{"id":23886,"date":"2021-07-08T12:21:45","date_gmt":"2021-07-08T11:21:45","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=23886"},"modified":"2025-01-03T12:13:04","modified_gmt":"2025-01-03T12:13:04","slug":"securite-multimedia-2","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/fr\/produit\/securite-multimedia-2\/","title":{"rendered":"S\u00e9curit\u00e9 multim\u00e9dia 2"},"content":{"rendered":"<p>Plus de 80 % des donn\u00e9es transmises sur les r\u00e9seaux et archiv\u00e9es dans nos ordinateurs, tablettes, t\u00e9l\u00e9phones portables ou sur les Clouds sont des donn\u00e9es multim\u00e9dia (images, vid\u00e9os, son, donn\u00e9es 3D) pour des applications allant du jeu vid\u00e9o aux donn\u00e9es m\u00e9dicales, en passant par la conception assist\u00e9e par ordinateur, la vid\u00e9osurveillance et la biom\u00e9trie.<\/p>\n<p>Il devient urgent de s\u00e9curiser ces donn\u00e9es multim\u00e9dia, que ce soit pendant leur transmission, leur archivage, mais \u00e9galement lors de leur visualisation. En effet, avec le \u00ab tout num\u00e9rique \u00bb, il devient de plus en plus facile de les copier, de les visualiser sans droit, de se les approprier ou de les falsifier.<\/p>\n<p><em>S\u00e9curit\u00e9 multim\u00e9dia 2<\/em> analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia. Il traite des aspects tels que la crypto-compression d\u2019images et de vid\u00e9os, le chiffrement homomorphe, l\u2019insertion de donn\u00e9es cach\u00e9es dans le domaine chiffr\u00e9 ainsi que le partage de secrets.<\/p>\n<p><a class=\"button\" style=\"margin-right: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/027_Securite-multimedia-2_TDM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Table des mati\u00e8res<\/a><a class=\"button\" style=\"margin-left: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/027_Securite-multimedia-2_premiere-partie.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pr\u00e9faces et Avant-propos<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Plus de 80 % des donn\u00e9es transmises sur les r\u00e9seaux et archiv\u00e9es dans nos ordinateurs, tablettes, t\u00e9l\u00e9phones portables ou sur les Clouds sont des donn\u00e9es multim\u00e9dia (images, vid\u00e9os, son, donn\u00e9es 3D) pour des applications allant du jeu vid\u00e9o aux donn\u00e9es m\u00e9dicales, en passant par la conception assist\u00e9e par ordinateur, la vid\u00e9osurveillance et la biom\u00e9trie. Il [&hellip;]<\/p>\n","protected":false},"featured_media":42919,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[4289],"product_tag":[],"class_list":{"0":"post-23886","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-sciences","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T12:13:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/\",\"url\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/\",\"name\":\"S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg\",\"datePublished\":\"2021-07-08T11:21:45+00:00\",\"dateModified\":\"2025-01-03T12:13:04+00:00\",\"description\":\"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg\",\"width\":300,\"height\":450,\"caption\":\"Livre scientifique - S\u00e9curit\u00e9 multim\u00e9dia 2 - William Puech\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 multim\u00e9dia 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"\u00c9diteur des Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group","description":"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group","og_description":"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.","og_url":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/","og_site_name":"ISTE Group","article_modified_time":"2025-01-03T12:13:04+00:00","og_image":[{"width":300,"height":450,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/","url":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/","name":"S\u00e9curit\u00e9 multim\u00e9dia 2 - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg","datePublished":"2021-07-08T11:21:45+00:00","dateModified":"2025-01-03T12:13:04+00:00","description":"S\u00e9curit\u00e9 multim\u00e9dia 2 analyse les questions de la biom\u00e9trie, de la protection, de l\u2019int\u00e9grit\u00e9 et du chiffrement de donn\u00e9es multim\u00e9dia.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-2.jpeg","width":300,"height":450,"caption":"Livre scientifique - S\u00e9curit\u00e9 multim\u00e9dia 2 - William Puech"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 multim\u00e9dia 2"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"\u00c9diteur des Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/23886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media\/42919"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media?parent=23886"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_brand?post=23886"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_cat?post=23886"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_tag?post=23886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}