Stego sensitivity measure and multibit plane based steganography using different color models, Security, Steganography, and Watermarking of Multimedia Contents VIII ,
DOI : 10.1117/12.643691
steganography " hidden images, a new challenge in the fight against child porn, UPDATE, vol.13, issue.2, 2000. ,
Steganalysis based on image quality metrics, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564), pp.523-531, 2001. ,
DOI : 10.1109/MMSP.2001.962785
Public-Key Steganography with Active Attacks, Proc. 2nd Theory of Cryptography Conference, pp.210-226, 2005. ,
DOI : 10.1007/978-3-540-30576-7_12
Reconstruction des turbo-codes, 2003. ,
Reconstruction of turbo-code encoders, Proc. SPIE Security and Defense, Space Communication Technologies Symposium, pp.463-473, 2005. ,
La stéganographie moderne : d'Hérodotè a nos jours, Computer & Electronics Security Application Rendez-vous, 2007. ,
Practical Insecurity for Effective Steganalysis, Proc. of 10th International Workshop on Information Hiding, 2008. ,
DOI : 10.1007/11922841_21
Procédés d'´ emission et de réception de données d ainsi que des données supplémentaires d ? et dispositifs associés, 2006. ,
Procédés d'´ emission et de réception d'un message numérique et dispositifs associés, 2006. ,
Camion : Reconstruction de permutations, Proc. MAJECS- TIC'03, 2003. ,
New features for specific JPEG ,
Universal JPEG Steganalysis in the Compressed Frequency Domain, Proc. Digital Watermarking , 5th International Workshop, pp.253-267, 2006. ,
DOI : 10.1007/11922841_21
Universal Detection of JPEG Steganography, Journal of Multimedia, vol.2, issue.2, pp.1-9, 2007. ,
DOI : 10.4304/jmm.2.2.1-9
Steganalysis of Multi Bit Plane Image Steganography, Proc. of Digital Watermarking, 6th International Workshop, 2007. ,
DOI : 10.1007/3-540-45496-9_21
Algebraic approach for the reconstruction of linear and convolutional error correcting codes, Proc. 3rd International Conference on Computer Science and Engineering CISE 2006, pp.66-71, 2006. ,
Handbook of coding theory, Complexity Issues in Coding Theory, vol.1, issue.7, pp.649-754, 1998. ,
Pseudo-random recursive convolutional coding for near-capacity performance, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference, pp.23-27, 1993. ,
DOI : 10.1109/GLOCOM.1993.318422
Attention, une image peut en cacher une autre. Lci, septembre, 2001. ,
High-rate punctured convolutional codes: structure properties and construction technique, IEEE Transactions on Communications, vol.37, issue.12, pp.1381-1385, 1989. ,
DOI : 10.1109/26.44210
Further results on high-rate punctured convolutional codes for Viterbi and sequential decoding, IEEE Transactions on Communications, vol.38, issue.11, p.38, 1990. ,
DOI : 10.1109/26.61470
Rogaway : A concrete security treatment of symmetric encryption : Analysis of the DES modes of operation, Proc. 38th Symposium on Foundations of Computer Science FOCS, 1997. ,
Design of parallel concatened convolutional codes, IEEE Transactions on Communications, COMM, issue.5, pp.44591-600, 1996. ,
Unveiling turbo codes: some results on parallel concatenated coding schemes, IEEE Transactions on Information Theory, vol.42, issue.2, pp.42-409, 1996. ,
DOI : 10.1109/18.485713
Algebraic Coding Theory, 1968. ,
DOI : 10.1142/9407
On the inherent intractability of certain coding problems (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.3, p.24, 1978. ,
DOI : 10.1109/TIT.1978.1055873
Codes and Turbocodes, 2007. ,
DOI : 10.1002/9780470612422.ch5
Near Shannon limit errorcorrecting coding and decoding : turbo-codes, Proc. of ICC 1993, 1993. ,
DOI : 10.1109/icc.1993.397441
