. Attaquer, Plusieurs d'entre eux utilisent notamment le modèle " sac de mot " (Bag Of Feature?BoF) Il serait intéressant de tester les attaques proposées etégalementetégalement de concocter d'autres attaques sur ces techniques d'indexation. Attaquer la vidéo, Il y a beaucoup de systèmes de détection de copies basés sur le contenu vidéo (VCBCD) utilisant une description locale, p.69

I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, Geometric tampering estimation by means of a SIFT-based forensic analysis, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1702-1705, 2010.
DOI : 10.1109/ICASSP.2010.5495485

I. Amerini, L. Ballan, R. Caldelli, A. D. Bimbo, and G. Serra, A SIFT-based forensic method for copy & move attack detection and transformation recovery . Information Forensics and Security, IEEE Transactions on, vol.6, issue.3, pp.1099-1110, 2011.

D. Ballard, Generalizing the Hough transform to detect arbitrary shapes, Pattern Recognition, vol.13, issue.2, pp.111-122, 1981.
DOI : 10.1016/0031-3203(81)90009-1

J. M. Barrios and B. Bustos, Content-based video copy detection, Proceedings of the seventeen ACM international conference on Multimedia, MM '09, 2010.
DOI : 10.1145/1631272.1631539

URL : http://hdl.handle.net/10533/91277

H. Bay, T. Tuytelaars, and L. Van-gool, SURF: Speeded Up Robust Features, Computer Vision, pp.404-41711744023, 1007.
DOI : 10.1007/11744023_32

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.679.3046

S. Belongie, J. Malik, and J. Puzicha, Shape matching and object recognition using shape contexts, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.4, pp.509-522, 2002.
DOI : 10.1109/34.993558

R. H. Byrd, J. C. Gilbert, and J. Nocedal, A trust region method based on interior point techniques for nonlinear programming, Mathematical Programming, pp.149-185, 2000.
DOI : 10.1007/PL00011391

URL : https://hal.archives-ouvertes.fr/inria-00073794

R. H. Byrd, M. E. Hribar, and J. Nocedal, An Interior Point Algorithm for Large-Scale Nonlinear Programming, SIAM Journal on Optimization, vol.9, issue.4, pp.877-900, 1999.
DOI : 10.1137/S1052623497325107

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7940

F. Cayre, C. Fontaine, and T. Furon, Watermarking security: theory and practice, IEEE Transactions on Signal Processing, vol.53, issue.10, pp.3976-3987, 2005.
DOI : 10.1109/TSP.2005.855418

URL : https://hal.archives-ouvertes.fr/inria-00088006

J. Chen and J. Jiang, University of Bradford at TRECVID 2008: Content based copy detection task, TRECVID, 2008.

M. E. Choubassi and P. Moulin, On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks, Security, Steganography, and Watermarking of Multimedia Contents VIII, p.60721, 2006.
DOI : 10.1117/12.640659

O. Chum, J. Philbin, M. Isard, and A. Zisserman, Scalable near identical image and shot detection, Proceedings of the 6th ACM international conference on Image and video retrieval, CIVR '07, pp.549-556, 2007.
DOI : 10.1145/1282280.1282359

I. Cox, J. Bloom, and M. Miller, Digital Watermarking:Principles and Practice, 2001.

I. Cox, M. Miller, T. Minka, T. Papathomas, and P. Yianilos, The Bayesian image retrieval system, PicHunter: theory, implementation, and psychophysical experiments, IEEE Transactions on Image Processing, vol.9, issue.1, pp.20-37, 2000.
DOI : 10.1109/83.817596

M. Datar, N. Immorlica, P. Indyk, and V. S. Mirrokni, Locality-sensitive hashing scheme based on p-stable distributions, Proceedings of the twentieth annual symposium on Computational geometry , SCG '04, pp.253-262, 2004.
DOI : 10.1145/997817.997857

