Break Our Steganographic System -the ins and outs of organizing BOSS, Information Hiding, 13th International Workshop, vol.6958, pp.59-70, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648057
Two key estimation techniques for the Broken Arrows watermarking scheme, MM&Sec '09: Proceedings of the 11th ACM workshop on Multimedia and security, pp.1-8, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00384058
Facing the Cover-Source Mismatch on JPHide Using Training-Set Design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '18), pp.17-22, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01833873
Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces, Information Forensics and Security (WIFS), pp.1-6, 2015. ,
Blind Newton Sensitivity Attack, IEE Proceedings on Information Security, vol.153, issue.3, pp.115-125, 2006. ,
Image forgery detection through residual-based local descriptors and block-matching, 2014 IEEE international conference on image processing (ICIP), pp.5297-5301, 2014. ,
DOI : 10.1109/icip.2014.7026072
Image forgery localization through the fusion of camera-based, feature-based and pixel-based techniques, 2014 IEEE International Conference on Image Processing (ICIP), pp.5302-5306, 2014. ,
, Noiseprint: a CNN-based camera model fingerprint, 2018.
DOI : 10.1109/tifs.2019.2916364
URL : http://arxiv.org/pdf/1808.08396
The Square Root Law of Steganographic Capacity for Markov Covers, Media Forensics and Security XI, vol.7254, pp.801-0811, 2009. ,
Rich models for steganalysis of digital images, IEEE Transactions on, vol.7, pp.868-882, 2012. ,
DOI : 10.1109/tifs.2012.2190402
URL : http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf
Statistically Undetectable Jpeg Steganography: Dead Ends Challenges, and Opportunities, Proceedings of the 9th Workshop on Multimedia & Security (MM&Sec '07), pp.3-14, 2007. ,
DOI : 10.1145/1288869.1288872
Broken Arrows, EURASIP Journal on Information Security, 2008. ,
DOI : 10.1155/2008/597040
URL : https://hal.archives-ouvertes.fr/hal-00335311
Steganalysis into the Wild: How to Define a Source, Media Watermarking, Security, and Forensics (Proc. IS&T), pp.318-319, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01687201
Roots and Solutions of Cover-Source Mismatch in Image Steganalysis: a Comprehensive Study, pp.1-4, 2015. ,
, Payload Scaling for Adaptive Steganography: An Empirical Study. submitted, pp.1-4, 2019.
Rich Model for Steganalysis of Color Images, Proc. IEEE WIFS, 2014. ,
DOI : 10.1109/wifs.2014.7084325
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO), International Workshop on Information Hiding, pp.71-84, 2011. ,
DOI : 10.1007/978-3-642-24178-9_6
An efficient JPEG steganographic scheme using uniform embedding, Information Forensics and Security (WIFS), pp.169-174, 2012. ,
DOI : 10.1109/wifs.2012.6412644
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. Information Forensics and Security, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015. ,
DOI : 10.1109/tifs.2014.2364918
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014. ,
DOI : 10.1186/1687-417x-2014-1
URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-417X-2014-1
The Square Root Law in Stegosystems with Imperfect Information, Information Hiding, vol.6387, pp.145-160, 2010. ,
DOI : 10.1007/978-3-642-16435-4_12
URL : http://web.comlab.ox.ac.uk/oucl/work/andrew.ker/docs/ADK42B.pdf
On the Relationship Between Embedding Costs and Steganographic Capacity, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp.115-120, 2018. ,
Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security (IH&MMSec '13, pp.45-58, 2013. ,
DOI : 10.1145/2482513.2482965
URL : https://hal.archives-ouvertes.fr/hal-00836407
Identifying a steganographer in realistic and heterogeneous data sets, Media Watermarking, Security, and Forensics 2012, vol.8303, p.83030, 2012. ,
DOI : 10.1117/12.910565
The square root law of steganographic capacity, Proceedings of the 10th ACM workshop on Multimedia and security (MM&Sec '08), pp.107-116, 2008. ,
Steganalysis in Technicolor: Boosting WS Detection of Stego Images from CFA-Interpolated Covers, Proc. IEEE ICASSP, 2014. ,
Ensemble Classifiers for Steganalysis of Digital Media. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.432-444, 2012. ,
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Lecture Notes in Computer Science, vol.6387, pp.161-177, 2010. ,
Towards dependable steganalysis, International Society for Optics and Photonics, vol.9409, p.94090, 2015. ,
The first BOWS contest: break our watermarking system, Security, Steganography, and Watermarking of Multimedia Contents IX, vol.6505, p.650516, 2007. ,
DOI : 10.1117/12.704969
A universal image forensic strategy based on steganalytic model, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp.165-170, 2014. ,
DOI : 10.1145/2600918.2600941
, Content-Adaptive Steganography by Minimizing Statistical Detectability. Information Forensics and Security, IEEE Transactions on, 2015.
DOI : 10.1109/tifs.2015.2486744
URL : https://hal.archives-ouvertes.fr/hal-01906608
Toss that BOSSbase, Alice!, Media Watermarking, Security, and Forensics (Proc. IS&T), pp.1-9, 2016. ,
DOI : 10.2352/issn.2470-1173.2016.8.mwsf-076
URL : https://hal.archives-ouvertes.fr/hal-01303577
The prisoners problem and the subliminal channel, CRYPTO, pp.51-67, 1983. ,
DOI : 10.1007/978-1-4684-4730-9_5
, IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge, 2018.
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain, Digital Forensics and Watermarking, pp.290-303, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01904482
Steganalyzing Images of Arbitrary Size with CNNs. Electronic Imaging, vol.7, pp.121-122, 2018. ,
DOI : 10.2352/issn.2470-1173.2018.07.mwsf-121
, Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Media Watermarking, Security, and Forensics 2015, Proc. SPIE 9409, 2015.
DOI : 10.1117/12.2080272
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients, Acoustics, Speech and Signal Processing (ICASSP), pp.1785-1788, 2012. ,
, Yahoo! Webscope dataset YFCC-100M, 2014.
A Regression-Based Restoration Technique for Automated Watermark Removal, Proc. of ACM Multimedia and Security Workshop, pp.215-219, 2008. ,
DOI : 10.1145/1411328.1411364
Better security levels for Broken Arrows, IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics, pp.75410-75410, 2010. ,
DOI : 10.1117/12.838895
URL : https://hal.archives-ouvertes.fr/hal-00472982
Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, Proc. ACM IH&MMSec, 2019. ,