New Directions in Statistical Signal Processing -From Systems to Brains., chapitre Turbo Processing, 2006. ,
Probability and Measure. Probability and mathematical statistics, 1995. ,
Graphics File Formats, reference and guide. Manning, 1995. ,
Da Vinci Code, 2004. ,
Forteresse Digitale. Jean-Claude Lattès, février, 2007. ,
Blind estimation of encoder and interleaver characteristics in a non cooperative context, Proc. IASTED International Conference on Communications, Internet and Information Technology, 2003. ,
An information-theoretic model for steganography, Proc. Information Hiding, 2nd International Workshop, volume 1525 de Lecture Notes in Computer Science, pp.306-318, 1998. ,
An information-theoretic model for steganography. Information and Computation, pp.41-56, 2004. ,
Digital steganography ´ editeur : Encyclopedia of Cryptography and Security, 2005. ,
Puntured convolutional codes of rate n?1 n and simplified maximum likehood decoding, IEEE Transactions on Information Theory, p.25, 1979. ,
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511, IEEE Transactions on Information Theory, vol.44, issue.1, pp.44367-378, 1998. ,
DOI : 10.1109/18.651067
Recherche de performance dans l'algorithmique des corps finis. Applicationsàplications`plicationsà la cryptographie, Thèse de doctorat, ´ Ecole Polytechnique, 1996. ,
Data hiding capacity in the presence of an imperfectly known channel, Proc. SPIE Security and Watermarking of Multimedia Contents II, 2001. ,
Mathematical theory for steganalysis, Proc. SPIE Security and Watermarking of Multimedia Contents IV, 2002. ,
Image Steganography and Steganalysis: Concepts and Practice, Proc. Digital Watermarking, Second International Workshop, IWDW 2003, pp.35-49, 2003. ,
DOI : 10.1007/978-3-540-24624-4_3
Steganography capacity : A steganalysis perspective, Proc. SPIE, Security and Watermarking of Multimedia Contents V, pp.173-177, 2003. ,
Hiding the hidden: A software system for concealing ciphertext as innocuous text, Thèse de doctorat, 1997. ,
DOI : 10.1007/BFb0028489
Block code reconstruction using iterative decoding techniques, 2006 IEEE International Symposium on Information Theory, 2006. ,
DOI : 10.1109/ISIT.2006.261971
Reconnaissance d'un code linéaire en bloc en utilisant un algorithme de décodage itératif, Journées Codage et Cryptographie, 2006. ,
Reconnaissance d'un schéma de codage, Thèse de doctorat, ´ Ecole Polytechnique, 2006. ,
Arbres Digitaux et Sources Dynamiques, Thèse de doctorat, 2000. ,
Vallée : Dynamical sources in information theory : a general analysis of trie structures, 1999. ,
Solving linear equations over GF(2): block Lanczos algorithm, Linear Algebra and its Applications, vol.192, pp.33-60, 1993. ,
DOI : 10.1016/0024-3795(93)90235-G
URL : http://doi.org/10.1016/0024-3795(93)90235-g
Solving Homogeneous Linear Equations Over GF(2) via Block Wiedemann Algorithm, Mathematics of Computation, vol.62, issue.205, pp.333-350, 1994. ,
DOI : 10.2307/2153413
Asymptotic Methods in Analysis, 1981. ,
Upper and lower bounds on blackbox steganography, Proc. 2nd Theory of Cryptography Conference (TCC 2005), volume 3378 de Lecture Notes in Computer Science, 2005. ,
Detection of LSB steganography via sample pair analysis, Proc. Information Hiding, 5th International Workshop, volume 2578 de Lecture Notes in Computer Science, pp.355-372, 2002. ,
ETSI Joint Technical Committee Broadcast : Framing structure channel coding and modulation for terrestrial services. Specifications, pp.300-744 ,
ETSI Joint Technical Committee Broadcast : Interaction channel for DVB-S RCS. Specifications, pp.300-958 ,
ETSI Joint Technical Committee Broadcast : Interaction channel for DVB-T RCT. Specifications, pp.300-958 ,