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.8167

T. Do, L. Amsaleg, E. Kijak, and T. Furon, Security-oriented picture-inpicture visual modification, ACM International Conference on Multimedia Retrieval, 2012.
DOI : 10.1145/2324796.2324813

URL : https://hal.inria.fr/hal-00764431/file/pip.pdf

T. Do, E. Kijak, L. Amsaleg, and T. Furon, Enlarging hacker's toolbox: Deluding image recognition by attacking keypoint orientations, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012.
DOI : 10.1109/ICASSP.2012.6288254

URL : https://hal.inria.fr/hal-00686809/file/kporientation4.pdf

T. Do, E. Kijak, T. Furon, L. Amsaleg, E. Kijak et al., Challenging the security of content-based image retrieval systems Deluding image recognition in SIFT-based CBIR systems, Multimedia Signal Processing (MMSP) Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, MiFor '10, pp.52-57, 2010.

T. Do, E. Kijak, T. Furon, and L. Amsaleg, Understanding the security and robustness of SIFT, Proceedings of the international conference on Multimedia, MM '10, pp.1195-1198, 2010.
DOI : 10.1145/1873951.1874185

URL : https://hal.archives-ouvertes.fr/inria-00482502

M. Douze, H. Jégou, H. Sandhawalia, L. Amsaleg, and C. Schmid, Evaluation of GIST descriptors for web-scale image search, Proceeding of the ACM International Conference on Image and Video Retrieval, CIVR '09, pp.1-19, 2009.
DOI : 10.1145/1646396.1646421

URL : https://hal.archives-ouvertes.fr/inria-00394212

M. Douze, H. Jegou, and C. Schmid, An image-based approach to video copy detection with spatio-temporal post-filtering. Multimedia, IEEE Transactions on, vol.12, issue.4, pp.257-266, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00604034

J. W. Earl, Tangential sensitivity analysis of watermarks using prior information, Security, Steganography, and Watermarking of Multimedia Contents IX, p.650519, 2007.
DOI : 10.1117/12.704704

M. A. Fischler and R. C. Bolles, Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography, Communications of the ACM, vol.24, issue.6, pp.381-395, 1981.
DOI : 10.1145/358669.358692

J. H. Friedman, J. L. Bentley, and R. A. , An Algorithm for Finding Best Matches in Logarithmic Expected Time, ACM Transactions on Mathematical Software, vol.3, issue.3, pp.209-226, 1977.
DOI : 10.1145/355744.355745

N. Gengembre and S. Berrani, The Orange Labs real time video copy detection system -TRECVID 2008 results, TRECVID, 2008.

A. Gionis, P. Indyk, and R. Motwani, Similarity search in high dimensions via hashing, Proceedings of the 25th International Conference on Very Large Data Bases, VLDB '99, pp.518-529, 1999.

A. Guttman, R-trees: A dynamic index structure for spatial searching, Proceedings of Annual Meeting, pp.47-57, 1984.

J. Harel, C. Koch, and P. Perona, Graph-based visual saliency, Advances in Neural Information Processing Systems, pp.545-552, 2007.

C. Harris and M. Stephens, A combined corner and edge detection, Proceedings of The Fourth Alvey Vision Conference, pp.147-151, 1988.

J. He, Z. Lin, L. Wang, and X. Tang, Detecting Doctored JPEG Images Via DCT Coefficient Analysis, Proceedings of the 9th European conference on Computer Vision -Volume Part III, ECCV'06, pp.423-435, 2006.
DOI : 10.1007/11744078_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.9972

M. Hill, G. Hua, B. Huang, M. Merler, A. Natsev et al., IBM research TRECVID-2010 video copy detection and multimedia event detection system, TRECVID, 2010.

