{"id":344,"date":"2019-04-26T12:30:03","date_gmt":"2019-04-26T12:30:03","guid":{"rendered":"https:\/\/www.uvolante.org\/?page_id=344"},"modified":"2019-04-26T12:30:05","modified_gmt":"2019-04-26T12:30:05","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.uvolante.org\/index.php\/research\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<div id=\"wphal-content\"><ul id=\"wphal-menu\"><li><a href=\"#publications\" onclick=\"displayElem('publications'); return false;\" style=\"font-size:18px;text-decoration: none\">Publications<\/a><\/li><li><a href=\"#filtres\" onclick=\"return false;\" style=\"font-size:18px;text-decoration: none;cursor:default\">Metadata<\/a><ul id=\"wphal-filtres\"><li><a href=\"#revues\" onclick=\"displayElem('wphal-revues'); return false;\" style=\"margin:1px;text-decoration: none\">Journals<\/a><\/li><li><a href=\"#annees\" onclick=\"displayElem('wphal-annees'); return false;\" style=\"margin:1px;text-decoration: none\">Year of production<\/a><\/li><\/ul><\/li><\/ul><br \/><hr><div id=\"meta\">\n        <div class=\"display\" id=\"wphal-contact\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Contact<\/h3>\n\n            <ul id=\"wphal-cont\" style=\"list-style-type: none\"><div class=\"wphal-infocontact\" id=\"wphal-infocontact0\"><li class=\"wphal-fullname\"><span>Nom : <\/span><span>Fran\u00e7ois Cayre<\/span><\/li><li class=\"wphal-idhal\"><span>IdHAL : <\/span><span>francois-cayre<\/span><\/li><li class=\"wphal-cvhal\"><span>CV HAL : <\/span><a href=\"https:\/\/cv.hal.science\/francois-cayre\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">CV de Fran\u00e7ois Cayre<\/a><\/li><li class=\"wphal-\"><span>IdRef : <\/span><span><a href=\"https:\/\/www.idref.fr\/080779557\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">080779557<\/a> ,<\/span><\/li><li class=\"wphal-\"><span>ORCID : <\/span><span><a href=\"https:\/\/orcid.org\/0000-0002-6634-9147\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">0000-0002-6634-9147<\/a> ,<\/span><\/li><li class=\"wphal-\"><span>VIAF : <\/span><span><a href=\"https:\/\/viaf.org\/viaf\/42083326\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">42083326<\/a> ,<\/span><\/li><li class=\"wphal-\"><span>ISNI : <\/span><span><a href=\"http:\/\/isni.org\/isni\/0000000000957268\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">0000000000957268<\/a> ,<\/span><\/li><\/div><\/ul>\n        <\/div>\n        <div class=\"display\" id=\"wphal-disciplines\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Domains<\/h3><\/div>\n        <div class=\"display\" id=\"wphal-keywords\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Keywords<\/h3><\/div>\n        <div class=\"display\" id=\"wphal-auteurs\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Authors<\/h3><\/div>\n        <div class=\"display\" id=\"wphal-affiliated\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Affiliated authors<\/h3><\/div>\n        <div class=\"display\" id=\"wphal-revues\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Journals<\/h3><span id=\"trirevues\"><button type=\"button\" class=\"trial\" id=\"trirev\" onclick=\"toggleSort(this, true, 'wphal-rev', 'revuesuite', 'trirev'); return false;\" style=\"font-size:16px;text-decoration: none\">Tri Alphab\u00e9tique<\/button><button type=\"button\" class=\"trioc\" id=\"trinbrev\" onclick=\"toggleSort(this, false, 'wphal-rev', 'revuesuite', 'trinbrev'); return false;\" style=\"font-size:16px;text-decoration: none\">Tri Occurrence<\/button><\/span><ul class=\"wphal-revues\"><div id=\"wphal-rev\"><li class=\"metadata\" data-percentage=\"4\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:14058+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">IEEE Transactions on Information Forensics and Security<\/a><span class=\"wphal-nbmetadata\">4<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:21050+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Interstices<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:10661+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Applied Soft Computing<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:107030+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">IEEE Access<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:42625+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:5378+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">IEEE Transactions on Image Processing<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:5398+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">IEEE Transactions on Signal Processing<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=journalId_i:62863+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">Traitement du Signal<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><div id=\"revuesuite\" style=\"display:none\"><\/div><\/div><\/ul><\/div>\n        <div class=\"display\" id=\"wphal-annees\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Year of production<\/h3><span id=\"triannees\"><button type=\"button\" class=\"trial\" id=\"trian\" onclick=\"toggleSort(this, true, 'wphal-an', 'anneesuite', 'trian'); return false;\" style=\"font-size:16px;text-decoration: none\">Tri Alphab\u00e9tique<\/button><button type=\"button\" class=\"trioc\" id=\"trinban\" onclick=\"toggleSort(this, false, 'wphal-an', 'anneesuite', 'trinban'); return false;\" style=\"font-size:16px;text-decoration: none\">Tri Occurrence<\/button><\/span><ul class=\"wphal-annees\"><div