???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Information Hiding , 13th International Conference, pp.59-70, 2011. ,
DOI : 10.1007/978-3-642-24178-9_5
Advanced Statistical Steganalysis, 2010. ,
DOI : 10.1007/978-3-642-14313-7
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2627-2642, 2015. ,
DOI : 10.1109/TIFS.2015.2470220
Improving Steganographic Security by Synchronizing the Selection Channel, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15 ,
DOI : 10.1145/2756601.2756620
Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), 2014. ,
DOI : 10.1109/WIFS.2014.7084302
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011. ,
DOI : 10.1109/TIFS.2011.2134094
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2011. ,
DOI : 10.1109/TIFS.2012.2190402
Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), 2012. ,
DOI : 10.1109/WIFS.2012.6412655
Universal distortion design for steganography in an arbitrary domain, EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014. ,
Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012. ,
DOI : 10.1109/TIFS.2011.2175919
A new cost function for spatial image steganography, 2014 IEEE International Conference on Image Processing (ICIP), 2014. ,
DOI : 10.1109/ICIP.2014.7025854
A strategy of clustering modification directions in spatial image steganography, IEEE Transactions on Information Forensics and Security, vol.10, issue.9, pp.1905-1917, 2015. ,
Towards dependable steganalysis, Proceedings SPIE, Electronic Imaging, Media Watermarking , Security, and Forensics 2015, 2015. ,
Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016. ,
DOI : 10.1109/TIFS.2015.2486744
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, 2015. ,