J. Fridrich, J. Kodovsk´ykodovsk´y, V. Holub, and M. Goljan, Breaking HUGO ??? The Process Discovery, Proceedings of the 13th International Conference on Information Hiding, pp.85-101, 2011.
DOI : 10.1007/978-3-642-24178-9_7

J. Kodovsk´ykodovsk´y and J. Fridrich, On Completeness of Feature Spaces in Blind Steganalysis, Proceedings of the 10th ACM Workshop on Multimedia and Security, pp.123-132, 2008.

J. Fridrich and J. Kodovsk´ykodovsk´y, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, pp.1-27, 2011.
DOI : 10.1145/1961189.1961199

J. Kodovsk´ykodovsk´y, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

I. Lubenko and A. D. Ker, Steganalysis with mismatched covers, Proceedings of the on Multimedia and security, MM&Sec '12, pp.11-18, 2012.
DOI : 10.1145/2361407.2361410

T. Pevn´ypevn´y, Detecting Messages of Unknown Length, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, 2011.

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, 2014.
DOI : 10.1109/WIFS.2014.7084302

R. Cogranne, T. Denemark, and J. Fridrich, Theoretical model of the FLD ensemble classifier based on hypothesis testing theory, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.167-172, 2014.
DOI : 10.1109/WIFS.2014.7084322

M. Chaumont and S. Kouider, Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features, 2012 19th IEEE International Conference on Image Processing, pp.1133-1136, 2012.
DOI : 10.1109/ICIP.2012.6467064

URL : https://hal.archives-ouvertes.fr/lirmm-00838995

J. Pasquet, S. Bringay, and M. Chaumont, Steganalysis with Cover-Source Mismatch and a Small Learning Database, Proceedings of the 22nd European Signal Processing Conference 2014, pp.2425-2429, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01234249

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet Classification with Deep Convolutional Neural Networks, Advances in Neural Information Processing Systems 25, NIPS'2012, pp.1097-1105, 2012.

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep Learning for Steganalysis via Convolutional Neural Networks, Proceedings of SPIE Media Watermarking, Security , and Forensics 2015, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, pp.94090-94090, 2015.

T. Pevn´ypevn´y, T. Filler, and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Proceedings of the 12th International Conference on Information Hiding, pp.161-177, 2010.
DOI : 10.1049/el:20070248

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1, 2014.
DOI : 10.1186/1687-417X-2014-1

P. Bas, T. Filler, and T. Pevn´ypevn´y, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Proceedings of the 13th International Conference on Information Hiding, pp.59-70, 2011.
DOI : 10.1007/978-3-642-24178-9_5

G. E. Hinton and R. R. Salakhutdinov, Reducing the Dimensionality of Data with Neural Networks, Science, vol.313, issue.5786, pp.504-507, 2006.
DOI : 10.1126/science.1127647

Y. Bengio, A. C. Courville, and P. Vincent, Representation Learning: A Review and New Perspectives, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.35, issue.8, pp.1798-1828, 2013.
DOI : 10.1109/TPAMI.2013.50

W. Tang, H. Li, W. Luo, and J. Huang, Adaptive steganalysis against WOW embedding algorithm, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, IH&MMSec '14, pp.91-96, 2014.
DOI : 10.1145/2600918.2600935

I. Lubenko and A. D. Ker, Going from small to large data in steganalysis, Media Watermarking, Security, and Forensics 2012, pp.83030-83030, 2012.
DOI : 10.1117/12.910214

A. D. Ker and T. Pevn´ypevn´y, A Mishmash of Methods for Mitigating the Model Mismatch Mess, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014.

J. Kodovsk´ykodovsk´y, V. Sedighi, and J. Fridrich, Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate its Impact, Proceedings of SPIE Media Watermarking, Security , and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014.

P. Bas and T. Furon, BOWS-2 Contest (Break Our Watermarking System) Organized between the 17th of, 2007.

G. Cancelli, G. J. Doërr, M. Barni, and I. J. Cox, A Comparative Study of +/-1 Steganalyzers, Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing, pp.791-796, 2008.

V. Holub and J. Fridrich, Optimizing pixel predictors for steganalysis, Media Watermarking, Security, and Forensics 2012, pp.830309-830309, 2012.
DOI : 10.1117/12.905753

V. Holub, J. Fridrich, and T. Denemark, Random projections of residuals as an alternative to co-occurrences in steganalysis, Media Watermarking, Security, and Forensics 2013, pp.86650-86650, 2013.
DOI : 10.1117/12.1000330

X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, pp.15-23, 2015.
DOI : 10.1145/2756601.2756608

V. Holub and J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015.
DOI : 10.1109/TIFS.2014.2364918

T. Pevn´ypevn´y and A. D. Ker, The Challenges of Rich Features in Universal Steganalysis, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, pp.86650-86650, 2013.

]. S. Kouider, M. Chaumont, and W. Puech, Adaptive steganography by oracle (ASO), 2013 IEEE International Conference on Multimedia and Expo (ICME), pp.1-6, 2013.
DOI : 10.1109/ICME.2013.6607427

URL : https://hal.archives-ouvertes.fr/lirmm-00838993

A. D. Ker, Locating steganographic payload via ws residuals, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.27-32, 2008.
DOI : 10.1145/1411328.1411335

T. Quach, Cover Estimation and Payload Location using Markov Random Fields, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014.

A. D. Ker and R. Böhme, Revisiting Weighted Stego-image Steganalysis, Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Part of IS&T/SPIE 18th Annual Symposium on Electronic Imaging, pp.681905-681905, 2008.