id=\"wphal-an\"><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2023+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2023<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2021+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2021<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2020+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2020<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"3\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2019+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2019<\/a><span class=\"wphal-nbmetadata\">3<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2017+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2017<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2016+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2016<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2015+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2015<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2014+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2014<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"5\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2013+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2013<\/a><span class=\"wphal-nbmetadata\">5<\/span><\/li><li class=\"metadata\" data-percentage=\"3\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2012+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2012<\/a><span class=\"wphal-nbmetadata\">3<\/span><\/li><div id=\"anneesuite\" style=\"display:none\"><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2011+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2011<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2010+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2010<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"5\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2009+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2009<\/a><span class=\"wphal-nbmetadata\">5<\/span><\/li><li class=\"metadata\" data-percentage=\"5\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2008+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2008<\/a><span class=\"wphal-nbmetadata\">5<\/span><\/li><li class=\"metadata\" data-percentage=\"6\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2007+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2007<\/a><span class=\"wphal-nbmetadata\">6<\/span><\/li><li class=\"metadata\" data-percentage=\"4\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2006+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2006<\/a><span class=\"wphal-nbmetadata\">4<\/span><\/li><li class=\"metadata\" data-percentage=\"4\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2005+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2005<\/a><span class=\"wphal-nbmetadata\">4<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2004+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2004<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><li class=\"metadata\" data-percentage=\"1\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2003+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2003<\/a><span class=\"wphal-nbmetadata\">1<\/span><\/li><li class=\"metadata\" data-percentage=\"2\"><a href=\"https:\/\/hal.science\/search\/index\/?q=producedDateY_i:2001+AND+authIdHal_s:(francois-cayre)\" target=\"_blank\" class=\"external external_icon\" rel=\"nofollow\">2001<\/a><span class=\"wphal-nbmetadata\">2<\/span><\/li><\/div><\/div><\/ul><button type=\"button\" style=\"text-decoration: none\" id=\"wphal-annee\" onclick=\"visibiliteannee('anneesuite'); return false;\">Full list<\/button><\/div>\n        <div class=\"display\" id=\"wphal-insts\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Institutions<\/h3><\/div>\n       <div class=\"display\" id=\"wphal-labs\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Laboratories<\/h3><\/div>\n       <div class=\"display\" id=\"wphal-depts\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Departments<\/h3><\/div>\n       <div class=\"display\" id=\"wphal-equipes\" style=\"display: none\">\n            <h3 class=\"wphal-titre\">Research team<\/h3><\/div>\n    <div class=\"display\" id=\"publications\"><div class=\"counter-doc\"><span class=\"wphal-nbtot\">54 <\/span>documents<\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Journal articles<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">12 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Ludovic Darmet, Kai Wang, Fran\u00e7ois Cayre. Disentangling Copy-Moved Source and Target Areas. <i>Applied Soft Computing<\/i>, 2021, 109, pp.107536:1-10. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.asoc.2021.107536\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1016\/j.asoc.2021.107536&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03242196v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-03242196&#x27E9;<\/a><\/li><li>Ludovic Darmet, Kai Wang, Fran\u00e7ois Cayre. GRAFT: Unsupervised Adaptation to Resizing for Detection of Image Manipulation. <i>IEEE Access<\/i>, 2020, 8, pp.55619 - 55632. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ACCESS.2020.2980992\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/ACCESS.2020.2980992&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02519535v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-02519535&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre, Zhang Xiong. Median Filtered Image Quality Enhancement and Anti-Forensics via Variational Deconvolution. <i>IEEE Transactions on Information Forensics and Security<\/i>, 2015, 10 (5), pp.1076-1091. