Learning to Protect Communications with Adversarial Neural Cryptography, 2016. ,
Color Image Steganalysis Based On Steerable Gaussian Filters Bank, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.109-114, 2016. ,
BOWS-2 Contest (Break Our Watermarking System), and the 17th of, 2007. ,
Break Our Steganographic System': The Ins and Outs of Organizing BOSS, Proceedings of 13th International Conference on Information Hiding, IH'2011, vol.6958, pp.59-70, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00648057
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.5-10, 2016. ,
Representation Learning: A Review and New Perspectives, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol.PAMI, issue.8, pp.1798-1828, 2013. ,
Exploiting Adversarial Embeddings for Better Steganography, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.216-221, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02177259
Facing the Cover-Source Mismatch on JPHide using Training-Set Design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.17-22, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01833873
Nonlinear Feature Normalization in Steganalysis, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.45-54, 2017. ,
Deep Residual Network for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.14, issue.5, pp.1181-1193, 2019. ,
Detection of Diversified Stego Sources with CNNs, Proceedings of Media Watermarking, Security, and Forensics, MWSF'2019, Part of IS&T International Symposium on Electronic Imaging, EI'2019, pp.534-535, 2019. ,
A Comparative Study of +/-1 Steganalyzers, Proceedings of Workshop Multimedia Signal Processing, pp.791-796, 2008. ,
Steganalysis by Ensemble Classifiers with Boosting by Regression, and Post-Selection of Features, Proceedings of IEEE International Conference on Image Processing, pp.1133-1136, 2012. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00838995
JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.75-84, 2017. ,
Deep Learning Regressors for Quantitative Steganalysis, Proceedings of Media Watermarking, Security, and Forensics, MWSF, p.160, 2018. ,
Xception: Deep Learning with Depthwise Separable Convolutions, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2017, pp.1800-1807, 2017. ,
Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2014, pp.167-172, 2014. ,
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.125-137, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02147763
Improving Steganographic Security by Synchronizing the Selection Channel, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.5-14, 2015. ,
Selection-Channel-Aware Rich Model for Steganalysis of Digital Images, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2014, pp.48-53, 2014. ,
Steganalysis Features for Content-Adaptive JPEG Steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.8, pp.1736-1746, 2016. ,
Improving Selection-Channel-Aware Steganalysis Features, Part of IS&T International Symposium on Electronic Imaging, EI'2016, pp.1-8, 2016. ,
Fast and Effective Global Covariance Pooling Network for Image Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.230-234, 2019. ,
Contribution-Based Feature Transfer for JPEG Mismatched Steganalysis, Proceedings of IEEE International Conference on Image Processing, pp.500-504, 2017. ,
Design of Adaptive Steganographic Schemes for Digital Images, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, SPIE'2011, vol.7880, pp.78800-78800, 2011. ,
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011. ,
, Steganography in Digital Media, 2009.
Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012. ,
Breaking HUGO -The Process Discovery, Proceedings of Information Hiding, 13th International Conference, IH'2011, vol.6958, pp.85-101, 2011. ,
Steganalysis into the Wild: How to Define a Source?, Proceedings of Media Watermarking, Security, and Forensics, MWSF, 2018. ,
Generative Adversarial Nets, Proceedings of Advances in Neural Information Processing Systems, NIPS'2014, pp.2672-2680, 2014. ,
An Efficient JPEG Steganographic Scheme Using Uniform Embedding, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2012, pp.169-174, 2012. ,
Generating Steganographic Images Via Adversarial Training, Proceedings of Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, NIPS'2017, pp.1951-1960, 2017. ,
Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition, Proceedings of the European Conference on Computer Vision, ECCV'2014, pp.346-361, 2014. ,
Deep Residual Learning for Image Recognition, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2016, pp.770-778, 2016. ,
Deep Learning Scaling is Predictable, Empirically, 2017. ,
Reducing the Dimensionality of Data with Neural Networks, Science, vol.313, issue.5786, pp.504-507, 2006. ,
Optimizing Pixel Predictors for Steganalysis, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, pp.830309-830309, 2012. ,
Designing Steganographic Distortion Using Directional Filters, Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS'2012, pp.234-239, 2012. ,
Random Projections of Residuals for Digital Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.8, issue.12, pp.1996-2006, 2013. ,
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015. ,
Phase-Aware Projection Model for Steganalysis of JPEG Images, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, vol.9409, 2015. ,
Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, vol.2014, issue.1, p.1, 2014. ,
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks, IEEE Access, vol.6, pp.38303-38314, 2018. ,
A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.198-203, 2019. ,
Steganalysis of Adaptive JPEG Steganography based on ResDet, Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, vol.2018, pp.12-15, 2018. ,
Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, Proceedings of the 32nd International Conference on International Conference on Machine Learning, vol.37, pp.448-456, 2015. ,
Moving Steganography and Steganalysis from the Laboratory into the Real World, Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2013, pp.45-58, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00836407
Adam: A Method for Stochastic Optimization, Proceedings of Conference on Learning Representations, vol.13, 2015. ,
SafePredict: A Meta-Algorithm for Machine Learning That Uses Refusals to Guarantee Correctness, ArXiv, 2017. ,
Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012. ,
On Completeness of Feature Spaces in Blind Steganalysis, Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec'2008, pp.123-132, 2008. ,
Quantitative Steganalysis Using Rich Models, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, vol.8665, p.111, 2013. ,
On Dangers of Overtraining Steganography to Incomplete Cover Model, Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, MM&Sec'2011, pp.69-76, 2011. ,
Iterative Multi-order Feature Alignment for JPEG Mismatched Steganalysis, Journal of Neurocomputing, vol.214, issue.C, pp.458-470, 2016. ,
Technical Points About Adaptive Steganography by Oracle (ASO), Proceeding of Signal Processing Conference, pp.1703-1707, 2012. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00838996
Adaptive Steganography by Oracle (ASO), Proceeding of the IEEE International Conference on Multimedia and Expo, ICME'2013, pp.1-6, 2013. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00838993
ImageNet Classification with Deep Convolutional Neural Networks, Proceeding of Advances in Neural Information Processing Systems 25, NIPS'2012, pp.1097-1105, 2012. ,
Camera Model Identification Using Convolutional Neural Networks, Proceedings of the 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, pp.3107-3110, 2018. ,
Deep learning, Nature, vol.521, issue.7553, pp.436-444, 2015. ,
Unsupervised Steganalysis Based on Artificial Training Sets, Engineering Applications of Artificial Intelligence, vol.50, issue.C, pp.45-59, 2016. ,
ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis, IEEE Signal Processing Letters, vol.25, issue.5, pp.650-654, 2018. ,
A New Cost Function for Spatial Image Steganography, Proceedings of IEEE International Conference on Image Processing, pp.4206-4210, 2014. ,
A Strategy of Clustering Modification Directions in Spatial Image Steganography, IEEE Transaction on Information Forensics and Security, vol.10, issue.9, pp.1905-1917, 2015. ,
Defining Joint Distortion for JPEG Steganography, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.5-16, 2018. ,
Generalized Transfer Component Analysis for Mismatched JPEG Steganalysis, Proceedings of IEEE International Conference on Image Processing, ICIP'2013, pp.4432-4436, 2013. ,
Progressive Neural Architecture Search, Proceedings of the European Conference on Computer Vision, ECCV, vol.11205, pp.19-35, 2018. ,
Going From Small to Large Data in Steganalysis, Proceedings of Media Watermarking, Security, and Forensics III, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, 2012. ,
Steganalysis with Mismatched Covers: Do Simple Classifiers Help?, Proceedings of the 14th ACM Multimedia and Security Workshop, pp.11-18, 2008. ,
Understanding Deep Convolutional Networks, Philosophical Transactions of the Royal Society. Series A, Mathematical, physical, and engineering sciences, vol.374, 2016. ,
Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects, Proceedings of the International Conference on Computer Vision, p.36, 2019. ,
Improved Uniform Embedding for Efficient JPEG Steganography, Proceedings of the International Conference on Cloud Computing and Security, vol.10039, pp.125-133, 2016. ,
Steganalysis with Cover-Source Mismatch and a Small Learning Database, Proceedings of the 22nd European Signal Processing Conference, EUSIPCO'2014, pp.2425-2429, 2014. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01234249
Co-occurrence Steganalysis in High Dimensions, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, pp.83030-83030, 2012. ,
The Challenges of Rich Features in Universal Steganalysis, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, vol.8665, pp.86650-86650, 2013. ,
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Proceedings of the 12th International Conference on Information Hiding, IH'2010, vol.6387, pp.161-177, 2010. ,
Efficient Neural Architecture Search via Parameters Sharing, Proceedings of Thirty-fifth International Conference on Machine Learning, ICML, p.11, 2018. ,
Deep Learning is a Good Steganalysis Tool when Embedding Key is Reused for Different Images, Even if There is a Cover Source-Mismatch, Proceedings of Media Watermarking, Security, and Forensics, MWSF'2016, Part of I&ST International Symposium on Electronic Imaging, EI'2016, pp.1-11, 2016. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01227950
Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural Network, Proceedings of IEEE International Conference on Image Processing, pp.2752-2756, 2016. ,
Deep Learning for Steganalysis via Convolutional Neural Networks, Proceedings of Media Watermarking, Security, and Forensics 2015, MWSF'2015, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, vol.9409, pp.94090-94090, 2015. ,
Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2772-2787, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01789442
Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks, Proceedings of the International Conference on Learning Representations, ICLR'2016, p.16, 2016. ,
