S. Tan and B. Li, Stacked convolutional auto-encoders for steganalysis of digital images, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp.1-4, 2014.
DOI : 10.1109/APSIPA.2014.7041565

L. Pibre, J. Pasquet, D. Ienco, and E. M. Chaumont, Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch, Proceedings of Media Watermarking, Security, and Forensics, MWSF'2016, Part of I&ST International Symposium on Electronic Imaging, EI'2016, pp.1-11, 2016.
DOI : 10.2352/ISSN.2470-1173.2016.8.MWSF-078

URL : https://hal.archives-ouvertes.fr/lirmm-01227950

G. Xu, H. Wu, and Y. Q. Shi, Ensemble of CNNs for Steganalysis, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '16, pp.103-107, 2016.
DOI : 10.1186/1687-417X-2014-1

G. Xu, H. Wu, and Y. Q. Shi, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016.
DOI : 10.1109/LSP.2016.2548421

J. Zeng, S. Tan, B. Li, and J. Huang, Pre-training via fitting deep neural network to richmodel features extraction procedure and its effect on deep learning for steganalysis, Proceedings of Media Watermarking, Security, and Forensics 2017, MWSF'2017, Part of IS&T Symposium on Electronic Imaging, EI'2017, p.6, 2017.

M. Chen, V. Sedighi, M. Boroumand, and J. Fridrich, JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , IHMMSec '17, p.10, 2017.
DOI : 10.1145/952532.952595

G. Xu, Deep Convolutional Neural Network to Detect J-UNIWARD, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , IHMMSec '17, 2017.
DOI : 10.1007/978-3-319-46493-0_38

K. He, X. Zhang, S. Ren, . Et-jian, and . Sun, Deep Residual Learning for Image Recognition, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp.770-778, 2016.
DOI : 10.1109/CVPR.2016.90

Y. Lecun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol.9, issue.7553, pp.436-444, 2015.
DOI : 10.1007/s10994-013-5335-x

J. Kodovský, J. Fridrich, and E. V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

J. Fridrich and J. Kodovský, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

C. Xia, Q. Guan, X. Zhao, Z. Xu, and Y. Ma, Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security , IHMMSec '17, p.11, 2017.
DOI : 10.1007/s11554-016-0600-4

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and E. J. Fridrich, Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, 2014.
DOI : 10.1109/WIFS.2014.7084302

T. Denemark, M. Boroumand, and E. J. Fridrich, Steganalysis Features for Content-Adaptive JPEG Steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.8, pp.1736-1746, 2016.
DOI : 10.1109/TIFS.2016.2555281

Y. Qian, J. Dong, W. Wang, and E. T. Tan, Learning and transferring representations for image steganalysis using convolutional neural network, 2016 IEEE International Conference on Image Processing (ICIP), pp.2752-2756, 2016.
DOI : 10.1109/ICIP.2016.7532860

J. Ye, J. Ni, and Y. Yi, Deep Learning Hierarchical Representations for Image Steganalysis, Accepted to IEEE Transactions on Information Forensics and Security, TIFS, p.13, 2017.
DOI : 10.1109/TIFS.2017.2710946

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

URL : http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf

V. Holub, J. Fridrich, and E. T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.2014-2014
DOI : 10.1007/978-3-642-55760-6

S. Ioffe and C. Szegedy, Batch normalization : Accelerating deep network training by reducing internal covariate shift, Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, pp.6-11, 2015.

M. Lin, Q. Chen, and . Et-shuicheng-yan, Network in network. arXiv preprint, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01551350

P. Bas, T. Filler, and E. T. Pevný, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, Proceedings of the 13th International Conference on Information Hiding Proceedings of the 22nd ACM international conference on Multimedia, pp.59-70, 2011.
DOI : 10.1007/978-3-642-16435-4_13

X. Glorot and Y. Bengio, Understanding the difficulty of training deep feedforward neural networks, Dans Aistats, vol.9, pp.249-256, 2010.