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2015.2398362\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/TIFS.2015.2398362&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01165592v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01165592&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre, Zhang Xiong. JPEG anti-forensics with improved tradeoff between forensic undetectability and image quality. <i>IEEE Transactions on Information Forensics and Security<\/i>, 2014, 9 (8), pp.1211-1226. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2014.2317949\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/TIFS.2014.2317949&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01048725v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01048725&#x27E9;<\/a><\/li><li>Benjamin Mathon, Fran\u00e7ois Cayre, Patrick Bas, Beno\u00eet Macq. Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images. <i>IEEE Transactions on Image Processing<\/i>, 2014, 23 (4), pp.1694-1705. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TIP.2014.2305873\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/TIP.2014.2305873&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00940754v2\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00940754v2&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Impacts of Watermarking Security on Tardos-based Fingerprinting. <i>IEEE Transactions on Information Forensics and Security<\/i>, 2013, 8 (6), pp.1038 - 1050. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2013.2260158\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/TIFS.2013.2260158&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00813362v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00813362&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Comparison of secure spread-spectrum modulations applied to still image watermarking. <i>Annals of Telecommunications - annales des t\u00e9l\u00e9communications<\/i>, 2009, 64 (11-12), pp.801-813. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/s12243-009-0119-9\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1007\/s12243-009-0119-9&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00437864v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00437864&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre. Cryptographie, du chiffre et des lettres. <i>Interstices<\/i>, 2009. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01350389v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01350389&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre. Cryptographie, st\u00e9ganographie et tatouage : des secrets partag\u00e9s. <i>Interstices<\/i>, 2008. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-01350420v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01350420&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Patrick Bas. Kerckhoffs-based embedding security classes for WOA data-hiding. <i>IEEE Transactions on Information Forensics and Security<\/i>, 2008, 3 (1), pp.1-15. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/TIFS.2007.916006\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/TIFS.2007.916006&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00325091v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00325091&#x27E9;<\/a><\/li><li>Teddy Furon, Fran\u00e7ois Cayre, Caroline Fontaine. Watermarking security: theory and practice. <i>IEEE Transactions on Signal Processing<\/i>, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00088006v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00088006&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Franck Davoine. Vers un tatouage d'images mou. <i>Traitement du Signal<\/i>, 2001, 18 (4), pp.259-269. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00143718v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00143718&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Conference papers<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">34 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Fran\u00e7ois Cayre, Nicolas Le Bihan, Isabelle Sivignon. Une implantation de la th\u00e9orie de l'information. <i>GRETSI 2023 - XXIX\u00e8me Colloque Francophone de Traitement du Signal et des Images<\/i>, GRETSI - Groupe de Recherche en Traitement du Signal et des Images, Aug 2023, Grenoble, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04256174v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-04256174&#x27E9;<\/a><\/li><li>Ludovic Darmet, Kai Wang, Fran\u00e7ois Cayre. Weakly Supervised Adaptation to Re-sizing for Image Manipulation Detection on Small Patches. <i>IWDW 2019 - 18th International Workshop on Digital-forensics and Watermarking<\/i>, Nov 2019, Chengdu, China. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02335866v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-02335866&#x27E9;<\/a><\/li><li>Ludovic Darmet, Kai Wang, Fran\u00e7ois Cayre. GRAFT : Adaptation non-supervis\u00e9e au re-dimensionnement pour la d\u00e9tection de manipulation d'image. <i>GRETSI 2019 - XXVII\u00e8me Colloque Francophone de Traitement du Signal et des Images<\/i>, Aug 2019, Lille, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02335837v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-02335837&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Nicolas Le Bihan. Complexity and Similarity for Sequences using LZ77-based conditional information measure. <i>ISIT 2019 - IEEE International Symposium on Information Theory<\/i>, Jul 2019, Paris, France. pp.2454-2458, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ISIT.2019.8849610\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/ISIT.2019.8849610&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-02346520v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-02346520&#x27E9;<\/a><\/li><li>Marion Revolle, Fran\u00e7ois Cayre, Nicolas Le Bihan. Clustering and causality inference using algorithmic complexity. <i>EUSIPCO 2017 - 25th European Signal Processing Conference<\/i>, Aug 2017, Kos Island, Greece. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01655109v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01655109&#x27E9;<\/a><\/li><li>Anh Thu Phan Ho, Kai Wang, Fran\u00e7ois Cayre. An effective histogram-based approach to JPEG-100 forensics. <i>IPTA 2016 - 6th International Conference on Image Processing Theory, Tools and Applications (IPTA'16)<\/i>, Dec 2016, Oulu, Finland. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01406265v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01406265&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre. General-purpose image forensics using patch likelihood under image statistical models. <i>WIFS 2015 - 7th IEEE International Workshop on Information Forensics and Security (WIFS 2015)<\/i>, IEEE, Nov 2015, Rome, Italy. 6 p. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-01240755v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-01240755&#x27E9;<\/a><\/li><li>Cl\u00e9o Baras, Fran\u00e7ois Cayre. Towards a realistic channel model for security analysis of authentication using graphical codes. <i>WIFS 2013 - IEEE International Workshop on Information Forensics and Security (WIFS'13)<\/i>, Nov 2013, Guangzhou, China. pp.1-5. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00863917v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00863917&#x27E9;<\/a><\/li><li>Cl\u00e9o Baras, Fran\u00e7ois Cayre. Vers un mod\u00e8le de canal r\u00e9aliste pour l'analyse de la s\u00e9curit\u00e9 du processus d'authentification par code matriciel 2D. <i>GRETSI 2013 - XXIV\u00e8me Colloque francophone de traitement du signal et des images<\/i>, Sep 2013, Brest, France. pp.1-4. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00835273v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00835273&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre, Zhang Xiong. JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics. <i>IH&amp;MMSEC 2013 - 1st ACM Workshop on Information Hiding and Multimedia Security (IH &amp; MMSEC 2013)<\/i>, Jun 2013, Montpellier, France. pp.117-122. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00836438v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00836438&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre, Zhang Xiong. A variational approach to JPEG anti-forensics. <i>ICASSP 2013 - 38th IEEE International Conference on Acoustics, Speech and Signal Processing<\/i>, May 2013, Vancouver, Canada. pp.3058-3062. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00836437v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00836437&#x27E9;<\/a><\/li><li>Cl\u00e9o Baras, Fran\u00e7ois Cayre. 2D Bar-Codes for Authentication: A Security Approach. <i>EUSIPCO 2012 - 20th European Signal Processing Conference<\/i>, Aug 2012, Bucarest, Romania. pp.1. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00709394v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00709394&#x27E9;<\/a><\/li><li>Wei Fan, Kai Wang, Fran\u00e7ois Cayre, Zhang Xiong. 3D lighting-based image forgery detection using shape-from-shading. <i>EUSIPCO 2012 - 20th European Signal Processing Conference<\/i>, Aug 2012, Bucarest, Romania. pp.1777-1781. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00734749v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00734749&#x27E9;<\/a><\/li><li>Patrick Bas, Teddy Furon, Fran\u00e7ois Cayre. Practical Key Length of Watermarking Systems. <i>ICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing<\/i>, Mar 2012, Kyoto, Japan. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/hal-00686813v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00686813&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Th\u00e9orie du transport appliqu\u00e9e au tatouage s\u00fbr d'images naturelles. <i>GRETSI 2011 - XXIII\u00e8me Colloque francophone de traitement du signal et des images<\/i>, Sep 2011, Bordeaux, France. pp.ID232. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00609187v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00609187&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting. <i>WIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10)<\/i>, Dec 2010, Seattle, United States. pp.2010. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00541383v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00541383&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Considering Security and Robustness Constraints for Watermark-based Tardos Fingerprinting. <i>MMSP 2010 - IEEE International Workshop on Multimedia Signal Processing<\/i>, Oct 2010, Saint-Malo, France. pp.46-51, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/MMSP.2010.5661992\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1109\/MMSP.2010.5661992&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00537139v2\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00537139v2&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Beno\u00eet Macq. Optimization of Natural Watermarking Using Transportation Theory. <i>ACM Multimedia and Security Workshop 2009<\/i>, Sep 2009, Princeton NJ, United States. pp.1-8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00437902v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00437902&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Cl\u00e9o Baras, Vincent del Medico. Compromis s\u00e9curit\u00e9 \/ robustesse en resynchronisation pour le tatouage. <i>CORESA 2009 - Journ\u00e9es d\u00b4Etudes et d\u00b4Echanges COmpression et REpr\u00e9sentation des Signaux Audiovisuels<\/i>, Mar 2009, Toulouse, France. