ติดตาม
Jan Butora
Jan Butora
CNRS CRIStAL
ยืนยันอีเมลแล้วที่ univ-lille.fr - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
ImageNet pre-trained CNNs for JPEG steganalysis
Y Yousfi, J Butora, E Khvedchenya, J Fridrich
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
742020
Breaking ALASKA: Color separation for steganalysis in JPEG domain
Y Yousfi, J Butora, J Fridrich, Q Giboulot
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
662019
Reverse JPEG compatibility attack
J Butora, J Fridrich
IEEE Transactions on Information Forensics and Security 15, 1444-1454, 2019
552019
Improving EfficientNet for JPEG steganalysis
Y Yousfi, J Butora, J Fridrich, C Fuji Tsang
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
532021
How to pretrain for steganalysis
J Butora, Y Yousfi, J Fridrich
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
452021
Effect of jpeg quality on steganographic security
J Butora, J Fridrich
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
192019
Detection of diversified stego sources with CNNs
J Butora, J Fridrich
Electronic Imaging 31, 1-11, 2019
162019
Turning cost-based steganography into model-based
J Butora, Y Yousfi, J Fridrich
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020
142020
Steganography and its detection in JPEG images obtained with the" trunc" quantizer
J Butora, J Fridrich
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
142020
Errorless robust JPEG steganography using outputs of JPEG coders
J Butora, P Puteaux, P Bas
IEEE Transactions on Dependable and Secure Computing, 2023
112023
Fighting the reverse JPEG compatibility attack: Pick your side
J Butora, P Bas
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia …, 2022
52022
Extending the reverse JPEG compatibility attack to double compressed images
J Butora, J Fridrich
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
52021
Minimum perturbation cost modulation for side-informed steganography
J Butora, J Fridrich
Electronic Imaging 32, 1-8, 2020
52020
Side-informed steganography for jpeg images by modeling decompressed images
J Butora, P Bas
IEEE Transactions on Information Forensics and Security 18, 2683-2695, 2023
42023
CNN steganalyzers leverage local embedding artifacts
Y Yousfi, J Butora, J Fridrich
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
42021
High quality JPEG compressor detection via decompression error
J Butora, P Bas
GRETSI, 2022
32022
The adobe hidden feature and its impact on sensor attribution
J Butora, P Bas
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia …, 2024
22024
Size-Independent Reliable CNN for RJCA Steganalysis
J Butora, P Bas
IEEE Transactions on Information Forensics and Security, 2024
22024
Finding Incompatibles Blocks for Reliable JPEG Steganalysis
E Levecque, J Butora, P Bas
arXiv preprint arXiv:2402.13660, 2024
22024
Compatibility and Timing Attacks for JPEG Steganalysis
E Levecque, P Bas, J Butora
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023
22023
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20