, Reverse JPEG compatibility attack, 2019.
Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on, vol.6, issue.3, pp.920-935, 2011. ,
Selection-channel-aware rich model for steganalysis of digital images, Information Forensics and Security (WIFS), pp.48-53, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-02362227
Is ensemble classifier needed for steganalysis in highdimensional feature spaces?, Information Forensics and Security (WIFS), pp.1-6, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02407684
Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory, Information Forensics and Security, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01915651
Reliable detection of LSB steganography in color and grayscale images, IEEE Multimedia, vol.8, pp.22-28, 2001. ,
Reliable steganalysis using a minimum set of samples and features, EURASIP Journal on Information Security, issue.1, p.901381, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00437868
A cover image model for reliable steganalysis, Information Hiding, 13th International Workshop, vol.6958, pp.178-192, 2011. ,
, Photography -Digital still cameras -Determination of exposure index, ISO speed ratings, standard output sensitivity, and recommended exposure index, ISO 12232:2006(E), 2006.
Estimation of primary quantization steps in double-compressed JPEG images using a statistical model of discrete cosine transform, IEEE Access, vol.7, pp.76203-76216, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02147761
Towards a theory of JPEG block convergence, 2018 25th IEEE International Conference on Image Processing (ICIP), pp.550-554, 2018. ,
, Testing Statistical Hypotheses, 2005.
Matched subspace detectors, IEEE Transactions on, vol.42, issue.8, pp.2146-2157, 1994. ,
Contentadaptive steganography by minimizing statistical detectability, Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01906608
An asymptotically uniformly most powerful test for LSB matching detection, IEEE Transactions on, vol.8, issue.3, pp.464-476, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-02297408
Break Our Steganographic System -the ins and outs of organizing BOSS, Information Hiding, 13th International Workshop, vol.6958, pp.59-70, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648057
The alaska steganalysis challenge: A first step towards steganalysis into the wild, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp.125-137, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02147763
Statistically undetectable JPEG steganography: Dead ends challenges, and opportunities, Proceedings of the 9th Workshop on Multimedia & Security, pp.3-14, 2007. ,
An efficient JPEG steganographic scheme based on the block entropy of dct coefficients, Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on, pp.1785-1788, 2012. ,
An efficient JPEG steganographic scheme using uniform embedding, Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, pp.169-174, 2012. ,
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1, pp.1-13, 2014. ,