ImageNet pre-trained CNNs for JPEG steganalysis Y Yousfi, J Butora, E Khvedchenya, J Fridrich 2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020 | 67 | 2020 |
Breaking ALASKA: Color separation for steganalysis in JPEG domain Y Yousfi, J Butora, J Fridrich, Q Giboulot Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 60 | 2019 |
Reverse JPEG compatibility attack J Butora, J Fridrich IEEE Transactions on Information Forensics and Security 15, 1444-1454, 2019 | 52 | 2019 |
Improving EfficientNet for JPEG steganalysis Y Yousfi, J Butora, J Fridrich, C Fuji Tsang Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 46 | 2021 |
How to pretrain for steganalysis J Butora, Y Yousfi, J Fridrich Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 39 | 2021 |
Effect of jpeg quality on steganographic security J Butora, J Fridrich Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 19 | 2019 |
Detection of diversified stego sources with CNNs J Butora, J Fridrich Electronic Imaging 31, 1-11, 2019 | 15 | 2019 |
Turning cost-based steganography into model-based J Butora, Y Yousfi, J Fridrich Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020 | 13 | 2020 |
Steganography and its detection in JPEG images obtained with the" trunc" quantizer J Butora, J Fridrich ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 12 | 2020 |
Errorless robust JPEG steganography using outputs of JPEG coders J Butora, P Puteaux, P Bas IEEE Transactions on Dependable and Secure Computing, 2023 | 8 | 2023 |
Fighting the reverse JPEG compatibility attack: Pick your side J Butora, P Bas Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia …, 2022 | 5 | 2022 |
Minimum perturbation cost modulation for side-informed steganography J Butora, J Fridrich Electronic Imaging 32, 1-8, 2020 | 5 | 2020 |
CNN steganalyzers leverage local embedding artifacts Y Yousfi, J Butora, J Fridrich 2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021 | 4 | 2021 |
Extending the reverse JPEG compatibility attack to double compressed images J Butora, J Fridrich ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 4 | 2021 |
Side-informed steganography for jpeg images by modeling decompressed images J Butora, P Bas IEEE Transactions on Information Forensics and Security, 2023 | 3 | 2023 |
Analysis and mitigation of the false alarms of the reverse jpeg compatibility attack J Butora, P Bas, R Cogranne Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023 | 2 | 2023 |
Toward reliable jpeg steganalysis (at qf100) E Levecque, J Klein, P Bas, J Butora 2022 IEEE International Workshop on Information Forensics and Security (WIFS …, 2022 | 2 | 2022 |
High quality JPEG compressor detection via decompression error J Butora, P Bas GRETSI, 2022 | 2 | 2022 |
Revisiting perturbed quantization J Butora, J Fridrich Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 2 | 2021 |
The Adobe Hidden Feature and its Impact on Sensor Attribution J Butora, P Bas arXiv preprint arXiv:2401.01366, 2023 | 1 | 2023 |