A Game-theoretic Approach to Content-adaptive Steganography, Proceedings of the 14th International Conference on Information Hiding, IH'12, vol.7692, pp.125-141, 2012. ,
Game Theory and Adaptive Steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.4, pp.760-773, 2016. ,
Effect of Imprecise Knowledge of the Selection Channel on Steganalysis, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.33-42, 2015. ,
Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis, Part of IS&T International Symposium on Electronic Imaging, EI'2017, pp.50-55, 2017. ,
, Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, TIFS'2016, vol.11, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608
Toss that BOSSbase, Part of IS&T International Symposium on Electronic Imaging, EI'2016, pp.1-9, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01303577
SSGAN: Secure Steganography Based on Generative Adversarial Networks, Proceedings of the 18th Pacific-Rim Conference on Multimedia, vol.10735, pp.534-544, 2017. ,
The Subliminal Channel and Digital Signatures, Proceeding of Crypto'83, pp.51-67, 1983. ,
Very Deep Convolutional Networks for Large-Scale Image Recognition, Proceeding of International Conference on Learning Representations, vol.12, 2015. ,
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.15-23, 2015. ,
Going Deeper with Convolutions, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2015, pp.1-9, 2015. ,
Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images, Proceedings of Signal and Information Processing Association Annual Summit and Conference, APSIPA'2014, pp.1-4, 2014. ,
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network, IEEE Signal Processing Letters, vol.24, issue.10, pp.1547-1551, 2017. ,
CNN-based Adversarial Embedding for Image Steganography, IEEE Transactions on Information Forensics and Security, vol.14, issue.8, 2019. ,
Steganalyzing Images of Arbitrary Size with CNNs, Proceedings of Media Watermarking, Security, and Forensics, MWSF, p.121, 2018. ,
Steganographic Generative Adversarial Networks, 2017. ,
Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'17, 2017. ,
Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.55-66, 2017. ,
Structural Design of Convolutional Neural Networks for Steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016. ,
Deep Convolutional Neural Network to Detect J-UNIWARD, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.67-73, 2017. ,
Ensemble of CNNs for Steganalysis: An Empirical Study, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.103-107, 2016. ,
An Embedding Cost Learning Framework Using GAN; (previously named "spatial image steganography based on generative adversarial network" on ArXiv), IEEE Transactions on Information Forensics and Security, vol.15, pp.839-851, 2019. ,
Towards Automatic Embedding Cost Learning for JPEG Steganography, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.37-46, 2019. ,
Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.12, issue.11, pp.2545-2557, 2017. ,
How to Augment a Small Learning Set for Improving the Performances of a CNN-Based Steganalyzer?, Proceedings of Media Watermarking, Security, and Forensics, MWSF, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01681883
Yedrouj-Net: An Efficient CNN for Spatial Steganalysis, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2092-2096, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01717550
Steganography using a 3 player game, 2019. ,
Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.138-149, 2019. ,
Quantitative and Binary Steganalysis in JPEG: A Comparative Study, Proceedings of the European Signal Processing Conference, EUSIPCO, pp.1422-1426, 2018. ,
URL : https://hal.archives-ouvertes.fr/lirmm-01884006
Pooled Steganalysis in JPEG:how to deal with the spreading strategy?, Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS'2019, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02301698
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework, IEEE Transactions on Information Forensics and Security, vol.13, issue.5, pp.1200-1214, 2018. ,
Pre-Training via Fitting Deep Neural Network to Rich-Model Features Extraction Procedure and its Effect on Deep Learning for Steganalysis, Proceedings of Media Watermarking, Security, and Forensics, 2017. ,
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis; (previously named "efficient feature learning and multi-size image steganalysis based on cnn" on ArXiv), IEEE Transactions on Information Forensics and Security, 2020. ,
Adversarial Examples Against Deep Neural Network Based Steganalysis, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.67-72, 2018. ,
HiDDeN: Hiding Data With Deep Networks, Proceedings of the 15th European Conference on Computer Vision, ECCV, vol.11219, pp.682-697, 2018. ,
Without all of them, this chapter would never have been possible. I would also like to thank my two colleagues, Frédéric Comby and Gérard Subsol, who helped me supervise this nice small-world. I thank the French working group, ACKNOWLEDGMENTS I would like to thank the PhD students (and the Masters' students) who directly or indirectly worked on the topic: Sarra Kouider, Amel Tuama, 2015. ,
, ICAR (my team -with all the members), the Montpellier University and the Nîmes university, HPC@LR, for all the given resources which allowed me to run such a work
, Finally, I would like to thank my wife, Nathalie, my four little smurfs
, AUTHOR BIOGRAPHY
, He is a member of the IEEE Signal Processing -Information Forensics Security -Technical Committee and is a reviewer for the major conferences and journals related to steganography/steganalysis. He joined the LIRMM in, Marc CHAUMONT is Associate Professor (HDR Hors-Classe) accredited to supervise research, 2005.