P. Bas, T. Filler, and T. Pevný, Break Our Steganographic System': The Ins and Outs of Organizing BOSS, Proceedings of 13th International Conference on Information Hiding, IH'2011, vol.6958, pp.59-70, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00648057

P. Bas and T. Furon, BOWS-2 Contest (Break Our Watermarking System), and the 17th of, 2007.

M. Boroumand, M. Chen, and J. Fridrich, Deep Residual Network for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.14, issue.5, pp.1181-1193, 2019.

M. Chaumont, Deep Learning in steganography and steganalysis, Digital Media Steganography: Principles, Algorithms, Advances, vol.46, 2020.
URL : https://hal.archives-ouvertes.fr/lirmm-02087729

R. Cogranne, Q. Giboulot, and P. Bas, The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp.125-137, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02147763

X. Deng, B. Chen, W. Luo, and D. Luo, Fast and Effective Global Covariance Pooling Network for Image Steganalysis, Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, pp.230-234, 2019.

J. Fridrich, Steganography in Digital Media, 2009.

J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, TIFS, vol.7, issue.3, pp.868-882, 2012.

Q. Giboulot, R. Cogranne, D. Borghys, and P. Bas, 2020. Roots and Solutions of Cover-Source Mismatch in Image Steganalysis: a Comprehensive Study, 2020.

J. Hestness, S. Narang, N. Ardalani, G. Diamos, H. Jun et al., Deep Learning Scaling is Predictable, Empirically. In Unpublished -ArXiv, 2017.

V. Holub and J. Fridrich, Designing Steganographic Distortion Using Directional Filters, Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS'2012, pp.234-239, 2012.

V. Holub, J. Fridrich, and T. Denemark, Universal Distortion Function for Steganography in an Arbitrary Domain, EURASIP Journal on Information Security, vol.1, p.1, 2014.

J. Jo and Y. Bengio, Measuring the tendency of CNNs to Learn Surface Statistical Regularities, 2017.

J. Kodovský, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet Classification with Deep Convolutional Neural Networks, Proceeding of Advances in Neural Information Processing Systems 25, NIPS'2012, pp.1097-1105, 2012.

B. Li, W. Wei, A. Ferreira, and S. Tan, ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis, IEEE Signal Processing Letters, vol.25, pp.650-654, 2018.

Y. Qian, J. Dong, W. Wang, and T. Tan, Learning and Transferring Representations for Image Steganalysis Using Convolutional Neural Network, Proceedings of IEEE International Conference on Image Processing, pp.2752-2756, 2016.

V. Sedighi, J. J. Fridrich, and R. Cogranne, Toss that BOSSbase, Alice!, Part of IS&T International Symposium on Electronic Imaging, EI'2016, pp.1-9, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01303577

G. J. Simmons, The Subliminal Channel and Digital Signatures, Proceeding of Crypto'83, pp.51-67, 1983.

S. Tan, W. Wu, Z. Shao, Q. Li, B. Li et al., CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images, under submission. ArXiv abs/1911.04657, 2020.

G. Xu, H. Wu, and Y. Q. Shi, Ensemble of CNNs for Steganalysis: An Empirical Study, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'2016), pp.103-107, 2016.

J. Ye, J. Ni, and Y. Yi, Deep Learning Hierarchical Representations for Image Steganalysis, IEEE Transactions on Information Forensics and Security, TIFS, vol.12, pp.2545-2557, 2017.

M. Yedroudj, M. Chaumont, and F. Comby, How to Augment a Small Learning Set for Improving the Performances of a CNN-Based Steganalyzer, Proceedings of Media Watermarking, Security, and Forensics, MWSF, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01681883

M. Yedroudj, F. Comby, and M. Chaumont, Yedrouj-Net: An Efficient CNN for Spatial Steganalysis, Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2092-2096, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01717550

J. Zeng, S. Tan, B. Li, and J. Huang, Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework, IEEE Transactions on Information Forensics and Security, vol.13, pp.1200-1214, 2018.

R. Zhang, F. Zhu, J. Liu, and G. Liu, Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis; (previously named "efficient feature learning and multi-size image steganalysis based on cnn" on ArXiv), IEEE Transactions on Information Forensics and Security, vol.15, pp.1138-1150, 2020.