M. Abadi and D. G. Andersen, Learning to Protect Communications with Adversarial Neural Cryptography, 2016.

M. Hasan-abdulrahman, P. Chaumont, B. Montesinos, and . Magnier, Color Image Steganalysis Based On Steerable Gaussian Filters Bank, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.109-114, 2016.

P. Bas and T. Furon, BOWS-2 Contest (Break Our Watermarking System), and the 17th of, 2007.

P. Bas, T. Filler, and T. Pevný, Break Our Steganographic System': The Ins and Outs of Organizing BOSS, Proceedings of 13th International Conference on Information Hiding, IH'2011, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

B. Bayar and M. C. Stamm, A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.5-10, 2016.

Y. Bengio, A. C. Courville, and P. Vincent, Representation Learning: A Review and New Perspectives, IEEE Transaction on Pattern Analysis and Machine Intelligence, vol.PAMI, issue.8, pp.1798-1828, 2013.

S. Bernard, T. Pevný, P. Bas, and J. Klein, Exploiting Adversarial Embeddings for Better Steganography, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.216-221, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02177259

D. Borghys, P. Bas, and H. Bruyninckx, Facing the Cover-Source Mismatch on JPHide using Training-Set Design, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.17-22, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01833873

M. Boroumand and J. Fridrich, Nonlinear Feature Normalization in Steganalysis, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.45-54, 2017.

M. Boroumand, M. Chen, and J. Fridrich, Deep Residual Network for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.14, issue.5, pp.1181-1193, 2019.

J. Butora and J. J. Fridrich, Detection of Diversified Stego Sources with CNNs, Proceedings of Media Watermarking, Security, and Forensics, MWSF'2019, Part of IS&T International Symposium on Electronic Imaging, EI'2019, pp.534-535, 2019.

G. Cancelli, J. Gwenaël, M. Doërr, I. J. Barni, and . Cox, A Comparative Study of +/-1 Steganalyzers, Proceedings of Workshop Multimedia Signal Processing, pp.791-796, 2008.

M. Chaumont and S. Kouider, Steganalysis by Ensemble Classifiers with Boosting by Regression, and Post-Selection of Features, Proceedings of IEEE International Conference on Image Processing, pp.1133-1136, 2012.
URL : https://hal.archives-ouvertes.fr/lirmm-00838995

M. Chen, V. Sedighi, M. Boroumand, and J. Fridrich, JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.75-84, 2017.

M. Chen, M. Boroumand, and J. J. Fridrich, Deep Learning Regressors for Quantitative Steganalysis, Proceedings of Media Watermarking, Security, and Forensics, MWSF, p.160, 2018.

F. Chollet, Xception: Deep Learning with Depthwise Separable Convolutions, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2017, pp.1800-1807, 2017.

R. Cogranne, T. Denemark, and J. Fridrich, Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2014, pp.167-172, 2014.

R. Cogranne, Q. Giboulot, and P. Bas, The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.125-137, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02147763

T. Denemark and J. Fridrich, Improving Steganographic Security by Synchronizing the Selection Channel, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.5-14, 2015.

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, Selection-Channel-Aware Rich Model for Steganalysis of Digital Images, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2014, pp.48-53, 2014.

T. Denemark, M. Boroumand, and J. Fridrich, Steganalysis Features for Content-Adaptive JPEG Steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.8, pp.1736-1746, 2016.

T. Denemark, J. J. Fridrich, and P. C. Alfaro, Improving Selection-Channel-Aware Steganalysis Features, Part of IS&T International Symposium on Electronic Imaging, EI'2016, pp.1-8, 2016.

X. Deng, B. Chen, W. Luo, and D. Luo, Fast and Effective Global Covariance Pooling Network for Image Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.230-234, 2019.

C. Feng, X. W. Kong, M. Li, Y. Yang, and Y. Guo, Contribution-Based Feature Transfer for JPEG Mismatched Steganalysis, Proceedings of IEEE International Conference on Image Processing, pp.500-504, 2017.

T. Filler and J. Fridrich, Design of Adaptive Steganographic Schemes for Digital Images, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 21th Annual Symposium on Electronic Imaging, SPIE'2011, vol.7880, pp.78800-78800, 2011.

T. Filler, J. Judas, and J. Fridrich, Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011.

J. Fridrich, Steganography in Digital Media, 2009.

J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.

