P. Bas, T. Filler, and T. Pevný, Break Our Steganographic System -the ins and outs of organizing BOSS, Information Hiding, 13th International Workshop, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

P. Bas and A. Westfeld, Two key estimation techniques for the Broken Arrows watermarking scheme, MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security, pp.1-8, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00384058

D. Borghys, P. Bas, and H. Bruyninckx, Facing the Cover-Source Mismatch on JPHide Using Training-Set Design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '18), pp.17-22, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01833873

R. Cogranne, V. Sedighi, J. Fridrich, and T. Pevný, Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces, Information Forensics and Security (WIFS), pp.1-6, 2015.

P. Comesaña, L. P. Freire, and F. Pérez-gonzález, Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol.153, issue.3, pp.115-125, 2006.

D. Cozzolino, D. Gragnaniello, and L. Verdoliva, Image forgery detection through residual-based local descriptors and block-matching, 2014 IEEE international conference on image processing (ICIP), pp.5297-5301, 2014.
DOI : 10.1109/icip.2014.7026072

D. Cozzolino, D. Gragnaniello, and L. Verdoliva, Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques, 2014 IEEE International Conference on Image Processing (ICIP), pp.5302-5306, 2014.

D. Cozzolino and L. Verdoliva, Noiseprint: a CNN-based camera model fingerprint, 2018.
DOI : 10.1109/tifs.2019.2916364

URL : http://arxiv.org/pdf/1808.08396

T. Filler, A. D. Ker, and J. Fridrich, The Square Root Law of Steganographic Capacity for Markov Covers, Media Forensics and Security XI, vol.7254, pp.801-0811, 2009.

J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on, vol.7, pp.868-882, 2012.
DOI : 10.1109/tifs.2012.2190402

URL : http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf

J. Fridrich, T. Pevný, and R. Kodovský, Statistically Undetectable Jpeg Steganography: Dead Ends Challenges, and Opportunities, Proceedings of the 9th Workshop on Multimedia & Security (MM&Sec '07), pp.3-14, 2007.
DOI : 10.1145/1288869.1288872

T. Furon and P. Bas, Broken Arrows, EURASIP Journal on Information Security, 2008.
DOI : 10.1155/2008/597040

URL : https://hal.archives-ouvertes.fr/hal-00335311

Q. Giboulot, R. Cogranne, and P. Bas, Steganalysis into the Wild: How to Define a Source, Media Watermarking, Security, and Forensics (Proc. IS&T), pp.318-319, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01687201

Q. Giboulot, R. Cogranne, D. Borghys, and P. Bas, Roots and Solutions of Cover-Source Mismatch in Image Steganalysis: a Comprehensive Study, pp.1-4, 2015.

Q. Giboulot and J. Fridrich, Payload Scaling for Adaptive Steganography: An Empirical Study. submitted, pp.1-4, 2019.

M. Goljan, R. Cogranne, and J. Fridrich, Rich Model for Steganalysis of Color Images, Proc. IEEE WIFS, 2014.
DOI : 10.1109/wifs.2014.7084325

G. Gul and F. Kurugollu, A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO), International Workshop on Information Hiding, pp.71-84, 2011.
DOI : 10.1007/978-3-642-24178-9_6

L. Guo, J. Ni, and Y. Q. Shi, An efficient JPEG steganographic scheme using uniform embedding, Information Forensics and Security (WIFS), pp.169-174, 2012.
DOI : 10.1109/wifs.2012.6412644

V. Holub and J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. Information Forensics and Security, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015.
DOI : 10.1109/tifs.2014.2364918

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014.
DOI : 10.1186/1687-417x-2014-1

URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-417X-2014-1

A. Ker, The Square Root Law in Stegosystems with Imperfect Information, Information Hiding, vol.6387, pp.145-160, 2010.
DOI : 10.1007/978-3-642-16435-4_12

URL : http://web.comlab.ox.ac.uk/oucl/work/andrew.ker/docs/ADK42B.pdf

D. Andrew and . Ker, On the Relationship Between Embedding Costs and Steganographic Capacity, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp.115-120, 2018.

A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver et al., Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security (IH&MMSec '13, pp.45-58, 2013.
DOI : 10.1145/2482513.2482965

URL : https://hal.archives-ouvertes.fr/hal-00836407

A. Ker and T. Pevn?, Identifying a steganographer in realistic and heterogeneous data sets, Media Watermarking, Security, and Forensics 2012, vol.8303, p.83030, 2012.
DOI : 10.1117/12.910565

A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, The square root law of steganographic capacity, Proceedings of the 10th ACM workshop on Multimedia and security (MM&Sec '08), pp.107-116, 2008.

M. Kirchner and R. Böhme, Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers, Proc. IEEE ICASSP, 2014.

J. Kodovsk?, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.432-444, 2012.

T. Pevný, T. Filler, and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Lecture Notes in Computer Science, vol.6387, pp.161-177, 2010.

T. Pevn? and A. Ker, Towards dependable steganalysis, International Society for Optics and Photonics, vol.9409, p.94090, 2015.

A. Piva and M. Barni, The first BOWS contest: break our watermarking system, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.6505, p.650516, 2007.
DOI : 10.1117/12.704969

X. Qiu, H. Li, W. Luo, and J. Huang, A universal image forensic strategy based on steganalytic model, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp.165-170, 2014.
DOI : 10.1145/2600918.2600941

V. Sedighi, R. Cogranne, and J. Fridrich, Content-Adaptive Steganography by Minimizing Statistical Detectability. Information Forensics and Security, IEEE Transactions on, 2015.
DOI : 10.1109/tifs.2015.2486744

URL : https://hal.archives-ouvertes.fr/hal-01906608

V. Sedighi, J. Fridrich, and R. Cogranne, Toss that BOSSbase, Alice!, Media Watermarking, Security, and Forensics (Proc. IS&T), pp.1-9, 2016.
DOI : 10.2352/issn.2470-1173.2016.8.mwsf-076

URL : https://hal.archives-ouvertes.fr/hal-01303577

G. Simmons, The prisoners problem and the subliminal channel, CRYPTO, pp.51-67, 1983.
DOI : 10.1007/978-1-4684-4730-9_5

M. C. Stamm and P. Bestagini, IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge, 2018.

T. Taburet, L. Filstroff, P. Bas, and W. Sawaya, An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain, Digital Forensics and Watermarking, pp.290-303, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01904482

C. , F. Tsang, and J. Fridrich, Steganalyzing Images of Arbitrary Size with CNNs. Electronic Imaging, vol.7, pp.121-122, 2018.
DOI : 10.2352/issn.2470-1173.2018.07.mwsf-121

V. Sedighi, J. Fridrich, and R. Cogranne, Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Media Watermarking, Security, and Forensics 2015, Proc. SPIE 9409, 2015.
DOI : 10.1117/12.2080272

C. Wang and J. Ni, An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients, Acoustics, Speech and Signal Processing (ICASSP), pp.1785-1788, 2012.

. Yahoo!-webscope, Yahoo! Webscope dataset YFCC-100M, 2014.

A. Westfeld, A Regression-Based Restoration Technique for Automated Watermark Removal, Proc. of ACM Multimedia and Security Workshop, pp.215-219, 2008.
DOI : 10.1145/1411328.1411364

F. Xie, T. Furon, and C. Fontaine, Better security levels for Broken Arrows, IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, pp.75410-75410, 2010.
DOI : 10.1117/12.838895

URL : https://hal.archives-ouvertes.fr/hal-00472982

Y. Yousfi, J. Fridrich, J. Butora, and Q. Giboulot, Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, Proc. ACM IH&MMSec, 2019.