???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Information Hiding, 13th International Workshop, pp.59-70, 2011. ,
DOI : 10.1007/978-3-642-16435-4_13
A comparative study of ±1 steganalyzers, Multimedia Signal Processing IEEE 10th Workshop on, pp.791-796, 2008. ,
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2627-2642, 2015. ,
DOI : 10.1109/TIFS.2015.2470220
Pevn`y. Is ensemble classifier needed for steganalysis in highdimensional feature spaces? In Information Forensics and Security (WIFS), IEEE, pp.1-6, 2015. ,
Practical Poissonian-Gaussian Noise Modeling and Fitting for Single-Image Raw-Data, IEEE Transactions on Image Processing, vol.17, issue.10, pp.1737-1754, 2008. ,
DOI : 10.1109/TIP.2008.2001399
URL : http://www.cs.tut.fi/~foi/papers/Foi-PoissonianGaussianClippedRaw-2007-IEEE_TIP.pdf
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
DOI : 10.1109/TIFS.2012.2190402
Kodovsk`y. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities, Proceedings of the 9th workshop on Multimedia & security, pp.3-14 ,
Low-complexity features for jpeg steganalysis using undecimated dct. Information Forensics and Security, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015. ,
DOI : 10.1109/tifs.2014.2364918
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1-13, 2014. ,
DOI : 10.1007/978-3-642-55760-6
URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-417X-2014-1?site=jis-eurasipjournals.springeropen.com
Pevn`y. Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, pp.45-58, 2013. ,
Pevn`y. A mishmash of methods for mitigating the model mismatch mess, Media Watermarking, Security, and Forensics, p.90280, 2014. ,
Effect of Image Downsampling on Steganographic Security, IEEE Transactions on Information Forensics and Security, vol.9, issue.5, pp.752-762, 2014. ,
DOI : 10.1109/TIFS.2014.2309054
Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.432-444, 2012. ,
Study of cover source mismatch in steganalysis and ways to mitigate its impact, Media Watermarking, Security, and Forensics, p.90280, 2014. ,
Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.215-224, 2010. ,
DOI : 10.1109/TIFS.2010.2045842
URL : https://hal.archives-ouvertes.fr/hal-00541410
Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016. ,
DOI : 10.1109/TIFS.2015.2486744
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, pp.15-23, 2015. ,
DOI : 10.1007/3-540-45496-9_21
High capacity despite better steganalysis: F5?a steganographic algorithm, Information Hiding: 4th International Workshop Proceedings, p.289, 2001. ,
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm, IEEE Transactions on Image Processing, vol.23, issue.5, pp.1980-1993, 2014. ,
DOI : 10.1109/TIP.2014.2310126
The new data and new challenges in multimedia research, 2015. ,
Toss that bossbase, alice! Society for Imaging Science and Technology, 2016. ,