stakeholders' understanding of benefits often fluctuates during the development process, leading to uncertainty. Therefore, we recommend focusing on helping practitioners embrace changes in their understanding of benefits.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Detecting security vulnerabilities with vulnerability nets

Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang

Summary: This paper presents an approach that combines static analysis tools and manual audits to effectively detect various types of security vulnerabilities. By using a special Petri net representation, the proposed method is able to assist in the detection of taint-style vulnerabilities.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Early analysis of requirements using NLP and Petri-nets

Edgar Sarmiento-Calisaya, Julio Cesar Sampaio do Prado Leite

Summary: This research introduces an automated requirements analysis approach that combines natural language processing, Petri-nets, and visualization techniques to improve the quality of scenario-based specifications, identify defects, and anticipate inconsistencies.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Trace matrix optimization for fault localization

Jian Hu

Summary: This paper proposes a two-stage trace matrix optimization method for fault localization, which addresses the challenges of coincidental correctness and data imbalance in the current trace matrix. Through extensive experiments, significant improvements in fault localization effectiveness are demonstrated.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Hierarchical features extraction and data reorganization for code search

Fan Zhang, Manman Peng, Yuanyuan Shen, Qiang Wu

Summary: This study proposes a novel method called HFEDR that utilizes the hierarchical features of Transformer models and reorganizes training data to improve code search performance. Experimental results demonstrate the effectiveness and rationality of the proposed approach.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

EsArCost: Estimating repair costs of software architecture erosion using slice technology

Tong Wang, Bixin Li

Summary: Software architecture erosion has a negative impact on software quality, performance, and evolution cost. This paper proposes an approach called EsArCost to locate the causes of architecture erosion and estimate the repair cost of each erosion problem. Experimental results show that EsArCost can effectively and efficiently estimate repair costs.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

SYNTONY: Potential-aware fuzzing with particle swarm optimization

Xiajing Wang, Rui Ma, Wei Huo, Zheng Zhang, Jinyuan He, Chaonan Zhang, Donghai Tian

Summary: This paper proposes a new potential-aware fuzzing scheme called SYNTONY that measures seed potential using multiple objectives and prioritizes promising seeds to increase the number of unique crashes and coverage. Experimental results show that SYNTONY outperforms other fuzzing tools and has high compatibility and expansibility.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

An Empirical Investigation Into the Influence of Software Communities' Cultural and on

Stefano Lambiase, Gemma Catolino, Fabiano Pecorelli, Damian A. Tamburri, Fabio Palomba, Willem-Jan van den Heuvel, Filomena Ferrucci

Summary: This paper contributes to the existing body of knowledge on factors affecting productivity in software development by studying the cultural and geographical dispersion of a development community. The results show that cultural and geographical dispersion significantly impact productivity, suggesting that managers and practitioners should consider these aspects throughout the software development lifecycle.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

The effects of required security on software development effort

Elaine Venson, Bradford Clark, Barry Boehm

Summary: The software industry has been under pressure to adopt security practices and reduce software vulnerabilities. This study quantifies the effort required to develop secure software in increasing levels of rigor and scope and provides validated cost multipliers for practitioners to estimate proper resources for adopting security practices.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Towards an understanding of intra-defect associations: Implications for defect prediction

Yangyang Zhao, Mingyue Jiang, Yibiao Yang, Yuming Zhou, Hanjie Ma, Zuohua Ding

Summary: Previous studies have ignored the potential associations between modules involved in the same defect, and this comprehensive study explores the implications of intra-defect associations for defect prediction. The majority of defects occur across functions, with implicit dependencies between the modules. By considering intra-defect associations and merging modules, the proposed data processing approach significantly improves defect prediction performance.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)

Article Computer Science, Software Engineering

Learning to empathize with users through design thinking in hybrid mode: Insights from two educational case studies

Meira Levy, Irit Hadar

Summary: This research sheds new light on how students learn and practice hybrid work in educational settings through two educational studies. The findings show the benefits of new educational programs in fostering empathy and innovation among students, while also highlighting the challenges and opportunities in addressing real challenges.

JOURNAL OF SYSTEMS AND SOFTWARE (2024)