J. Fridrich, J. Kodovský, V. Holub, and M. Goljan, Breaking HUGO -The Process Discovery, Proceedings of Information Hiding, 13th International Conference, IH'2011, vol.6958, pp.85-101, 2011.

Q. Gibouloto, R. Cogranne, and P. Bas, Steganalysis into the Wild: How to Define a Source?, Proceedings of Media Watermarking, Security, and Forensics, MWSF, 2018.

I. Goodfellow, J. Pouget-abadie, M. Mirza, B. Xu, D. Warde-farley et al., Generative Adversarial Nets, Proceedings of Advances in Neural Information Processing Systems, NIPS'2014, pp.2672-2680, 2014.

L. Guo, J. Ni, and Y. Shi, An Efficient JPEG Steganographic Scheme Using Uniform Embedding, Proceedings of IEEE International Workshop on Information Forensics and Security, WIFS'2012, pp.169-174, 2012.

J. Hayes and G. Danezis, Generating Steganographic Images Via Adversarial Training, Proceedings of Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems, NIPS'2017, pp.1951-1960, 2017.

K. He, X. Zhang, S. Ren, and J. Sun, Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition, Proceedings of the European Conference on Computer Vision, ECCV'2014, pp.346-361, 2014.

K. He, X. Zhang, S. Ren, and J. Sun, Deep Residual Learning for Image Recognition, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2016, pp.770-778, 2016.

J. Hestness, S. Narang, N. Ardalani, G. Diamos, and H. Jun, Deep Learning Scaling is Predictable, Empirically, 2017.

G. E. Hinton and R. R. Salakhutdinov, Reducing the Dimensionality of Data with Neural Networks, Science, vol.313, issue.5786, pp.504-507, 2006.

V. Holub and J. Fridrich, Optimizing Pixel Predictors for Steganalysis, Proceedings of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, pp.830309-830309, 2012.

V. Holub and J. Fridrich, Designing Steganographic Distortion Using Directional Filters, Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS'2012, pp.234-239, 2012.

V. Holub and J. Fridrich, Random Projections of Residuals for Digital Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.8, issue.12, pp.1996-2006, 2013.

V. Holub and J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015.

V. Holub and J. Fridrich, Phase-Aware Projection Model for Steganalysis of JPEG Images, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, vol.9409, 2015.

V. Holub, J. Fridrich, and T. Denemark, Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, vol.2014, issue.1, p.1, 2014.

D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks, IEEE Access, vol.6, pp.38303-38314, 2018.

J. Huang, J. Ni, L. Wan, and J. Yan, A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.198-203, 2019.

X. Huang, S. Wang, T. Sun, G. Liu, and X. Lin, Steganalysis of Adaptive JPEG Steganography based on ResDet, Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, vol.2018, pp.12-15, 2018.

S. Ioffe and C. Szegedy, Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, Proceedings of the 32nd International Conference on International Conference on Machine Learning, vol.37, pp.448-456, 2015.

A. D. Ker, P. Bas, R. Böhme, R. Cogranne, S. Craver et al., Moving Steganography and Steganalysis from the Laboratory into the Real World, Proceedings of the 1st ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2013, pp.45-58, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00836407

P. Diederik, J. L. Kingma, and . Ba, Adam: A Method for Stochastic Optimization, Proceedings of Conference on Learning Representations, vol.13, 2015.

D. Mustafa-anil-koak, E. Ramirez, D. Erkip, and . Shasha, SafePredict: A Meta-Algorithm for Machine Learning That Uses Refusals to Guarantee Correctness, ArXiv, 2017.

J. Kodovský, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.

J. Kodovský and J. Fridrich, On Completeness of Feature Spaces in Blind Steganalysis, Proceedings of the 10th ACM Workshop on Multimedia and Security, MM&Sec'2008, pp.123-132, 2008.

J. Kodovský and J. J. Fridrich, Quantitative Steganalysis Using Rich Models, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, vol.8665, p.111, 2013.

J. Kodovsky, J. Fridrich, and V. Holub, On Dangers of Overtraining Steganography to Incomplete Cover Model, Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, MM&Sec'2011, pp.69-76, 2011.