ETSI Joint Technical Committee Broadcast : Framing structure channel coding and modulation for satellites services. Specifications, pp.300-421, 1999. ,
Coding for noisy channels, IRE International Convention Record, pp.37-46, 1955. ,
Detecting hidden messages using higher-order statistical models, Proceedings. International Conference on Image Processing, pp.905-908, 2002. ,
DOI : 10.1109/ICIP.2002.1040098
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.8871
Mellin transforms and asymptotics: Harmonic sums, Theoretical Computer Science, vol.144, issue.1-2, pp.3-58, 1995. ,
DOI : 10.1016/0304-3975(95)00002-E
URL : https://hal.archives-ouvertes.fr/inria-00074307
ContributionàContribution`Contributionà la recherche de fonctions booléennes hautement non linéaires, et au marquage d'images en vue de la protection des droits d'auteur, Thèse de doctorat, 1998. ,
How can Reed-Solomon codes improve steganographic schemes, Proc. International Workshop on Information Hiding, IH'07, 2007. ,
DOI : 10.1007/978-3-540-77370-2_9
URL : https://hal.archives-ouvertes.fr/inria-00504247
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, Lecture Notes in Computer Science, vol.3200, pp.67-81, 2004. ,
DOI : 10.1007/978-3-540-30114-1_6
Detecting LSB steganography in color, and gray-scale images, IEEE Multimedia, vol.8, issue.4, pp.22-28, 2001. ,
DOI : 10.1109/93.959097
Reliable detection of LSB steganography in color and grayscale images, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.27-30, 2001. ,
DOI : 10.1145/1232454.1232466
Steganalysis of JPEG Images: Breaking the F5 Algorithm, Proc. Information Hiding, 5th International Workshop, pp.310-323, 2002. ,
DOI : 10.1007/3-540-36415-3_20
New methodology for breaking steganographic techniques for JPEGs, Proc. SPIE, Security and Watermarking of Multimedia Contents V, pp.143-155, 2003. ,
Writing on wet paper, Special issue " Supplement on Secure Media III, pp.3923-3935, 2005. ,
DOI : 10.1109/TSP.2005.855393
Efficient Wet Paper Codes, Proc. 7th International Workshop on Information Hiding, pp.204-218, 2005. ,
DOI : 10.1007/11558859_16
Wet Paper Codes With Improved Embedding Efficiency, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, pp.102-110, 2006. ,
DOI : 10.1109/TIFS.2005.863487
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.5982
Multiclass blind steganalysis for JPEG images, Proc. SPIE, Security and Watermarking of Multimedia Contents VIII, 2006. ,
Matrix embedding for large payloads, IEEE Transactions on Security and Forensics, vol.1, issue.3, pp.278-294, 2006. ,
Information hiding by coverings, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), pp.151-154, 2003. ,
DOI : 10.1109/ITW.2003.1216717
Convolutional codes I : Algebraic structure, IEEE Transactions on Information Theory, issue.16, pp.720-738, 1970. ,
Structural analysis of convolutional codes via dual codes, IEEE Transactions on Information Theory, IT, vol.19, pp.512-519, 1973. ,
The Viterbi algorithm, Proc. IEEE, pp.268-276, 1973. ,
Minimal bases of rational vector spaces with applications to multivariable linear systems, In SIAM J. Control, vol.13, pp.493-502, 1975. ,
Capacity of a Burst-Noise Channel, Bell System Technical Journal, vol.39, issue.5, pp.1253-1265, 1960. ,
DOI : 10.1002/j.1538-7305.1960.tb03959.x
Channel Coding in Communication Networks : From Theory to Turbo Codes. Digital Signal and Image Processing series, 2005. ,
DOI : 10.1002/9780470612422
Fast Gaussian elimination with partial pivoting for matrices with displacement structure, Mathematics of Computation, vol.64, issue.212, pp.1557-1576, 1995. ,
DOI : 10.1090/S0025-5718-1995-1312096-X
