H. Abdulrahman, M. Chaumont, P. Montesinos, and B. Magnier, Color image steganalysis using correlations between rgb channels, Proc. 10th Int. Conf. on Availability, Reliability and Security (ARES), 4th Int. Workshop on Cyber Crime (IWCC), pp.448-454, 2015.

H. Abdulrahman, M. Chaumont, P. Montesinos, and B. Magnier, Color images steganalysis using rgb channel geometric transformation measures, Security and Communication Networks, vol.1, issue.2, p.12, 2016.
DOI : 10.1002/sec.1427

URL : https://hal.archives-ouvertes.fr/lirmm-01347460

P. Bas, T. Filler, and T. Pevn-`-pevn-`-y, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Inf. Hiding, 13th Int. Workshop, Lecture Notes in Computer Science, pp.59-70, 2011.
DOI : 10.1007/978-3-642-24178-9_5

T. Denemark and J. Fridrich, Improving Steganographic Security by Synchronizing the Selection Channel, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, pp.5-14, 2015.
DOI : 10.1145/2756601.2756620

W. T. Freeman and E. H. Adelson, The design and use of steerable filters, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.13, issue.9, pp.891-906, 1991.
DOI : 10.1109/34.93808

J. Fridrich and J. Kodovsk, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

J. Fridrich and M. Long, Steganalysis of LSB encoding in color images, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532), pp.1279-1282, 2000.
DOI : 10.1109/ICME.2000.871000

T. Gloe and R. Böhme, The dresden image database" for benchmarking digital image forensics, Proc. ACM Symp. on Applied Computing, pp.1584-1590, 2010.

M. Goljan and J. Fridrich, CFA-aware features for steganalysis of color images, Proc. IS&T/SPIE Electronic Imaging, Int. Society for Optics and Photonics (SPIE), p.page, 2015.

M. Goljan, J. Fridrich, R. J. Cogranne-]-j, W. A. Harmsen, and . Pearlman, Rich model for steganalysis of color images Steganalysis of additive-noise modelable information hiding, Proc. IEEE Int. Workshop on Inf. Forensics Security Proc. SPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, pp.185-190, 2003.

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1
DOI : 10.1186/1687-417X-2014-1

A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver et al., Pevn`Pevn`y. Moving steganography and steganalysis from the laboratory into the real world, Proc. 1st ACM workshop on Inf. hiding and multimedia security (IH&MMSec), pp.45-58, 2013.

M. Kirchner and R. Bohme, “Steganalysis in Technicolor” Boosting WS detection of stego images from CFA-interpolated covers, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3982-3986, 2014.
DOI : 10.1109/ICASSP.2014.6854349

J. Kodovsk-`-kodovsk-`-y, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

B. Li, J. He, J. Huang, and Y. Q. Shi, A survey on image steganography and steganalysis, J. of Inf. Hiding and Multimedia Signal Process, vol.2, pp.142-172, 2011.

B. Li, M. Wang, J. Huang, and X. Li, A new cost function for spatial image steganography, 2014 IEEE International Conference on Image Processing (ICIP), pp.4206-4210, 2014.
DOI : 10.1109/ICIP.2014.7025854

Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen et al., Image complexity and feature mining for steganalysis of least significant bit matching steganography, Information Sciences, vol.178, issue.1, pp.21-36, 2008.
DOI : 10.1016/j.ins.2007.08.007

Y. Miche, P. Bas, A. Lendasse, C. Jutten, and O. Simula, Reliable Steganalysis Using a Minimum Set of Samples and Features, EURASIP Journal on Information Security, vol.2009, issue.13, p.901381, 2009.
DOI : 10.1016/j.ins.2007.08.007

URL : https://hal.archives-ouvertes.fr/hal-00437868

T. Pevn-`-pevn-`-y, P. Bas, and J. Fridrich, Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.215-224, 2010.
DOI : 10.1109/TIFS.2010.2045842

T. Pevn-`-pevn-`-y, T. Filler, and P. Bas, Using high-dimensional image models to perform highly undetectable steganography

W. Tang, B. Li, W. Luo, and J. Huang, Clustering Steganographic Modification Directions for Color Components, IEEE Signal Processing Letters, vol.23, issue.2, pp.197-201, 2016.
DOI : 10.1109/LSP.2015.2504583

P. Thiyagarajan, G. Aghila, and V. P. Venkatesan, Steganalysis using color model conversion, Int. J. of Signal and Image Processing (SIPIJ), vol.2, issue.4, 2011.

A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, Proc. on Information Hiding 3rd Int. Workshop Lecture Notes in Computer Science, pp.61-76, 2000.
DOI : 10.1007/10719724_5