X. Kong, C. Feng, M. Li, and Y. Guo, Iterative Multi-order Feature Alignment for JPEG Mismatched Steganalysis, Journal of Neurocomputing, vol.214, issue.C, pp.458-470, 2016.

S. Kouider, M. Chaumont, and W. Puech, Technical Points About Adaptive Steganography by Oracle (ASO), Proceeding of Signal Processing Conference, pp.1703-1707, 2012.
URL : https://hal.archives-ouvertes.fr/lirmm-00838996

S. Kouider, M. Chaumont, and W. Puech, Adaptive Steganography by Oracle (ASO), Proceeding of the IEEE International Conference on Multimedia and Expo, ICME'2013, pp.1-6, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-00838993

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet Classification with Deep Convolutional Neural Networks, Proceeding of Advances in Neural Information Processing Systems 25, NIPS'2012, pp.1097-1105, 2012.

A. Kuzin, A. Fattakhov, I. Kibardin, V. Iglovikov, and R. Dautov, Camera Model Identification Using Convolutional Neural Networks, Proceedings of the 2nd International Workshop on Big Data Analytic for Cyber Crime Investigation and Prevention, pp.3107-3110, 2018.

Y. Lecun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol.521, issue.7553, pp.436-444, 2015.

D. Lerch, -. Hostalot, and D. Megías, Unsupervised Steganalysis Based on Artificial Training Sets, Engineering Applications of Artificial Intelligence, vol.50, issue.C, pp.45-59, 2016.

B. Li, W. Wei, A. Ferreira, and S. Tan, ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis, IEEE Signal Processing Letters, vol.25, issue.5, pp.650-654, 2018.

B. Li, M. Wang, J. Huang, and X. Li, A New Cost Function for Spatial Image Steganography, Proceedings of IEEE International Conference on Image Processing, pp.4206-4210, 2014.

B. Li, M. Wang, X. Li, S. Tan, and J. Huang, A Strategy of Clustering Modification Directions in Spatial Image Steganography, IEEE Transaction on Information Forensics and Security, vol.10, issue.9, pp.1905-1917, 2015.

W. Li, W. Zhang, K. Chen, W. Zhou, and N. Yu, Defining Joint Distortion for JPEG Steganography, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.5-16, 2018.

X. Li, X. Kong, B. Wang, Y. Guo, and X. You, Generalized Transfer Component Analysis for Mismatched JPEG Steganalysis, Proceedings of IEEE International Conference on Image Processing, ICIP'2013, pp.4432-4436, 2013.

C. Liu, B. Zoph, M. Neumann, J. Shlens, W. Hua et al., Progressive Neural Architecture Search, Proceedings of the European Conference on Computer Vision, ECCV, vol.11205, pp.19-35, 2018.

I. Lubenko and A. D. Ker, Going From Small to Large Data in Steganalysis, Proceedings of Media Watermarking, Security, and Forensics III, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, 2012.

I. Lubenko and A. D. Ker, Steganalysis with Mismatched Covers: Do Simple Classifiers Help?, Proceedings of the 14th ACM Multimedia and Security Workshop, pp.11-18, 2008.

S. Mallat, Understanding Deep Convolutional Networks, Philosophical Transactions of the Royal Society. Series A, Mathematical, physical, and engineering sciences, vol.374, 2016.

A. Michael, Q. Alcorn, Z. Li, C. Gong, L. Wang et al., Strike (with) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects, Proceedings of the International Conference on Computer Vision, p.36, 2019.

Y. Pan, J. Ni, and W. Su, Improved Uniform Embedding for Efficient JPEG Steganography, Proceedings of the International Conference on Cloud Computing and Security, vol.10039, pp.125-133, 2016.

J. Pasquet, S. Bringay, and M. Chaumont, Steganalysis with Cover-Source Mismatch and a Small Learning Database, Proceedings of the 22nd European Signal Processing Conference, EUSIPCO'2014, pp.2425-2429, 2014.
URL : https://hal.archives-ouvertes.fr/lirmm-01234249

T. Pevný, Co-occurrence Steganalysis in High Dimensions, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 22th Annual Symposium on Electronic Imaging, SPIE'2012, vol.8303, pp.83030-83030, 2012.

T. Pevný and A. D. Ker, The Challenges of Rich Features in Universal Steganalysis, Proceeding of SPIE Media Watermarking, Security, and Forensics, Part of IS&T/SPIE 23th Annual Symposium on Electronic Imaging, SPIE'2013, vol.8665, pp.86650-86650, 2013.