Operator Theory : Advances and Applications, pp.31-88, 1986. ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
DOI : 10.1016/0022-0000(84)90070-9
URL : http://doi.org/10.1016/0022-0000(84)90070-9
Rate compatible punctured convolutional codes and their applications, IEEE Transactions on Communications, p.36, 1988. ,
DOI : 10.1109/26.2763
Kernel Fisher discriminant for steganalysis of JPEG hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VI, 2005. ,
DOI : 10.1117/12.525996
Toward a Theory of Steganography, 2004. ,
On Steganographic Chosen Covertext Security, Proc. International Colloquium on Automata Languages and Programming, pp.311-323, 2005. ,
DOI : 10.1007/11523468_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.3397
Provably Secure Steganography, Proc. Crypto, pp.77-92, 2002. ,
DOI : 10.1007/3-540-45708-9_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1450
Pless : Fundamentals of Error-Correcting Codes, 2003. ,
Specifications, février 2000, IESS, issue.2, p.310 ,
A fast sequential decoding algorithm using a stack. Rapport technique 13, IBM Res. Develop, 1969. ,
Zygangirov : Fundamentals of Convolutional Coding, 1999. ,
Information Hinding -Steganography and watermarking -Attacks and countermeasures, Adavances in Information Security. Kluwer Academic. ISBN, pp.0-7923 ,
DOI : 10.1007/978-1-4615-4375-6
Exploring steganography: Seeing the unseen, Computer, vol.31, issue.2, pp.26-34, 1998. ,
DOI : 10.1109/MC.1998.4655281
The Codebreakers, 1967. ,
Petitcolas : Information Hiding. Techniques for steganography and digital watermarking, Computer Science. Artech House ,
Defining security in steganographic systems, Proc. SPIE Security and Watermarking of Multimedia contents IV, pp.50-56, 2002. ,
Terror groups hide behind Web encryption, USA Today, 2001. ,
Terrorist instructions hidden online, USA Today, 2001. ,
Improved Detection of LSB Steganography in Grayscale Images, Proc. Information Hiding, 6th International Workshop, pp.97-115, 2004. ,
DOI : 10.1007/978-3-540-30114-1_8
The ultimate steganalysis benchmark?, Proceedings of the 9th workshop on Multimedia & security , MM&Sec '07, pp.141-148, 2007. ,
DOI : 10.1145/1288869.1288889
Steganography : Implications for the prosecutor and computer forensics examiner. Rapport technique, American Prosecutors Research Institute, 2004. ,
Investigator's guide to steganography. Information Security, 2004. ,
Short convolutional codes with maximal free distance for rates 1 2 ,
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/, IEEE Transactions on Information Theory, vol.49, issue.1, pp.49273-280, 2003. ,
DOI : 10.1109/TIT.2002.806136
Some optimal partial-unit-memory codes (Corresp.), IEEE Transactions on Information Theory, vol.25, issue.2, pp.240-243, 1979. ,
DOI : 10.1109/TIT.1979.1056014
CDMA Systems Engineering Handbook. Mobile Communications ,
An Observation on the Security of McEliece???s Public-Key Cryptosystem, Advances in Cryptology -EUROCRYPT'88, pp.275-280, 1988. ,
DOI : 10.1007/3-540-45961-8_25
A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Transactions on Information Theory, vol.34, issue.5, pp.1354-1359, 1988. ,
DOI : 10.1109/18.21270
Efficient public key steganography secure against adaptative chosen stegotext attacks, Proc.Information Hiding, 8th International Workshop, 2006. ,
The Wiener (Root Mean Square) Error Criterion in Filter Design and Prediction, Journal of Mathematics and Physics, vol.25, issue.1-4, pp.261-278, 1947. ,
DOI : 10.1002/sapm1946251261
Niederreiter : Finite Fields, 1983. ,
Data hiding domain classification for blind image steganalysis, Proc. ICME, pp.907-910, 2004. ,
