Break Our Steganographic System -the ins and outs of organizing BOSS, 13th International Workshop. LNCS, vol.6958, pp.59-70, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648057
Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.14, pp.1181-1193, 2018. ,
, Conference on Acoustics, Speech and Signal Processing (ICASSP, pp.2122-2126
Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces, Information Forensics and Security (WIFS), 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02407684
Model based steganography with precover. Electronic Imaging, vol.7, pp.56-66, 2017. ,
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes. Information Forensics and Security, IEEE Transactions on, vol.6, pp.920-935, 2011. ,
Rich Models for Steganalysis of Digital Images, IEEE Transactions on, vol.7, issue.3, pp.868-882, 2012. ,
Multivariate Gaussian model for designing additive distortion for steganography, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2949-2953, 2013. ,
JPEG Steganography with side Information from the Processing Pipeline, International Conference on Acoustics, Speech, and Signal Processing, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02470179
CFA-aware features for steganalysis of color images, Media Watermarking, Security, and Forensics, vol.9409, 2015. ,
Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, vol.10, pp.2669-2680, 2015. ,
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT. Information Forensics and Security, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015. ,
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014. ,
Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, pp.45-58, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00836407
Steganalysis in Technicolor" Boosting WS detection of stego images from CFA-interpolated covers, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3982-3986, 2014. ,
A new cost function for spatial image steganography, International Conference on Image Processing, pp.4206-4210, 2014. ,
Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Trans. Inform. Forensics and Security, vol.5, pp.215-224, 2010. ,
Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01906608
The prisoners problem and the subliminal channel, CRYPTO, pp.51-67, 1983. ,
An empirical study of steganography and steganalysis of color images in the JPEG domain, International Workshop on Digital Watermarking, pp.290-303, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01904482
Camera Model Identification Based on the Heteroscedastic Noise Model. Image Processing, IEEE Transactions on, vol.23, pp.250-263, 2014. ,
, Natural Steganography in JPEG Domain with a Linear Development Pipeline, 2020.
, Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model. Media Watermarking, Security, and Forensics, 2015.
Yedroudj-net: An efficient CNN for spatial steganalysis, Intl Conference on Acoustics, Speech and Signal Processing, 2018. ,