, Learning and transferring representations for image steganalysis using convolutional neural network, IEEE International Conference on Image Processing (ICIP), pp.2752-2756, 2016.

H. Abdulrahman, M. Chaumont, P. Montesinos, and M. Baptiste, Color image steganalysis based on steerable Gaussian filters bank, The 4th ACM Workshop on Information Hiding and Multimedia Security, pp.109-114, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01374101

R. J. Anderson and F. A. Petitcolas, On the limits of steganography, IEEE Journal of Selected Areas in Communication, vol.16, issue.4, pp.474-481, 1998.

P. Bas, T. Filler, and T. Pevný, Break our steganographic system -the ins and outs of organizing BOSS, Information Hiding, 13th International Conference, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

P. Bas and T. Furon, , 2007.

M. Boroumand, M. Chen, and J. Fridrich, Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, 2018.

C. Cachin, An information-theoretic model for steganography. Information and Computation, vol.192, pp.41-56, 2004.

L. Chen, Y. Shi, and P. Sutthiwan, Variable multi-dimensional co-occurrence for steganalysis, Digital Forensics and Watermarking, 13th International Workshop, vol.9023, pp.559-573, 2014.

R. Cogranne, V. Sedighi, T. Pevný, and J. Fridrich, Is ensemble classifier needed for steganalysis in highdimensional feature spaces, IEEE International Workshop on Information Forensics and Security, 2015.

T. Denemark, M. Boroumand, and J. Fridrich, Steganalysis features for content-adaptive JPEG steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.8, pp.1736-1746, 2016.

T. Denemark and J. Fridrich, Improving selectionchannel-aware steganalysis features, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, 2016.

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, Selection-channel-aware rich model for steganalysis of digital images, IEEE International Workshop on Information Forensics and Security, 2014.

T. Filler, A. D. Ker, and J. Fridrich, The Square Root Law of steganographic capacity for Markov covers, Proceedings SPIE, Electronic Imaging, Media Forensics and Security, vol.7254, pp.8-9, 2009.

J. Fridrich and J. Kodovský, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2011.

M. Goljan, R. Cogranne, and J. Fridrich, Rich model for steganalysis of color images, Sixth IEEE International Workshop on Information Forensics and Security, 2014.

V. Holub and J. Fridrich, Low-complexity features for JPEG steganalysis using undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015.

A. D. Ker, The square root law of steganography: Bringing theory closer to practice, The 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, 2017.

A. D. Ker, On the relationship between embedding costs and steganographic capacity, The 6th ACM Workshop on Information Hiding and Multimedia Security, 2018.

A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, The Square Root Law of steganographic capacity

J. Ker, J. Dittmann, and . Fridrich, Proceedings of the 10th ACM Multimedia & Security Workshop, pp.107-116, 2008.

J. Kodovský and J. Fridrich, Steganalysis of JPEG images using rich models, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2012, vol.8303, pp.0-1, 2012.

M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin, Low-complexity image denoising based on statistical modeling of wavelet coefficients, IEEE Signal Processing Letters, vol.6, issue.12, pp.300-303, 1999.

P. Moulin and Y. Wang, New results on steganographic capacity, Proceedings of the Conference on Information Sciences and Systems, 2004.

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep learning for steganalysis via convolutional neural networks, Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics, vol.9409, pp.0-1, 2015.

V. Sedighi, R. Cogranne, and J. Fridrich, Contentadaptive steganography by minimizing statistical detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608

X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, Steganalysis of adaptive JPEG steganography using 2D Gabor filters, The 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, 2015.

Y. Wang and P. Moulin, Perfectly secure steganography: Capacity, error exponents, and code constructions, IEEE Transactions on Information Theory, Special Issue on Security, vol.55, issue.6, pp.2706-2722, 2008.

G. Xu, Deep convolutional neural network to detect J-UNIWARD, The 5th ACM Workshop on Information Hiding and Multimedia Security, 2017.

G. Xu, H. Wu, and Y. Q. Shi, Ensemble of CNNs for steganalysis: An empirical study, The 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '16, pp.5-10, 2016.

G. Xu, H. Z. Wu, and Y. Q. Shi, Structural design of convolutional neural networks for steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016.

J. Yang, K. Liu, X. Kang, E. Wong, and Y. Shi, Steganalysis based on awareness of selection-channel and deep learning, Internartional Workshop on Digital Forensics and Watermarking, vol.10431, pp.263-272, 2017.
DOI : 10.1007/978-3-319-64185-0_20

J. Yang, Y. Shi, E. K. Wong, and X. Kang, JPEG steganalysis based on densenet, 2017.

J. Ye, J. Ni, and Y. Yi, Deep learning hierarchical representations for image steganalysis, IEEE Transactions on Information Forensics and Security, vol.12, issue.11, pp.2545-2557, 2017.
DOI : 10.1109/tifs.2017.2710946

M. Yedroudj, F. Comby, and M. Chaumont, Yedroudjnet: An efficient CNN for spatial steganalysis, Canada, 2018.
DOI : 10.1109/icassp.2018.8461438

J. Zeng, S. Tan, B. Li, and J. Huang, Large-scale JPEG image steganalysis using hybrid deep-learning framework, IEEE Transactions on Information Forensics and Security, vol.13, issue.5, pp.1200-1214, 2018.
DOI : 10.1109/tifs.2017.2779446

URL : http://arxiv.org/pdf/1611.03233