An Improved Sample Pairs Method for Detection of LSB Embedding, Proc. Information Hiding, 6th International Workshop, pp.116-127, 2004. ,
DOI : 10.1007/978-3-540-30114-1_9
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines, Proc. Information Hiding, 5th International Workshop, pp.340-354, 2002. ,
DOI : 10.1007/3-540-36415-3_22
Steganalysis using color wavelet statistics and one-class support vector machines, Security, Steganography, and Watermarking of Multimedia Contents VI, 2004. ,
DOI : 10.1117/12.526012
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.945
Steganalysis Using Higher-Order Image Statistics, IEEE Transactions on Information Forensics and Security, vol.1, issue.1, 2006. ,
DOI : 10.1109/TIFS.2005.863485
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.1418
The theory of error-correcting codes, 1977. ,
Threshold decoding, 1963. ,
Shift-register synthesis and BCH decoding, IEEE Transactions on Information Theory, vol.15, issue.1, pp.122-127, 1969. ,
DOI : 10.1109/TIT.1969.1054260
Sain : Inverses of linear sequential circuits, IEEE Transactions on Computers, COM, vol.17, pp.330-337, 1968. ,
Analyse stéganographique d'une image JPEG, 2004. ,
Algebraic Attacks and Decomposition of Boolean Functions, Proc. Eurocrypt 2004, numéro 3027 de Lecture Notes in Computer Science, pp.474-491, 2004. ,
DOI : 10.1007/978-3-540-24676-3_28
A Block Lanczos Algorithm for Finding Dependencies over GF(2), Advances in Cryptology -EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, pp.106-120, 1995. ,
DOI : 10.1007/3-540-49264-X_9
11 et les réseaux sans fils. Editions Eyrolles, pp.802-804, 2002. ,
Multi Bit Plane Image Steganography, Proc. Digital Watermarking, 5th International Workshop, pp.61-70, 2006. ,
DOI : 10.1007/11922841_6
New algorithm to identify rate k n catastrophic punctured convolutional encoders, Proc. of the Workshop in Coding and Cryptography 99, 1999. ,
On the Viterbi decoding algorithm, IEEE Transactions on Information Theory, vol.15, issue.1, pp.177-179, 1969. ,
DOI : 10.1109/TIT.1969.1054239
Short binary convolutional codes with maximal free distance for rates 2/3 and 3/4 (Corresp.), IEEE Transactions on Information Theory, vol.20, issue.5, pp.683-688, 1974. ,
DOI : 10.1109/TIT.1974.1055264
Information hiding terminology, Proceedings of the Workshop on Information Hiding, numéro 1174, pp.347-350, 1996. ,
Identification de trains binaires codés, Thèse de doctorat, 1996. ,
Defending against statistical steganalysis, 10th USENIX Security Symposium, 2001. ,
Detecting steganographic content on the internet, Proc. ISOC NDSS'02, 2002. ,
Statistical and Neural Classifiers : An Integrated Approach to Design Advances in Pattern Recognition, 2001. ,
DOI : 10.1007/978-1-4471-0359-2
Images of abuse : A review of the evidence on child pornography. Rapport technique, National Society for the Prevention of Cruelty to, Children, 2003. ,
Determining the parameters of a rate 1 n convolutional encoder over GF(q) ,
On the Computation of the Linear Complexity and the<tex>$k$</tex>-Error Linear Complexity of Binary Sequences With Period a Power of Two, IEEE Transactions on Information Theory, vol.51, issue.3, pp.1145-1150, 2005. ,
DOI : 10.1109/TIT.2004.842769
Wireless Networks 6, chapitre Design and system operation of Globalstar versus IS-95 CDMA -Similarities and differences, pp.47-57, 2000. ,
Description of a new variable-length key, 64-bit block cipher (Blowfish), Proc. Fast Software Encryption, pp.191-204, 1993. ,
DOI : 10.1007/3-540-58108-1_24
Embedding with syndrome coding based on BCH codes, Proceeding of the 8th workshop on Multimedia and security , MM&Sec '06, pp.214-223, 2006. ,
DOI : 10.1145/1161366.1161405
