Forensics aided steganalysis of heterogeneous images, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1690-1693 ,
, Break our steganographic system -the ins and outs of organizing boss, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057
Facing the cover-source mismatch on jphide using training-set design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '18, pp.17-22, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01833873
Scalable processing history detector for jpeg images, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics ,
Detection of ±1 LSB steganography based on the amplitude of histogram local extrema, in: Image Processing, 15th IEEE International Conference on, pp.1288-1291, 2008. ,
Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory, Information Forensics and Security, IEEE Transactions on, 2015. ,
The alaska steganalysis challenge: A first step towards steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'19, pp.125-137, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02147763
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?, in: Information Forensics and Security (WIFS), IEEE 7th International Workshop on, pp.1-6 ,
Minimizing additive distortion in steganography using syndrome-trellis codes, Information Forensics and Security, IEEE Transactions on, vol.6, pp.920-935, 2011. ,
Blind deconvolution by means of the richardson-lucy algorithm, J. Opt. Soc. Am. A, vol.12, pp.58-65, 1995. ,
Practical poissoniangaussian noise modeling and fitting for single-image raw-data, Image Processing, IEEE Transactions on, vol.17, pp.1737-1754, 2008. ,
Demosaicing images from colour cameras for digital image correlation, Optics and Lasers in Engineering, vol.86, pp.20-28, 2016. ,
Rich models for steganalysis of digital images, Information Forensics and Security, IEEE Transactions on, vol.7, pp.868-882, 2012. ,
, Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities, pp.3-14, 2007.
Steganalysis into the wild: How to define a source?, in: Media Watermarking, Security, and Forensics, Proc. IS&T, pp.318-319 ,
URL : https://hal.archives-ouvertes.fr/hal-01685050
, New blind steganalysis and its implications, in: in Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp.1-13
Low-complexity features for jpeg steganalysis using undecimated dct, Information Forensics and Security, IEEE Transactions on, vol.10, pp.219-228, 2015. ,
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014. ,
Forensics aided steganalysis of heterogeneous bitmap images with different compression history, KSII Transactions on Internet and Information Systems (TIIS), vol.6, pp.1926-1945, 2012. ,
, Photography -Digital still cameras -Determination of exposure index, ISO speed ratings, standard output sensitivity, and recommended exposure index, Standard, International Organization for Standardization, ISO 12232:2006(E), 2006.
The steganographer is the outlier: Realistic large-scale steganalysis, Information Forensics and Security, IEEE Transactions on, vol.9, pp.1424-1435, 2014. ,
Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, pp.45-58, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00836407
A mishmash of methods for mitigating the model mismatch mess, Media Watermarking, Security, and Forensics, vol.9028, pp.1601-1615, 2014. ,
Steganalysis of jpeg images using rich models, Media Forensics and Security, Proc. SPIE, vol.8303, pp.83030-83030 ,
Effect of image downsampling on steganographic security, IEEE Transactions on Information Forensics and Security, vol.9, pp.752-762, 2014. ,
Ensemble classifiers for steganalysis of digital media, Information Forensics and Security, IEEE Transactions on, vol.7, pp.432-444, 2012. ,
Study of cover source mismatch in steganalysis and ways to mitigate its impact, Media Watermarking, Security, and Forensics, volume 9028 of Proc. SPIE, p.90280 ,
Iterative multi-order feature alignment for jpeg mismatched steganalysis, Neurocomputing, vol.214, pp.458-470, 2016. ,
Generalized transfer component analysis for mismatched jpeg steganalysis, 2013 IEEE International Conference on Image Processing, pp.4432-4436 ,
Steganalysis with mismatched covers: Do simple classifiers help?, Proceedings of the on Multimedia and Security, MM&Sec '12, pp.11-18, 2012. ,
A study of co-occurrence based local features for camera model identification, Multimedia Tools and Applications, vol.76, pp.4765-4781, 2017. ,
The shiftable complex directional pyramid-part ii: Implementation and applications, IEEE Transactions on Signal Processing, vol.56, pp.4661-4672, 2008. ,
Steganalysis with cover-source mismatch and a small learning database, 2014 22nd European Signal Processing Conference (EUSIPCO), pp.2425-2429 ,
URL : https://hal.archives-ouvertes.fr/lirmm-01234249
Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, vol.6387, pp.161-177, 2010. ,
Image enhancement via adaptive unsharp masking, IEEE Transactions on Image Processing, vol.9, pp.505-510, 2000. ,
A universal image forensic strategy based on steganalytic model, Proc. IH&MMSEC ,
Bayesian-based iterative method of image restoration *, J. Opt. Soc. Am, vol.62, pp.55-59, 1972. ,
, Media Watermarking, Security, and Forensics, Proc. IS&T, pp.1-9
Statistical model of quantized DCT coefficients : Application in the steganalysis of jsteg algorithm, Image Processing, IEEE Transactions on, vol.23, pp.1-14, 2014. ,