Moving steganography and steganalysis from the laboratory into the real world, Proc. of ACM IH&MMSec, pp.45-58, 2013. ,
New blind steganalysis and its implications, Proc. Electronic Imaging, SPIE, pp.1-13, 2006. ,
DOI : 10.1117/12.643254
URL : http://www.ws.binghamton.edu/fridrich/Research/EI06-6072-1.pdf
Break our steganographic system -the ins and outs of organizing boss, Information Hiding, pp.59-70, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648057
Study of cover source mismatch in steganalysis and ways to mitigate its impact, Electronic Imaging, volume 9028 of Proc. SPIE, p.90280, 2014. ,
Effect of image downsampling on steganographic security, IEEE Trans. on Information Forensics and Security, vol.9, issue.5, pp.752-762, 2014. ,
DOI : 10.1109/tifs.2014.2309054
Toss that bossbase, alice! In Electronic Imaging, Proc. IS&T, 2016. ,
DOI : 10.2352/issn.2470-1173.2016.8.mwsf-076
Steganalysis into the wild: How to define a source, Electronic Imaging, Proc. IS&T, pp.318-319, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01687201
Facing the cover-source mismatch on jphide using training-set design, Proc. of ACM IH&MMSec, pp.17-22, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01833873
Roots and solutions of cover-source mismatch in image steganalysis: a comprehensive study, IEEE Trans. on Information Forensics and Security, 2019. ,
Forensics aided steganalysis of heterogeneous images, Proc. ICASSP, pp.1690-1693, 2010. ,
DOI : 10.1109/icassp.2010.5495494
Forensics aided steganalysis of heterogeneous bitmap images with different compression history, KSII Trans. on Internet and Information Systems (TIIS), vol.6, issue.8, pp.1926-1945, 2012. ,
Steganalysis with mismatched covers: Do simple classifiers help?, Proc. of the on Multimedia and Security, MM&Sec '12, pp.11-18, 2012. ,
DOI : 10.1145/2361407.2361410
A mishmash of methods for mitigating the model mismatch mess, Electronic Imaging, Proc. SPIE, vol.9028, pp.1601-1615, 2014. ,
Steganalysis with cover-source mismatch and a small learning database, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01234249
, Proc. EUSIPCO, pp.2425-2429, 2014.
Low-complexity features for jpeg steganalysis using undecimated dct. Information Forensics and Security, IEEE Trans. on, vol.10, issue.2, pp.219-228, 2015. ,
DOI : 10.1109/tifs.2014.2364918
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?, Proc. WIFS, pp.1-6, 2015. ,
Steganalysis of jpeg images: Breaking the f5 algorithm, Information Hiding, pp.310-323, 2003. ,