C. Hsu, C. Lu, and S. Pei, Secure and robust SIFT, Proceedings of the seventeen ACM international conference on Multimedia, MM '09, pp.637-640, 2009.
DOI : 10.1145/1631272.1631376

L. Huston, R. Sukthankar, and Y. Ke, Evaluating Keypoint Methods for Content-Based Copyright Protection of Digital Images, 2005 IEEE International Conference on Multimedia and Expo, 2005.
DOI : 10.1109/ICME.2005.1521614

H. Jégou, M. Douze, G. Gravier, C. Schmid, and P. Gros, INRIA LEAR- TEXMEX: Video copy detection task, TRECVID, 2010.

H. Jegou, M. Douze, and C. Schmid, Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search, Proceedings of the 10th European Conference on Computer Vision: Part I, ECCV '08, pp.304-317, 2008.
DOI : 10.1007/978-3-540-88682-2_24

URL : https://hal.archives-ouvertes.fr/inria-00316866

H. Jégou, M. Douze, and C. Schmid, Packing bag-of-features, 2009 IEEE 12th International Conference on Computer Vision, 2009.
DOI : 10.1109/ICCV.2009.5459419

H. Jégou, M. Douze, and C. Schmid, Improving Bag-of-Features for Large Scale Image Search, International Journal of Computer Vision, vol.42, issue.3, pp.316-336, 2010.
DOI : 10.1007/s11263-009-0285-2

M. Johnson, K. Ramchandran, and R. Sukthankar, Dither-based secure image hashing using distributed coding PCA-SIFT: a more distinctive representation for local image descriptors, Image Processing Proceedings. 2003 International Conference on Computer Vision and Pattern Recognition Proceedings of the 2004 IEEE Computer Society Conference on, pp.751-755, 2003.

Y. Ke, R. Sukthankar, and L. Huston, An efficient parts-based near-duplicate and sub-image retrieval system, Proceedings of the 12th annual ACM international conference on Multimedia , MULTIMEDIA '04, pp.869-876, 2004.
DOI : 10.1145/1027527.1027729

A. Kerckhoffs, La cryptographie militaire, Journal des sciences militaires, vol.9, pp.5-38, 1883.

M. Kokare, P. Biswas, and B. Chatterji, Texture image retrieval using rotated wavelet filters, Pattern Recognition Letters, vol.28, issue.10, pp.1240-1249, 2007.
DOI : 10.1016/j.patrec.2007.02.006

S. Kozat, R. Venkatesan, and M. Mihcak, Robust perceptual image hashing via matrix invariants, 2004 International Conference on Image Processing, 2004. ICIP '04., pp.3443-3446, 2004.
DOI : 10.1109/ICIP.2004.1421855

J. Law-to, L. Chen, A. Joly, I. Laptev, O. Buisson et al., Video copy detection, Proceedings of the 6th ACM international conference on Image and video retrieval, CIVR '07, pp.371-378, 2007.
DOI : 10.1145/1282280.1282336

S. Lazebnik, C. Schmid, and J. Ponce, Sparse texture representation using affine-invariant neighborhoods, International Conference on Computer Vision & Pattern Recognition, pp.319-324, 2003.
DOI : 10.1109/cvpr.2003.1211486

URL : https://hal.archives-ouvertes.fr/inria-00548232

H. Lejsek, F. Asmundsson, B. Jonsson, and L. Amsaleg, NV-Tree, Proceedings of the 1st ACM International Conference on Multimedia Retrieval, ICMR '11, pp.31869-883, 2009.
DOI : 10.1145/1991996.1992050

URL : https://hal.archives-ouvertes.fr/hal-00644939

H. Lejsek, F. H. Asmundsson, B. T. Jónsson, and L. Amsaleg, Scalability of local image descriptors, Proceedings of the 14th annual ACM international conference on Multimedia , MULTIMEDIA '06, pp.589-598, 2006.
DOI : 10.1145/1180639.1180760

URL : https://hal.archives-ouvertes.fr/inria-00175234

Y. Liang, B. Cao, J. Li, C. Zhu, Y. Zhang et al., Athu-img at trecvid, TRECVID, 2009.

K. Liu, C. Giannella, and H. Kargupta, An Attacker???s View of Distance Preserving Maps for Privacy Preserving Data Mining, Knowledge Discovery in Databases: PKDD 2006, pp.297-308
DOI : 10.1007/11871637_30