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00365823v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00365823&#x27E9;<\/a><\/li><li>Oleksiy Koval, Sviatoslav Voloshynovskiy, Patrick Bas, Fran\u00e7ois Cayre. On security threats for robust perceptual hashing. <i>Media Forensics and Security<\/i>, Jan 2009, San Jose, United States. pp.id 807487, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1117\/12.807487\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1117\/12.807487&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00371146v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00371146&#x27E9;<\/a><\/li><li>Denis Pitzalis, Genevi\u00e8ve Aitken, Florent Autrusseau, Marie Babel, Fran\u00e7ois Cayre, et al.. TSAR: Secure Transfer OF High Resolution Art Images. <i>EVA 2008 - Electronic imaging and the Visual Art<\/i>, Jul 2008, London, United Kingdom. pp.1-6. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00320836v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00320836&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre, Fernando P\u00e9rez Gonzalez. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. <i>IH 2008 - Information Hiding: 10th International Workshop<\/i>, Jun 2008, Santa-Barbara, United States. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00325080v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00325080&#x27E9;<\/a><\/li><li>Benjamin Mathon, Fran\u00e7ois Cayre, Patrick Bas. Techniques s\u00fbres de tatouage pour l'image. <i>CORESA 2007 - 12\u00e8mes Journ\u00e9es d\u00b4Etudes et d\u00b4Echanges COmpression et REpr\u00e9sentation des Signaux Audiovisuels<\/i>, Nov 2007, Montpellier, France. pp.electronic version. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00166725v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00166725&#x27E9;<\/a><\/li><li>Benjamin Mathon, Patrick Bas, Fran\u00e7ois Cayre. Practical Performance Analysis of Secure Modulations for WOA Spread-Spectrum based Image Watermarking. <i>ACM Multimedia and Security Workshop 2007<\/i>, Sep 2007, Dallas, United States. pp.electronic version. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00166726v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00166726&#x27E9;<\/a><\/li><li>Patrice Rondao-Alface, Beno\u00eet Macq, Fran\u00e7ois Cayre. Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?. <i>ICIP 2007 - 14th IEEE International Conference on Image Processing<\/i>, Sep 2007, San Antonio, Texas, United States. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00158056v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00158056&#x27E9;<\/a><\/li><li>Ga\u00ebtan Le Guelvouit, Teddy Furon, Fran\u00e7ois Cayre. The good, the bad and the ugly: three different approaches to break their watermarking system. <i>SPIE 2007 - Electronic Imaging Security, Steganography, and Watermarking of Multimedia Contents IX<\/i>, Jan 2007, San Jose, United States. pp.6, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1117\/12.703968\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1117\/12.703968&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00158014v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00158014&#x27E9;<\/a><\/li><li>Patrick Bas, Fran\u00e7ois Cayre. Achieving subspace or key security for WOA using Natural or Circular Watermarking. <i>ACM Multimedia and Security Workshop<\/i>, Sep 2006, Geneva, Switzerland. pp.digital version. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00166575v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00166575&#x27E9;<\/a><\/li><li>Patrick Bas, Fran\u00e7ois Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. <i>Information Hiding 2006<\/i>, Jul 2006, Alexandria, United States. pp.digital version. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00166574v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00166574&#x27E9;<\/a><\/li><li>Patrick Bas, Fran\u00e7ois Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. <i>Information Hiding Workshop (IH06)<\/i>, Jul 2006, Alexandria, United States. pp.digital version. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00166572v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00166572&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part II: practice. <i>Security, Steganography, and Watermarking of Multimedia Contents VII<\/i>, Jan 2005, San Jose, CA, USA, United States. pp.758--767. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00083335v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00083335&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. <i>Security, Steganography, and Watermarking of Multimedia Contents VII<\/i>, Jan 2005, San Jose, CA, USA, United States. pp.746--757. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00083329v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00083329&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Caroline Fontaine, Teddy Furon. A theoretical study of watermarking security. <i>ISIT 2005<\/i>, 2005, pp.1868-1872. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00158005v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00158005&#x27E9;<\/a><\/li><li>Fran\u00e7ois Cayre, Caroline Fontaine, Teddy Furon. Watermarking attack: security of WSS techniques. <i>International Workshop on Digital Watermarking<\/i>, Oct 2004, Seoul, South Corea, South Korea. pp.171--183. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00083194v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00083194&#x27E9;<\/a><\/li><li>Franck Davoine, Fran\u00e7ois Cayre. Tatouage d'images par ondelettes et application \u00e0 la couleur. Sep 2001. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00143772v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00143772&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Books<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">2 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Patrick Bas, Teddy Furon, Fran\u00e7ois Cayre, Gwena\u00ebl Do\u00ebrr, Benjamin Mathon. Watermarking Security. <a target=\"_blank\" href=\"https:\/\/link.springer.com\/book\/10.1007\/978-981-10-0506-0#book-header\" class=\"external external_icon\" rel=\"nofollow\">Springer Singapore<\/a>, IX, 125 p., 2016, SpringerBriefs in Electrical and Computer Engineering, 978-981-10-0505-3. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-981-10-0506-0\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;10.1007\/978-981-10-0506-0&#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-04432624v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-04432624&#x27E9;<\/a><\/li><li>Teddy Furon, Gwena\u00ebl Do\u00ebrr, Patrick Bas, Fran\u00e7ois Cayre (Dir.). Proceedings of the 9th Information Hiding Workshop. Teddy Furon and Gwena\u00ebl Do\u00ebrr and Patrick Bas and Fran\u00e7ois Cayre. Springer Verlag, 4567, pp.1--391, 2007. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00504303v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00504303&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Book sections<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">1 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Teddy Furon, Fran\u00e7ois Cayre, Caroline Fontaine. Watermarking Security. Nedeljko Cvejic and Tapio Seppanen. <i>Digital Audio Watermarking Techniques and Technologies<\/i>, Information Science Reference, 2008, 978-1-59904-513-9. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00580838v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00580838&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Other publications<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">2 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Patrick Bas, Fran\u00e7ois Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. 2007, pp.8. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00157965v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00157965&#x27E9;<\/a><\/li><li>Patrick Bas, Fran\u00e7ois Cayre. Achieving subspace or key security for WOA using natural or circular watermarking. <i>Proceeding of the 8th workshop on Multimedia and security<\/i>, 2006, pp.80-88. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-00157995v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-00157995&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Preprints, Working Papers<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">1 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Fran\u00e7ois Cayre, Marion Revolle, Isabelle Sivignon, Nicolas Le Bihan. SALZA: Practical Algorithmic Information Theory and Sharper Universal String Similarity. 2020. <a target=\"_blank\" href=\"https:\/\/hal.science\/hal-03010529v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;hal-03010529&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Reports<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">1 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Fran\u00e7ois Cayre, Olivier Devillers, Francis Schmitt, Henri Ma\u00eetre. Watermarking 3D triangle meshes for authentication and integrity. [Research Report] RR-5223, INRIA. 2004. <a target=\"_blank\" href=\"https:\/\/inria.hal.science\/inria-00071257v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;inria-00071257&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><div class=\"grp-div\"><h3 class=\"wphal-titre-groupe\">Theses<span class=\"wphal-nbmetadata\" style=\"margin-left:10px\">1 document<\/span><\/h3><div class=\"grp-content\"><ul><li>Fran\u00e7ois Cayre. Contributions au tatouage des maillages surfaciques 3D. Mod\u00e9lisation et simulation. T\u00e9l\u00e9com ParisTech, 2003. Fran\u00e7ais. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;NNT : &#x27E9;<\/a>. <a target=\"_blank\" href=\"https:\/\/pastel.hal.science\/tel-00005731v1\" class=\"external external_icon\" rel=\"nofollow\">&#x27E8;tel-00005731&#x27E9;<\/a><\/li><\/ul><\/div><\/div><br><\/div>\n    <\/div>\n<\/div><div class=\"wphal-footer\"><p style=\"color:#B3B2B0\">Powered by HAL&nbsp;<a href=\"https:\/\/hal.science\/\" target=\"_blank\" class=\"external\" rel=\"nofollow\"><img decoding=\"async\" alt=\"logo\" src=\"https:\/\/www.uvolante.org\/wp-content\/plugins\/hal\/img\/logo-hal.png\" style=\"width:90px\"><\/a><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":0,"parent":148,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-344","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/344"}],"collection":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":8,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/344\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/344\/revisions\/354"}],"up":[{"embeddable":true,"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/pages\/148"}],"wp:attachment":[{"href":"https:\/\/www.uvolante.org\/index.php\/wp-json\/wp\/v2\/media?parent=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}