P. Bas, T. Filler, and T. Pevný, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Information Hiding , 13th International Conference, pp.59-70, 2011.
DOI : 10.1007/978-3-642-24178-9_5

R. Böhme, Advanced Statistical Steganalysis, 2010.
DOI : 10.1007/978-3-642-14313-7

R. Cogranne and J. Fridrich, Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2627-2642, 2015.
DOI : 10.1109/TIFS.2015.2470220

T. Denemark and J. Fridrich, Improving Steganographic Security by Synchronizing the Selection Channel, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15
DOI : 10.1145/2756601.2756620

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), 2014.
DOI : 10.1109/WIFS.2014.7084302

T. Filler, J. Judas, and J. Fridrich, Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011.
DOI : 10.1109/TIFS.2011.2134094

J. Fridrich and J. Kodovský, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2011.
DOI : 10.1109/TIFS.2012.2190402

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012.
DOI : 10.1109/WIFS.2012.6412655

V. Holub, J. Fridrich, and T. Denemark, Universal distortion design for steganography in an arbitrary domain, EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014.

J. Kodovský, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

B. Li, M. Wang, and J. Huang, A new cost function for spatial image steganography, 2014 IEEE International Conference on Image Processing (ICIP), 2014.
DOI : 10.1109/ICIP.2014.7025854

B. Li, M. Wang, X. Li, S. Tan, and J. Huang, A strategy of clustering modification directions in spatial image steganography, IEEE Transactions on Information Forensics and Security, vol.10, issue.9, pp.1905-1917, 2015.

T. Pevný and A. D. Ker, Towards dependable steganalysis, Proceedings SPIE, Electronic Imaging, Media Watermarking , Security, and Forensics 2015, 2015.

V. Sedighi, R. Cogranne, and J. Fridrich, Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
DOI : 10.1109/TIFS.2015.2486744

V. Sedighi, J. Fridrich, and R. Cogranne, Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, 2015.