Z. Liu, T. Liu, D. C. Gibbon, and B. Shahraray, Effective and scalable video copy detection, Proceedings of the international conference on Multimedia information retrieval, MIR '10, pp.119-128, 2010.
DOI : 10.1145/1743384.1743409

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.7773

Z. Liu, T. Liu, and B. Shahraray, AT&T Research at TRECVID 2009 content-based copy detection, TRECVID, 2009.

Z. Liu, E. Zavesky, N. Sawant, and B. Shahraray, AT&T research at trecvid 2010, TRECVID, 2010.

D. Lowe, Demo software: Sift keypoint detector, 2005.

D. G. Lowe, Distinctive Image Features from Scale-Invariant Keypoints, International Journal of Computer Vision, vol.60, issue.2, pp.91-110, 2004.
DOI : 10.1023/B:VISI.0000029664.99615.94

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4931

C. Lu, S. Sun, C. Hsu, and P. Chang, Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. Multimedia, IEEE Transactions on, vol.8, issue.4, pp.668-685, 2006.

J. B. Macqueen, Some methods of classification and analysis of multivariate observations, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967.

M. Malkin and R. Venkatesan, The randlet transform: Applications to universal perceptual hashing and image identification, Proc of the Annual Allerton Conference on Communications, Control, and Computing, 2004.

Y. Mao and M. Wu, Unicity distance of robust image hashing. Information Forensics and Security, IEEE Transactions on, vol.2, issue.3, pp.462-467, 2007.

K. Mikolajczyk and C. Schmid, An Affine Invariant Interest Point Detector, Proceedings of the 7th European Conference on Computer Vision-Part I, ECCV '02, pp.128-142, 2002.
DOI : 10.1007/3-540-47969-4_9

URL : https://hal.archives-ouvertes.fr/inria-00548252

K. Mikolajczyk and C. Schmid, Scale & Affine Invariant Interest Point Detectors, International Journal of Computer Vision, vol.60, issue.1, pp.63-86, 2004.
DOI : 10.1023/B:VISI.0000027790.02288.f2

URL : https://hal.archives-ouvertes.fr/inria-00548554

K. Mikolajczyk and C. Schmid, A performance evaluation of local descriptors . Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.27, issue.10, pp.1615-1630, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00548227

R. Mukai, T. Kurozumi, K. Hiramatsu, T. Kawanishi, H. Nagano et al., NTT communication science laboratories at TRECVID 2010 content-based copy detection, TRECVID, 2010.

P. C. Na, L. Pérez-freire, and F. Pérez-gonzález, Blind newton sensitivity attack, IEE Proceedings on Information Security, pp.115-125, 2006.

C. W. Ngo, S. A. Zhu, H. K. Tan, W. L. Zhao, and X. Y. Wei, VIREO at TRECVID 2010: Semantic indexing, known-item search, and content-based copy detection, TRECVID, 2010.

A. Oliva and A. Torralba, Modeling the shape of the scene: A holistic representation of the spatial envelope, International Journal of Computer Vision, vol.42, issue.3, pp.145-175, 2001.
DOI : 10.1023/A:1011139631724

S. R. Oliveira and O. R. Za¨?aneza¨?ane, Privacy preserving clustering by data transformation, pp.304-318, 2003.

O. Orhan, J. Hochreiter, J. Poock, Q. Chen, A. Chabra et al., University of central florida at TRECVID 2008 content based copy detection and surveillance event detection, TRECVID, 2008.

