Break our steganographic systemthe ins and outs of organizing boss, Information Hiding, 13th International Workshop, ser. Lecture Notes in Computer Science, vol.6958, pp.59-70, 2011. ,
Moving steganography and steganalysis from the laboratory into the real world, Proceedings of the first ACM workshop on Information hiding and multimedia security, ser. IH&MMSec '13, pp.45-58, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00836407
Toss that bossbase, alice, Media Watermarking, Security, and Forensics, ser. Proc. IS&T, pp.1-9, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01303577
Effects and solutions of cover-source mismatch in image steganalysis, Signal Processing: Image Communication, vol.86, p.115888, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02631559
The first bows contest (break our watermarking system), Security, Steganography, and Watermarking of Multimedia Contents IX, vol.6505, p.650516, 2007. ,
Broken arrows, EURASIP Journal on Information Security, pp.1-13, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00335311
The alaska steganalysis challenge: A first step towards steganalysis"into the wild, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, ser. IH&#MMSec'19, pp.125-137, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02147763
Reverse jpeg compatibility attack (available as Early Access), IEEE Transactions on Information Forensics and Security, pp.1-1, 2019. ,
Selection-channel-aware reverse jpeg compatibility for highly reliable steganalysis of jpeg images, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2772-2776, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02460091
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1, pp.1-13, 2014. ,
Using statistical image model for jpeg steganography: uniform embedding revisited, IEEE Transactions on Information Forensics and Security, vol.10, issue.12, pp.2669-2680, 2015. ,
Steganography by minimizing statistical detectability: The cases of jpeg and color images, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, ser. IH&#MMSec'20, pp.125-137, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02542075
Content-adaptive steganography by minimizing statistical detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01906608
Content-adaptive pentary steganography using the multivariate generalized gaussian cover model, vol.9409, 2015. ,
Practical strategies for contentadaptive batch steganography and pooled steganalysis, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.2122-2126, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01915645
Low-complexity features for jpeg steganalysis using undecimated dct, IEEE Transactions on, vol.10, issue.2, pp.219-228, 2015. ,
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?" in Information Forensics and Security (WIFS), IEEE 7th International Workshop on, pp.1-6, 2015. ,
Efficientnet: Rethinking model scaling for convolutional neural networks, Proc. of Intl' Conference on Machine Learning, ICML 2019, vol.97, pp.6105-6114, 2019. ,
Squeeze-and-excitation networks, Proceedings of the IEEE conference on computer vision and pattern recognition, pp.7132-7141, 2018. ,
ImageNet Pretrained CNNs for JPEG Steganalysis, Information Forensics and Security (WIFS), 2020. ,
An intriguing struggle of cnns in jpeg steganalysis and the onehot solution, IEEE Signal Processing Letters, vol.27, pp.830-834, 2020. ,
Deep residual network for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.14, issue.5, pp.1181-1193, 2018. ,
Cutmix: Regularization strategy to train strong classifiers with localizable features, Proceedings of the IEEE International Conference on Computer Vision, pp.6023-6032, 2019. ,
An Ensemble Model using CNNs on Different Domains for ALASKA2 Image Steganalysis, Information Forensics and Security (WIFS) ,
, IEEE International Workshop on Information Forensics and Security, vol.00