Breaking HUGO ??? The Process Discovery, Proceedings of the 13th International Conference on Information Hiding, pp.85-101, 2011. ,
DOI : 10.1007/978-3-642-24178-9_7
On Completeness of Feature Spaces in Blind Steganalysis, Proceedings of the 10th ACM Workshop on Multimedia and Security, pp.123-132, 2008. ,
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
DOI : 10.1109/TIFS.2012.2190402
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, pp.1-27, 2011. ,
DOI : 10.1145/1961189.1961199
Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012. ,
DOI : 10.1109/TIFS.2011.2175919
Steganalysis with mismatched covers, Proceedings of the on Multimedia and security, MM&Sec '12, pp.11-18, 2012. ,
DOI : 10.1145/2361407.2361410
Detecting Messages of Unknown Length, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, 2011. ,
Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, 2014. ,
DOI : 10.1109/WIFS.2014.7084302
Theoretical model of the FLD ensemble classifier based on hypothesis testing theory, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.167-172, 2014. ,
DOI : 10.1109/WIFS.2014.7084322
Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features, 2012 19th IEEE International Conference on Image Processing, pp.1133-1136, 2012. ,
DOI : 10.1109/ICIP.2012.6467064
URL : https://hal.archives-ouvertes.fr/lirmm-00838995
Steganalysis with Cover-Source Mismatch and a Small Learning Database, Proceedings of the 22nd European Signal Processing Conference 2014, pp.2425-2429, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01234249
ImageNet Classification with Deep Convolutional Neural Networks, Advances in Neural Information Processing Systems 25, NIPS'2012, pp.1097-1105, 2012. ,
Deep Learning for Steganalysis via Convolutional Neural Networks, Proceedings of SPIE Media Watermarking, Security , and Forensics 2015, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, pp.94090-94090, 2015. ,
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Proceedings of the 12th International Conference on Information Hiding, pp.161-177, 2010. ,
DOI : 10.1049/el:20070248
Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012. ,
DOI : 10.1109/WIFS.2012.6412655
Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.2014, issue.1, 2014. ,
DOI : 10.1186/1687-417X-2014-1
???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Proceedings of the 13th International Conference on Information Hiding, pp.59-70, 2011. ,
DOI : 10.1007/978-3-642-24178-9_5
Reducing the Dimensionality of Data with Neural Networks, Science, vol.313, issue.5786, pp.504-507, 2006. ,
DOI : 10.1126/science.1127647
Representation Learning: A Review and New Perspectives, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.35, issue.8, pp.1798-1828, 2013. ,
DOI : 10.1109/TPAMI.2013.50
Adaptive steganalysis against WOW embedding algorithm, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, IH&MMSec '14, pp.91-96, 2014. ,
DOI : 10.1145/2600918.2600935
Going from small to large data in steganalysis, Media Watermarking, Security, and Forensics 2012, pp.83030-83030, 2012. ,
DOI : 10.1117/12.910214
A Mishmash of Methods for Mitigating the Model Mismatch Mess, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014. ,
Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate its Impact, Proceedings of SPIE Media Watermarking, Security , and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014. ,
BOWS-2 Contest (Break Our Watermarking System) Organized between the 17th of, 2007. ,
A Comparative Study of +/-1 Steganalyzers, Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing, pp.791-796, 2008. ,
Optimizing pixel predictors for steganalysis, Media Watermarking, Security, and Forensics 2012, pp.830309-830309, 2012. ,
DOI : 10.1117/12.905753
Random projections of residuals as an alternative to co-occurrences in steganalysis, Media Watermarking, Security, and Forensics 2013, pp.86650-86650, 2013. ,
DOI : 10.1117/12.1000330
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '15, pp.15-23, 2015. ,
DOI : 10.1145/2756601.2756608
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015. ,
DOI : 10.1109/TIFS.2014.2364918
The Challenges of Rich Features in Universal Steganalysis, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, pp.86650-86650, 2013. ,
Adaptive steganography by oracle (ASO), 2013 IEEE International Conference on Multimedia and Expo (ICME), pp.1-6, 2013. ,
DOI : 10.1109/ICME.2013.6607427
URL : https://hal.archives-ouvertes.fr/lirmm-00838993
Locating steganographic payload via ws residuals, Proceedings of the 10th ACM workshop on Multimedia and security, MM&Sec '08, pp.27-32, 2008. ,
DOI : 10.1145/1411328.1411335
Cover Estimation and Payload Location using Markov Random Fields, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, pp.90280-90280, 2014. ,
Revisiting Weighted Stego-image Steganalysis, Proceedings of SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, Part of IS&T/SPIE 18th Annual Symposium on Electronic Imaging, pp.681905-681905, 2008. ,