| Recompression of JPEG crypto-compressed images without a key V Itier, P Puteaux, W Puech IEEE Transactions on Circuits and Systems for Video Technology 30 (3), 646-660, 2019 | 57 | 2019 |
| Dimensionality reduction through convolutional autoencoders for fracture patterns prediction K Shinde, V Itier, J Mennesson, D Vasiukov, M Shakoor Applied Mathematical Modelling 114, 94-113, 2023 | 28 | 2023 |
| High capacity data hiding for 3D point clouds based on static arithmetic coding V Itier, W Puech Multimedia Tools and Applications 76 (24), 26421-26445, 2017 | 23 | 2017 |
| Color noise correlation-based splicing detection for image forensics V Itier, O Strauss, L Morel, W Puech Multimedia Tools and Applications 80 (9), 13215-13233, 2021 | 21 | 2021 |
| Tucker decomposition based on a tensor train of coupled and constrained CP cores M Giraud, V Itier, R Boyer, Y Zniyed, ALF de Almeida IEEE Signal Processing Letters 30, 758-762, 2023 | 12 | 2023 |
| Color noise-based feature for splicing detection and localization C Destruel, V Itier, O Strauss, W Puech 2018 IEEE 20th International Workshop on Multimedia Signal Processing (MMSP …, 2018 | 12 | 2018 |
| Unsupervised JPEG domain adaptation for practical digital image forensics R Abecidan, V Itier, J Boulanger, P Bas 2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021 | 11 | 2021 |
| Joint synchronization and high capacity data hiding for 3D meshes V Itier, W Puech, G Gesquiere, JP Pedeboy Three-Dimensional Image Processing, Measurement (3DIPM), and Applications …, 2015 | 10 | 2015 |
| Cryptanalysis aspects in 3-D watermarking V Itier, W Puech, AG Bors 2014 IEEE International Conference on Image Processing (ICIP), 4772-4776, 2014 | 9 | 2014 |
| Using set covering to generate databases for holistic steganalysis R Abecidan, V Itier, J Boulanger, P Bas, T Pevný 2022 IEEE International Workshop on Information Forensics and Security (WIFS …, 2022 | 8 | 2022 |
| Visual saliency-based confidentiality metric for selective crypto-compressed JPEG images N Le Philippe, V Itier, W Puech 2017 IEEE International Conference on Image Processing (ICIP), 4347-4351, 2017 | 8 | 2017 |
| Leveraging data geometry to mitigate csm in steganalysis R Abecidan, V Itier, J Boulanger, P Bas, T Pevný 2023 IEEE International Workshop on Information Forensics and Security (WIFS …, 2023 | 7 | 2023 |
| 3D Watermarking S Beugnon, V Itier, W Puech Multimedia Security 1: Authentication and Data Hiding, 219-246, 2022 | 6 | 2022 |
| Construction of a unique robust hamiltonian path for a vertex cloud V Itier, W Puech, JP Pedeboy, G Gesquière 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP …, 2013 | 6 | 2013 |
| Highcapacity data-hiding for 3D meshes based on static arithmetic coding V Itier, W Puech, JP Pedeboy 2015 IEEE International Conference on Image Processing (ICIP), 4575-4579, 2015 | 5 | 2015 |
| Combining forensics and privacy requirements for digital images P Puteaux, V Itier, P Bas 2021 29th European Signal Processing Conference (EUSIPCO), 806-810, 2021 | 4 | 2021 |
| Interval-valued JPEG decompression for artifact suppression V Itier, F Kucharczak, O Strauss, W Puech 2018 Eighth International Conference on Image Processing Theory, Tools and …, 2018 | 4 | 2018 |
| How to recompress a JPEG crypto-compressed image? V Itier, W Puech Electronic Imaging 29, 36-43, 2017 | 3 | 2017 |
| Analysis of an EMST-based path for 3D meshes V Itier, N Tournier, W Puech, G Subsol, JP Pedeboy Computer-Aided Design 64, 22-32, 2015 | 3 | 2015 |
| Semantic correspondence across 3D models for example-based modeling V Léon, V Itier, N Bonneel, G Lavoué, JP Vandeborre Eurographics Workshop on 3D Object Retrieval 2017 (3DOR 2017), 7 pages, 2017 | 2 | 2017 |