M. Yedroudj, F. Comby, and M. Chaumont, Yedrouj-Net: An efficient CNN for spatial steganalysis, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, 2018.

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep Learning for Steganalysis via Convolutional Neural Networks, Proceedings of Media Watermarking Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, pp.94-090, 2015.
DOI : 10.1117/12.2083479

L. Pibre, J. Pasquet, D. Ienco, and M. Chaumont, Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch, Proceedings of Media Watermarking, Security , and Forensics, MWSF'2016, Part of I&ST International Symposium on Electronic Imaging, EI'2016, pp.1-11, 2016.
DOI : 10.2352/ISSN.2470-1173.2016.8.MWSF-078

URL : https://hal.archives-ouvertes.fr/lirmm-01227950

G. Xu, H. Z. Wu, and Y. Q. Shi, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016.
DOI : 10.1109/LSP.2016.2548421

J. Ye, J. Ni, and Y. Yi, Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.12, issue.11, pp.2545-2557, 2017.
DOI : 10.1109/TIFS.2017.2710946

M. Chen, V. Sedighi, M. Boroumand, and J. Fridrich, JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , IHMMSec '17, pp.75-84, 2017.
DOI : 10.1145/952532.952595

G. Xu, H. Wu, and Y. Q. Shi, Ensemble of CNNs for Steganalysis, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '16, pp.103-107, 2016.
DOI : 10.1186/1687-417X-2014-1

Y. Qian, J. Dong, W. Wang, and T. Tan, Learning and transferring representations for image steganalysis using convolutional neural network, 2016 IEEE International Conference on Image Processing (ICIP), pp.2752-2756, 2016.
DOI : 10.1109/ICIP.2016.7532860

J. Zeng, S. Tan, B. Li, and J. Huang, Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework, This article has been accepted for publication in a 2018 issue of IEEE TIFS, 2018.
DOI : 10.1109/TIFS.2017.2779446

URL : http://arxiv.org/pdf/1611.03233

P. Bas, T. Filler, and T. Pevn´ypevn´y, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Proceedings of the 13th International Conference on Information Hiding, IH'2011, pp.59-70, 2011.
DOI : 10.1007/978-3-642-16435-4_13

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet classification with deep convolutional neural networks, Advances in Neural Information Processing Systems 25, pp.1097-1105, 2012.
DOI : 10.1162/neco.2009.10-08-881

URL : http://dl.acm.org/ft_gateway.cfm?id=3065386&type=pdf

G. Xu, Deep Convolutional Neural Network to Detect J-UNIWARD, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , IHMMSec '17, pp.67-73, 2017.
DOI : 10.1007/978-3-319-46493-0_38

URL : http://arxiv.org/pdf/1704.08378

G. Cancelli, G. J. Doërr, M. Barni, and I. J. Cox, A comparative study of +/-1 steganalyzers, Workshop Multimedia Signal Processing, pp.791-796, 2008.

A. D. Ker and T. Pevny, A Mishmash of Methods for Mitigating the Model Mismatch Mess, Proceedings of Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, ser. SPIE Proceedings, 2014.

J. Kodovsk-`-kodovsk-`-y, V. Sedighi, and J. J. Fridrich, Study of cover source mismatch in steganalysis and ways to mitigate its impact, Proceedings of Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 24th Annual Symposium on Electronic Imaging, SPIE'2014, ser. SPIE Proceedings, 2014.

P. Bas and T. Furon, BOWS-2 Contest (Break Our Watermarking System), " organised within the activity of the Watermarking Virtual Laboratory (Wavila) of the European Network of Excellence ECRYPT, 2008, organized between the 17th of, 2007.

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

URL : http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, 2014.
DOI : 10.1007/978-3-642-55760-6

J. Kodovsk´ykodovsk´y, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

J. Fridrich and J. Kodovsk´ykodovsk´y, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long et al., Caffe, Proceedings of the ACM International Conference on Multimedia, MM '14, pp.675-678, 2014.
DOI : 10.1145/2647868.2654889

B. Zhou, A. Lapedriza, A. Khosla, A. Oliva, and A. Torralba, Places: A 10 million Image Database for Scene Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017.
DOI : 10.1109/TPAMI.2017.2723009