Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Highly Undetectable Steganography . Dans Information Hiding -12th International Conference, pp.161-177, 2010. ,
DOI : 10.1049/el:20070248
On dangers of overtraining steganography to incomplete cover model, Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec '11, pp.69-76, 2011. ,
DOI : 10.1145/2037252.2037266
Security, and Forensics XIII, part of IS&T SPIE Electronic Imaging Symposium, pp.1-12, 2011. ,
Practical Methods for Minimizing Embedding Impact in Steganography Steganography , and Watermarking of Multimedia Contents IX, part of IS&T SPIE Electronic Imaging Symposium, pp.2-03, 2007. ,
???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Lecture Notes in Computer Science, vol.6958, issue.11, pp.59-70, 2011. ,
DOI : 10.1007/978-3-642-24178-9_5
Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization. Dans Media Forensics and Security II, part of IS&T SPIE Electronic Imaging Symposium, 2010. ,
Design of Adaptive Steganographic Schemes for Digital Images. Dans Media Watermarking, Security , and Forensics XIII, part of IS&T SPIE Electronic Imaging Symposium, pp.1-14, 2011. ,
Breaking HUGO ??? The Process Discovery, éditeurs, Information Hiding -13th International Conference, 2011. ,
DOI : 10.1007/978-3-642-24178-9_7