P. Bas, T. Filler, and T. Pevný, Break our steganographic systemthe ins and outs of organizing boss, Information Hiding, 13th International Workshop, ser. Lecture Notes in Computer Science, vol.6958, pp.59-70, 2011.

A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver et al., Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, ser. IH&MMSec '13, pp.45-58, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00836407

V. Sedighi, J. J. Fridrich, and R. Cogranne, Toss that bossbase, alice, Media Watermarking, Security, and Forensics, ser. Proc. IS&T, pp.1-9, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01303577

Q. Giboulot, R. Cogranne, D. Borghys, and P. Bas, Effects and solutions of cover-source mismatch in image steganalysis, Signal Processing: Image Communication, vol.86, p.115888, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02631559

A. Piva and M. Barni, The first bows contest (break our watermarking system), Security, Steganography, and Watermarking of Multimedia Contents IX, vol.6505, p.650516, 2007.

T. Furon and P. Bas, Broken arrows, EURASIP Journal on Information Security, pp.1-13, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00335311

R. Cogranne, Q. Giboulot, and P. Bas, The alaska steganalysis challenge: A first step towards steganalysis"into the wild, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, ser. IH&#MMSec'19, pp.125-137, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02147763

J. Butora and J. Fridrich, Reverse jpeg compatibility attack (available as Early Access), IEEE Transactions on Information Forensics and Security, pp.1-1, 2019.

R. Cogranne, Selection-channel-aware reverse jpeg compatibility for highly reliable steganalysis of jpeg images, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2772-2776, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02460091

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1, pp.1-13, 2014.

L. Guo, J. Ni, W. Su, C. Tang, and Y. Shi, Using statistical image model for jpeg steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2669-2680, 2015.

R. Cogranne, Q. Giboulot, and P. Bas, Steganography by minimizing statistical detectability: The cases of jpeg and color images, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, ser. IH&#MMSec'20, pp.125-137, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02542075

V. Sedighi, R. Cogranne, and J. Fridrich, Content-adaptive steganography by minimizing statistical detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608

S. Vahid, J. Fridrich, and R. Cogranne, Content-adaptive pentary steganography using the multivariate generalized gaussian cover model, vol.9409, 2015.

R. Cogranne, V. Sedighi, and J. Fridrich, Practical strategies for contentadaptive batch steganography and pooled steganalysis, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2122-2126, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01915645

V. Holub and J. Fridrich, Low-complexity features for jpeg steganalysis using undecimated dct, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015.

R. Cogranne, V. Sedighi, J. Fridrich, and T. Pevný, Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?" in Information Forensics and Security (WIFS), IEEE 7th International Workshop on, pp.1-6, 2015.

M. Tan and Q. V. Le, Efficientnet: Rethinking model scaling for convolutional neural networks, Proc. of Intl' Conference on Machine Learning, ICML 2019, vol.97, pp.6105-6114, 2019.

J. Hu, L. Shen, and G. Sun, Squeeze-and-excitation networks, Proceedings of the IEEE conference on computer vision and pattern recognition, pp.7132-7141, 2018.

Y. Yousfi, J. Butora, E. Khvedchenya, and J. Fridrich, ImageNet Pretrained CNNs for JPEG Steganalysis, Information Forensics and Security (WIFS), 2020.

Y. Yousfi and J. Fridrich, An intriguing struggle of cnns in jpeg steganalysis and the onehot solution, IEEE Signal Processing Letters, vol.27, pp.830-834, 2020.

M. Boroumand, M. Chen, and J. Fridrich, Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.14, issue.5, pp.1181-1193, 2018.

S. Yun, D. Han, S. J. Oh, S. Chun, J. Choe et al., Cutmix: Regularization strategy to train strong classifiers with localizable features, Proceedings of the IEEE International Conference on Computer Vision, pp.6023-6032, 2019.

K. Chubachi, An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis, Information Forensics and Security (WIFS)

, IEEE International Workshop on Information Forensics and Security, vol.00