T. Pevný, T. Filler, and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Proceedings of the 12th International Conference on Information Hiding, IH'2010, vol.6387, pp.161-177, 2010.

H. Pham, M. Guan, B. Zoph, Q. Le, and J. Dean, Efficient Neural Architecture Search via Parameters Sharing, Proceedings of Thirty-fifth International Conference on Machine Learning, ICML, p.11, 2018.

L. Pibre, J. Pasquet, D. Ienco, and M. Chaumont, Deep Learning is a Good Steganalysis Tool when Embedding Key is Reused for Different Images, Even if There is a Cover Source-Mismatch, Proceedings of Media Watermarking, Security, and Forensics, MWSF'2016, Part of I&ST International Symposium on Electronic Imaging, EI'2016, pp.1-11, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01227950

Y. Qian, J. Dong, W. Wang, and T. Tan, Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural Network, Proceedings of IEEE International Conference on Image Processing, pp.2752-2756, 2016.

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep Learning for Steganalysis via Convolutional Neural Networks, Proceedings of Media Watermarking, Security, and Forensics 2015, MWSF'2015, Part of IS&T/SPIE Annual Symposium on Electronic Imaging, SPIE'2015, vol.9409, pp.94090-94090, 2015.

W. Quan, K. Wang, D. Yan, and X. Zhang, Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks, IEEE Transactions on Information Forensics and Security, vol.13, issue.11, pp.2772-2787, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01789442

A. Radford, L. Metz, and S. Chintala, Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks, Proceedings of the International Conference on Learning Representations, ICLR'2016, p.16, 2016.

P. Schöttle and R. Böhme, A Game-theoretic Approach to Content-adaptive Steganography, Proceedings of the 14th International Conference on Information Hiding, IH'12, vol.7692, pp.125-141, 2012.

P. Schöttle and R. Böhme, Game Theory and Adaptive Steganography, IEEE Transactions on Information Forensics and Security, vol.11, issue.4, pp.760-773, 2016.

V. Sedighi and J. Fridrich, Effect of Imprecise Knowledge of the Selection Channel on Steganalysis, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.33-42, 2015.

V. Sedighi and J. J. Fridrich, Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis, Part of IS&T International Symposium on Electronic Imaging, EI'2017, pp.50-55, 2017.

V. Sedighi, R. Cogranne, and J. Fridrich, Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, TIFS'2016, vol.11, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608

V. Sedighi, J. J. Fridrich, and R. Cogranne, Toss that BOSSbase, Part of IS&T International Symposium on Electronic Imaging, EI'2016, pp.1-9, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01303577

H. Shi, J. Dong, W. Wang, Y. Qian, and X. Zhang, SSGAN: Secure Steganography Based on Generative Adversarial Networks, Proceedings of the 18th Pacific-Rim Conference on Multimedia, vol.10735, pp.534-544, 2017.

G. J. Simmons, The Subliminal Channel and Digital Signatures, Proceeding of Crypto'83, pp.51-67, 1983.

K. Simonyan and A. Zisserman, Very Deep Convolutional Networks for Large-Scale Image Recognition, Proceeding of International Conference on Learning Representations, vol.12, 2015.

X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2015, pp.15-23, 2015.

C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed et al., Going Deeper with Convolutions, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, CVPR'2015, pp.1-9, 2015.

S. Tan and B. Li, Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images, Proceedings of Signal and Information Processing Association Annual Summit and Conference, APSIPA'2014, pp.1-4, 2014.

W. Tang, S. Tan, B. Li, and J. Huang, Automatic Steganographic Distortion Learning Using a Generative Adversarial Network, IEEE Signal Processing Letters, vol.24, issue.10, pp.1547-1551, 2017.

W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, CNN-based Adversarial Embedding for Image Steganography, IEEE Transactions on Information Forensics and Security, vol.14, issue.8, 2019.

F. Clement, J. J. Tsang, and . Fridrich, Steganalyzing Images of Arbitrary Size with CNNs, Proceedings of Media Watermarking, Security, and Forensics, MWSF, p.121, 2018.

