M. Barni, G. Cancelli, and A. Esposito, Forensics aided steganalysis of heterogeneous images, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1690-1693

P. Bas, T. Filler, and T. Pevný, Break our steganographic system -the ins and outs of organizing boss, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

D. Borghys, P. Bas, and H. Bruyninckx, Facing the cover-source mismatch on jphide using training-set design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '18, pp.17-22, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01833873

M. Boroumand and J. Fridrich, Scalable processing history detector for jpeg images, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics

G. Cancelli, G. Doerr, I. Cox, and M. Barni, Detection of ±1 LSB steganography based on the amplitude of histogram local extrema, in: Image Processing, 15th IEEE International Conference on, pp.1288-1291, 2008.

R. Cogranne and J. Fridrich, Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory, Information Forensics and Security, IEEE Transactions on, 2015.

R. Cogranne, Q. Giboulot, and P. Bas, The alaska steganalysis challenge: A first step towards steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'19, pp.125-137, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02147763

R. Cogranne, V. Sedighi, J. Fridrich, and T. Pevný, Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?, in: Information Forensics and Security (WIFS), IEEE 7th International Workshop on, pp.1-6

T. Filler, J. Judas, and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, Information Forensics and Security, IEEE Transactions on, vol.6, pp.920-935, 2011.

D. A. Fish, A. M. Brinicombe, E. R. Pike, and J. G. Walker, Blind deconvolution by means of the richardson-lucy algorithm, J. Opt. Soc. Am. A, vol.12, pp.58-65, 1995.

A. Foi, M. Trimeche, V. Katkovnik, and K. Egiazarian, Practical poissoniangaussian noise modeling and fitting for single-image raw-data, Image Processing, IEEE Transactions on, vol.17, pp.1737-1754, 2008.

A. Forsey and S. Gungor, Demosaicing images from colour cameras for digital image correlation, Optics and Lasers in Engineering, vol.86, pp.20-28, 2016.

J. Fridrich and J. Kodovsk?, Rich models for steganalysis of digital images, Information Forensics and Security, IEEE Transactions on, vol.7, pp.868-882, 2012.

J. Fridrich, T. Pevný, and J. Kodovský, Statistically undetectable jpeg steganography: Dead ends challenges, and opportunities, pp.3-14, 2007.

Q. Giboulot, R. Cogranne, and P. Bas, Steganalysis into the wild: How to define a source?, in: Media Watermarking, Security, and Forensics, Proc. IS&T, pp.318-319
URL : https://hal.archives-ouvertes.fr/hal-01685050

M. Goljan, J. Fridrich, and T. Holotyak, New blind steganalysis and its implications, in: in Proc. of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, pp.1-13

V. Holub and J. Fridrich, Low-complexity features for jpeg steganalysis using undecimated dct, Information Forensics and Security, IEEE Transactions on, vol.10, pp.219-228, 2015.

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, pp.1-13, 2014.

X. Hou, T. Zhang, G. Xiong, and B. Wan, Forensics aided steganalysis of heterogeneous bitmap images with different compression history, KSII Transactions on Internet and Information Systems (TIIS), vol.6, pp.1926-1945, 2012.

, Photography -Digital still cameras -Determination of exposure index, ISO speed ratings, standard output sensitivity, and recommended exposure index, Standard, International Organization for Standardization, ISO 12232:2006(E), 2006.

A. Ker and T. Pevny, The steganographer is the outlier: Realistic large-scale steganalysis, Information Forensics and Security, IEEE Transactions on, vol.9, pp.1424-1435, 2014.

A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver et al., Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, IH&MMSec '13, pp.45-58, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00836407

A. D. Ker and T. Pevný, A mishmash of methods for mitigating the model mismatch mess, Media Watermarking, Security, and Forensics, vol.9028, pp.1601-1615, 2014.

J. Kodovsk? and J. Fridrich, Steganalysis of jpeg images using rich models, Media Forensics and Security, Proc. SPIE, vol.8303, pp.83030-83030

J. Kodovsky and J. Fridrich, Effect of image downsampling on steganographic security, IEEE Transactions on Information Forensics and Security, vol.9, pp.752-762, 2014.

J. Kodovsk?, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, Information Forensics and Security, IEEE Transactions on, vol.7, pp.432-444, 2012.

J. Kodovský, V. Sedighi, and J. Fridrich, Study of cover source mismatch in steganalysis and ways to mitigate its impact, Media Watermarking, Security, and Forensics, volume 9028 of Proc. SPIE, p.90280

X. Kong, C. Feng, M. Li, and Y. Guo, Iterative multi-order feature alignment for jpeg mismatched steganalysis, Neurocomputing, vol.214, pp.458-470, 2016.

X. Li, X. Kong, B. Wang, Y. Guo, and X. You, Generalized transfer component analysis for mismatched jpeg steganalysis, 2013 IEEE International Conference on Image Processing, pp.4432-4436

I. Lubenko and A. D. Ker, Steganalysis with mismatched covers: Do simple classifiers help?, Proceedings of the on Multimedia and Security, MM&Sec '12, pp.11-18, 2012.

F. Marra, G. Poggi, C. Sansone, and L. Verdoliva, A study of co-occurrence based local features for camera model identification, Multimedia Tools and Applications, vol.76, pp.4765-4781, 2017.

T. T. Nguyen and S. Oraintara, The shiftable complex directional pyramid-part ii: Implementation and applications, IEEE Transactions on Signal Processing, vol.56, pp.4661-4672, 2008.

J. Pasquet, S. Bringay, and M. Chaumont, Steganalysis with cover-source mismatch and a small learning database, 2014 22nd European Signal Processing Conference (EUSIPCO), pp.2425-2429
URL : https://hal.archives-ouvertes.fr/lirmm-01234249

T. Pevný, T. Filler, and P. Bas, Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, vol.6387, pp.161-177, 2010.

A. Polesel, G. Ramponi, and V. J. Mathews, Image enhancement via adaptive unsharp masking, IEEE Transactions on Image Processing, vol.9, pp.505-510, 2000.

X. Qiu, H. Li, W. Luo, and J. Huang, A universal image forensic strategy based on steganalytic model, Proc. IH&MMSEC

W. H. Richardson, Bayesian-based iterative method of image restoration *, J. Opt. Soc. Am, vol.62, pp.55-59, 1972.

V. Sedighi, J. J. Fridrich, R. Cogranne, and . Toss, Media Watermarking, Security, and Forensics, Proc. IS&T, pp.1-9

T. H. Thai, R. Cogranne, and F. Retraint, Statistical model of quantized DCT coefficients : Application in the steganalysis of jsteg algorithm, Image Processing, IEEE Transactions on, vol.23, pp.1-14, 2014.