P. Over, G. Awad, M. Michel, J. Fiscus, W. Kraaij et al., TRECVID 2011 -an overview of the goals, tasks, data, evaluation mechanisms and metrics, TRECVID, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00763912

F. A. Petitcolas, R. J. Anderson, and M. G. Kuhn, Attacks on Copyright Marking Systems, Proceedings of the Second International Workshop on Information Hiding, pp.218-238, 1998.
DOI : 10.1007/3-540-49380-8_16

J. Philbin, O. Chum, M. Isard, J. Sivic, and A. Zisserman, Object retrieval with large vocabularies and fast spatial matching, 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-8, 2007.
DOI : 10.1109/CVPR.2007.383172

S. Poullot, M. Crucianu, and O. Buisson, Scalable mining of large video databases using copy detection, Proceeding of the 16th ACM international conference on Multimedia, MM '08, pp.61-70, 2008.
DOI : 10.1145/1459359.1459368

URL : https://hal.archives-ouvertes.fr/hal-01125547

E. Rosten and T. Drummond, Machine Learning for High-Speed Corner Detection, Proceedings of the 9th European conference on Computer Vision - Volume Part I, ECCV'06, pp.430-443, 2006.
DOI : 10.1007/11744023_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3991

S. Roy and Q. Sun, Robust Hash for Detecting and Localizing Image Tampering, 2007 IEEE International Conference on Image Processing, pp.117-120, 2007.
DOI : 10.1109/ICIP.2007.4379535

J. Sivic and A. Zisserman, Video Google: a text retrieval approach to object matching in videos, Proceedings Ninth IEEE International Conference on Computer Vision, p.1470, 2003.
DOI : 10.1109/ICCV.2003.1238663

M. Stricker and M. Swain, The capacity and the sensitivity of color histogram indexing, 1994.

C. Sun, J. Li, B. Zhang, and Q. Zhang, ATHU-IMG at TRECVID 2010, TRECVID, 2010.

M. J. Swain and D. H. Ballard, Color indexing, International Journal of Computer Vision, vol.31, issue.1, pp.11-32, 1991.
DOI : 10.1007/BF00130487

A. Swaminathan, Y. Mao, and M. Wu, Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on, vol.1, issue.2, pp.215-230, 2006.
DOI : 10.1109/tifs.2006.873601

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.8613

Q. H. Thu and M. Ghanbari, Scope of validity of PSNR in image/video quality assessment, Electronics Letters, pp.800-801, 2008.

E. Tola, V. Lepetit, and P. Fua, A fast local descriptor for dense matching, 2008 IEEE Conference on Computer Vision and Pattern Recognition, pp.1-8, 2008.
DOI : 10.1109/CVPR.2008.4587673

E. Tola, V. Lepetit, and P. Fua, Daisy: An efficient dense descriptor applied to wide-baseline stereo. Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.32, issue.5, pp.815-830, 2010.

S. Uchida, M. Sakazawa, M. Agrawal, and . Akbacak, Kddi labs and sri international at trecvid 2010: Content-based copy detection, TRECVID, 2008.

A. Vedaldi and B. Fulkerson, Vlfeat, Proceedings of the international conference on Multimedia, MM '10, pp.1469-1472, 2010.
DOI : 10.1145/1873951.1874249

J. Vila-forcen, S. Voloshynovskiy, O. J. Koval, F. Perez-gonzalez, and T. Pun, Worst-case additive attack against quantization-based data-hiding methods, Security, Steganography, and Watermarking of Multimedia Contents VII, pp.136-146, 2005.
DOI : 10.1117/12.586263

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9801

P. Weinzaepfel, H. Jegou, and P. Perez, Reconstructing an image from its local descriptors, CVPR 2011, pp.337-344, 2011.
DOI : 10.1109/CVPR.2011.5995616

URL : https://hal.archives-ouvertes.fr/inria-00566718

W. L. Zhao, D. Borth, and T. M. Breuel, Participation at TRECVID 2011 semantic indexing & content-based copy detection tasks, TRECVID, 2011.

.. Analysis-of-the-distractors-'size-for-policy#1, 91 List of Tables 5.1 Number of deleted and created keypoints by RMD, p.43

P. Average, P. Sn, and R. , 65 6.6 Number of keypoints for each category in attacked images . . . . 66 6.7 t P SN R in dB for the single attacks of the combination Number of keypoints on average over 1,000 images. Attacks are applied in sequel, p.70