D. Volkhonskiy, I. Nazarov, B. Borisenko, and E. Burnaev, Steganographic Generative Adversarial Networks, 2017.

C. Xia, Q. Guan, X. Zhao, Z. Xu, and Y. Ma, Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'17, 2017.

C. Xia, Q. Guan, X. Zhao, Z. Xu, and Y. Ma, Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.55-66, 2017.

G. Xu, H. Z. Wu, and Y. Q. Shi, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016.

G. Xu, Deep Convolutional Neural Network to Detect J-UNIWARD, Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2017, pp.67-73, 2017.

G. Xu, H. Wu, and Y. Q. Shi, Ensemble of CNNs for Steganalysis: An Empirical Study, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2016, pp.103-107, 2016.

J. Yang, D. Ruan, J. Huang, X. Kang, and Y. Shi, An Embedding Cost Learning Framework Using GAN; (previously named "spatial image steganography based on generative adversarial network" on ArXiv), IEEE Transactions on Information Forensics and Security, vol.15, pp.839-851, 2019.

J. Yang, D. Ruan, X. Kang, and Y. Shi, Towards Automatic Embedding Cost Learning for JPEG Steganography, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.37-46, 2019.

J. Ye, J. Ni, and Y. Yi, Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.12, issue.11, pp.2545-2557, 2017.

M. Yedroudj, M. Chaumont, and F. Comby, How to Augment a Small Learning Set for Improving the Performances of a CNN-Based Steganalyzer?, Proceedings of Media Watermarking, Security, and Forensics, MWSF, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01681883

M. Yedroudj, F. Comby, and M. Chaumont, Yedrouj-Net: An Efficient CNN for Spatial Steganalysis, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2092-2096, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01717550

M. Yedroudj, F. Comby, and M. Chaumont, Steganography using a 3 player game, 2019.

Y. Yousfi, J. Butora, J. Fridrich, and Q. Giboulot, Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec'2019, pp.138-149, 2019.

A. Zakaria, M. Chaumont, and G. Subsol, Quantitative and Binary Steganalysis in JPEG: A Comparative Study, Proceedings of the European Signal Processing Conference, EUSIPCO, pp.1422-1426, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01884006

A. Zakaria, M. Chaumont, and G. Subsol, Pooled Steganalysis in JPEG:how to deal with the spreading strategy?, Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS'2019, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02301698

J. Zeng, S. Tan, B. Li, and J. Huang, Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework, IEEE Transactions on Information Forensics and Security, vol.13, issue.5, pp.1200-1214, 2018.

J. Zeng, S. Tan, B. Li, and J. Huang, Pre-Training via Fitting Deep Neural Network to Rich-Model Features Extraction Procedure and its Effect on Deep Learning for Steganalysis, Proceedings of Media Watermarking, Security, and Forensics, 2017.

R. Zhang, F. Zhu, J. Liu, and G. Liu, Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis; (previously named "efficient feature learning and multi-size image steganalysis based on cnn" on ArXiv), IEEE Transactions on Information Forensics and Security, 2020.

Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu et al., Adversarial Examples Against Deep Neural Network Based Steganalysis, Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec, pp.67-72, 2018.

J. Zhu, R. Kaplan, J. Johnson, and L. Fei-fei, HiDDeN: Hiding Data With Deep Networks, Proceedings of the 15th European Conference on Computer Vision, ECCV, vol.11219, pp.682-697, 2018.

J. Pasquet, L. Hasan-abdulrahman, M. Pibre, and . Yedroudj, Without all of them, this chapter would never have been possible. I would also like to thank my two colleagues, Frédéric Comby and Gérard Subsol, who helped me supervise this nice small-world. I thank the French working group, ACKNOWLEDGMENTS I would like to thank the PhD students (and the Masters' students) who directly or indirectly worked on the topic: Sarra Kouider, Amel Tuama, 2015.

, ICAR (my team -with all the members), the Montpellier University and the Nîmes university, HPC@LR, for all the given resources which allowed me to run such a work

, Finally, I would like to thank my wife, Nathalie, my four little smurfs

, AUTHOR BIOGRAPHY

, He is a member of the IEEE Signal Processing -Information Forensics Security -Technical Committee and is a reviewer for the major conferences and journals related to steganography/steganalysis. He joined the LIRMM in, Marc CHAUMONT is Associate Professor (HDR Hors-Classe) accredited to supervise research, 2005.