{"id":23887,"date":"2021-07-08T12:22:36","date_gmt":"2021-07-08T11:22:36","guid":{"rendered":"https:\/\/www.istegroup.com\/?post_type=product&#038;p=23887"},"modified":"2025-01-03T12:12:36","modified_gmt":"2025-01-03T12:12:36","slug":"securite-multimedia-1","status":"publish","type":"product","link":"https:\/\/www.istegroup.com\/fr\/produit\/securite-multimedia-1\/","title":{"rendered":"S\u00e9curit\u00e9 multim\u00e9dia 1"},"content":{"rendered":"<p>Plus de 80 % des donn\u00e9es transmises sur les r\u00e9seaux et archiv\u00e9es dans nos ordinateurs, tablettes, t\u00e9l\u00e9phones portables ou sur les Clouds sont des donn\u00e9es multim\u00e9dia (images, vid\u00e9os, son, donn\u00e9es 3D) pour des applications allant du jeu vid\u00e9o aux donn\u00e9es m\u00e9dicales, en passant par la conception assist\u00e9e par ordinateur, la vid\u00e9osurveillance et la biom\u00e9trie.<\/p>\n<p>Il devient urgent de s\u00e9curiser ces donn\u00e9es multim\u00e9dia, que ce soit pendant leur transmission, leur archivage, mais \u00e9galement lors de leur visualisation. En effet, avec le \u00ab tout num\u00e9rique \u00bb, il devient de plus en plus facile de les copier, de les visualiser sans droit, de se les approprier ou de les falsifier.<\/p>\n<p><em>S\u00e9curit\u00e9 multim\u00e9dia 1<\/em> analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant. Concernant l\u2019insertion de donn\u00e9es cach\u00e9es, il traite \u00e9galement les aspects invisibilit\u00e9, couleur, tra\u00e7age et donn\u00e9es 3D, tout comme la d\u00e9tection de message cach\u00e9 dans une image par st\u00e9ganalyse.<\/p>\n<p><a class=\"button\" style=\"margin-right: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/026_Securite-multimedia-1_TDM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Table des mati\u00e8res<\/a><a class=\"button\" style=\"margin-left: 10%\" href=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2019\/11\/026_Securite-multimedia-1_premiere-partie.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pr\u00e9faces et Avant-propos<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Plus de 80 % des donn\u00e9es transmises sur les r\u00e9seaux et archiv\u00e9es dans nos ordinateurs, tablettes, t\u00e9l\u00e9phones portables ou sur les Clouds sont des donn\u00e9es multim\u00e9dia (images, vid\u00e9os, son, donn\u00e9es 3D) pour des applications allant du jeu vid\u00e9o aux donn\u00e9es m\u00e9dicales, en passant par la conception assist\u00e9e par ordinateur, la vid\u00e9osurveillance et la biom\u00e9trie. Il [&hellip;]<\/p>\n","protected":false},"featured_media":42920,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"product_brand":[],"product_cat":[4289],"product_tag":[],"class_list":{"0":"post-23887","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-sciences","8":"first","9":"instock","10":"shipping-taxable","11":"purchasable","12":"product-type-variable"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/\" \/>\n<meta property=\"og:site_name\" content=\"ISTE Group\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T12:12:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/\",\"url\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/\",\"name\":\"S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.istegroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg\",\"datePublished\":\"2021-07-08T11:22:36+00:00\",\"dateModified\":\"2025-01-03T12:12:36+00:00\",\"description\":\"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage\",\"url\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg\",\"contentUrl\":\"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg\",\"width\":300,\"height\":450,\"caption\":\"Livre scientifique - S\u00e9curit\u00e9 multim\u00e9dia 1 - William Puech\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.istegroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/www.istegroup.com\/fr\/nouveautes\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 multim\u00e9dia 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.istegroup.com\/#website\",\"url\":\"https:\/\/www.istegroup.com\/\",\"name\":\"ISTE Group\",\"description\":\"\u00c9diteur des Sciences\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.istegroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group","description":"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group","og_description":"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.","og_url":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/","og_site_name":"ISTE Group","article_modified_time":"2025-01-03T12:12:36+00:00","og_image":[{"width":300,"height":450,"url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/","url":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/","name":"S\u00e9curit\u00e9 multim\u00e9dia 1 - ISTE Group","isPartOf":{"@id":"https:\/\/www.istegroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage"},"image":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg","datePublished":"2021-07-08T11:22:36+00:00","dateModified":"2025-01-03T12:12:36+00:00","description":"S\u00e9curit\u00e9 multim\u00e9dia 1 analyse les questions d\u2019authentification de donn\u00e9es multim\u00e9dia, des codes et de l\u2019insertion de donn\u00e9es cach\u00e9es, du c\u00f4t\u00e9 d\u00e9fenseur comme du c\u00f4t\u00e9 attaquant.","breadcrumb":{"@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#primaryimage","url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg","contentUrl":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/07\/Securite-multimedia-1.jpeg","width":300,"height":450,"caption":"Livre scientifique - S\u00e9curit\u00e9 multim\u00e9dia 1 - William Puech"},{"@type":"BreadcrumbList","@id":"https:\/\/www.istegroup.com\/produit\/securite-multimedia-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.istegroup.com\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/www.istegroup.com\/fr\/nouveautes\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 multim\u00e9dia 1"}]},{"@type":"WebSite","@id":"https:\/\/www.istegroup.com\/#website","url":"https:\/\/www.istegroup.com\/","name":"ISTE Group","description":"\u00c9diteur des Sciences","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.istegroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product\/23887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media\/42920"}],"wp:attachment":[{"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/media?parent=23887"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_brand?post=23887"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_cat?post=23887"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.istegroup.com\/fr\/wp-json\/wp\/v2\/product_tag?post=23887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}