Reducing the Complexity of Syndrome Coding for Embedding, Proc. International Workshop on Information Hiding, IH'07, 2007. ,
DOI : 10.1007/11558859_16
IntroductionàIntroduction`Introductionà l'analyse d'algorithme, chapitre Cha??nesCha??nes et arbres digitaux, Thomson publisher, 1996. ,
The Mathematical Theory of Communication, 1949. ,
Blind detection of interleaver parameters, Proc. ICASSP 2005, 2005. ,
Etude statistique du seuil dans la détection d'entrelaceur, Proc. GRESTSI 2005, 2005. ,
Theorical study of the performance of a blind interleaver estimator, Proc. ISIVC, 2006. ,
Bin Laden exploits technology to suit his needs. CNN, septembre, 2001. ,
On systems of linear indeterminate equations and congruences, Philos. Trans. Roy. Soc. London, issue.151, pp.293-326 ,
An algorithm for the k-error linear complexity of binary sequences with period 2/sup n/, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1398-1401, 1993. ,
DOI : 10.1109/18.243455
A method for finding codewords of small weight, Proc. Coding Theory and Applications, numéro 388 de Lecture Notes in Computer Science, pp.106-113, 1989. ,
DOI : 10.1007/BFb0019850
Similarity of discrete Gilbert-Elliot and Polya channel models to continuous Rayleigh fading channel model, 2002. ,
Access Network : Channel coding (release 1999). Specifications, 3rd Generation Partenership Project ,
Subquadratic Computation of Vector Generating Polynomials and Improvement of the Block Wiedemann Algorithm, Journal of Symbolic Computation, vol.33, issue.5, pp.757-775, 2002. ,
DOI : 10.1006/jsco.2002.0533
Detection and recognition of a binary linear code, Discrete Applied Mathematics, vol.111, issue.1-2, pp.199-218, 2001. ,
DOI : 10.1016/S0166-218X(00)00353-X
Error bounds for convolutional codes and asymptotically optimum decoding algorithm, IEEE Transactions on Information Theory, issue.13, pp.260-269, 1967. ,
Public-Key Steganography, C. Cachin et J. Camenisch Proc. Eurocrypt, pp.323-341, 2004. ,
DOI : 10.1007/978-3-540-24676-3_20
Turbo Codes : Principles and Applications, 2000. ,
DOI : 10.1007/978-1-4615-4469-2
Disappearing cryptography -Information Hiding : steganography & watermarking, 2002. ,
F5???A Steganographic Algorithm, 1999. ,
DOI : 10.1007/3-540-45496-9_21
F5???A Steganographic Algorithm, Proc. Information Hiding, 4th International Workshop, pp.289-302, 2001. ,
DOI : 10.1007/3-540-45496-9_21
Attacks on Steganographic Systems, A. Pfitzmann , ´ editeur : Proc. Information Hiding, Third International Workshop, IH'99, volume 1768 de Lecture Notes in Computer Science, pp.61-76, 1999. ,
DOI : 10.1007/10719724_5
Solving sparse linear equations over finite fields, IEEE Transactions on Information Theory, vol.32, issue.1, pp.54-62, 1986. ,
DOI : 10.1109/TIT.1986.1057137
Asymptotic Approximations of Integrals, 1989. ,
DOI : 10.1137/1.9780898719260
Reiffen : Sequential decoding, 1961. ,
Hirata : High-rate punctured convolutional codes for soft decision Viterbi decoding, IEEE Transactions on Communications, p.32, 1984. ,
DOI : 10.1109/tcom.1984.1096047
Modeling the Security of Steganographic Systems, Proc. Information Hiding. Second International Workshop, IH'98, volume 1525 de Lecture Notes in Computer Science, pp.344-354, 1998. ,
DOI : 10.1007/3-540-49380-8_24
65 2.3.1 Canal sans erreur, p.69 ,
94 3.2.1 Canal sans erreur, p.104 ,
105 3.3.1 Canal sans erreur ,
120 4.2.1 Canal sans erreur, p.123 ,
126 4.3.1 Canal sans erreur, p.127 ,
144 5.1.1 Les images non compressées, 144 5.1.2 Stéganographie dans des plans de bits multiples . . . . . . . . . . . . 145 ,
151 5.2.1 Changement de l'espace des couleurs, 151 5.2.2 Transformation DCT (Discrete Cosinus Transform) . . . . . . . . . . 152 ,