P. Bas, T. Filler, and T. Pevný, Break Our Steganographic System -the ins and outs of organizing BOSS, 13th International Workshop. LNCS, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

M. Boroumand, M. Chen, and J. Fridrich, Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.14, pp.1181-1193, 2018.

, Conference on Acoustics, Speech and Signal Processing (ICASSP, pp.2122-2126

R. Cogranne, V. Sedighi, J. Fridrich, and T. Pevný, Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces, Information Forensics and Security (WIFS), 2015.
URL : https://hal.archives-ouvertes.fr/hal-02407684

T. Denemark and J. Fridrich, Model based steganography with precover. Electronic Imaging, vol.7, pp.56-66, 2017.

T. Filler, J. Judas, and J. Fridrich, Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. Information Forensics and Security, IEEE Transactions on, vol.6, pp.920-935, 2011.

J. Fridrich and J. Kodovsk?, Rich Models for Steganalysis of Digital Images, IEEE Transactions on, vol.7, issue.3, pp.868-882, 2012.

J. Fridrich and J. Kodovsk?, Multivariate Gaussian model for designing additive distortion for steganography, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2949-2953, 2013.

Q. Giboulot, R. Cogranne, and P. Bas, JPEG Steganography with side Information from the Processing Pipeline, International Conference on Acoustics, Speech, and Signal Processing, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02470179

M. Goljan and J. Fridrich, CFA-aware features for steganalysis of color images, Media Watermarking, Security, and Forensics, vol.9409, 2015.

L. Guo, J. Ni, W. Su, C. Tang, and Y. Shi, Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, vol.10, pp.2669-2680, 2015.

V. Holub and J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. Information Forensics and Security, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015.

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014.

A. D. Ker, Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, pp.45-58, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00836407

M. Kirchner and R. Böhme, Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3982-3986, 2014.

B. Li, M. Wang, J. Huang, and X. Li, A new cost function for spatial image steganography, International Conference on Image Processing, pp.4206-4210, 2014.

T. Pevný, P. Bas, and J. Fridrich, Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Trans. Inform. Forensics and Security, vol.5, pp.215-224, 2010.

V. Sedighi, R. Cogranne, and J. Fridrich, Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608

G. Simmons, The prisoners problem and the subliminal channel, CRYPTO, pp.51-67, 1983.

T. Taburet, L. Filstroff, P. Bas, and W. Sawaya, An empirical study of steganography and steganalysis of color images in the JPEG domain, International Workshop on Digital Watermarking, pp.290-303, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01904482

R. Than-han-thai, F. Cogranne, and . Retraint, Camera Model Identification Based on the Heteroscedastic Noise Model. Image Processing, IEEE Transactions on, vol.23, pp.250-263, 2014.

T. Taburet, P. Bas, W. Sawaya, and J. Fridrich, Natural Steganography in JPEG Domain with a Linear Development Pipeline, 2020.

S. Vahid, J. Fridrich, and R. Cogranne, Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Media Watermarking, Security, and Forensics, 2015.

M. Yedroudj, F. Comby, and M. Chaumont, Yedroudj-net: An efficient CNN for spatial steganalysis, Intl Conference on Acoustics, Speech and Signal Processing, 2018.