ImageNet pre-trained CNNs for JPEG steganalysis Y Yousfi, J Butora, E Khvedchenya, J Fridrich 2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020 | 74 | 2020 |
Breaking ALASKA: Color separation for steganalysis in JPEG domain Y Yousfi, J Butora, J Fridrich, Q Giboulot Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 66 | 2019 |
Reverse JPEG compatibility attack J Butora, J Fridrich IEEE Transactions on Information Forensics and Security 15, 1444-1454, 2019 | 55 | 2019 |
Improving EfficientNet for JPEG steganalysis Y Yousfi, J Butora, J Fridrich, C Fuji Tsang Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 53 | 2021 |
How to pretrain for steganalysis J Butora, Y Yousfi, J Fridrich Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 45 | 2021 |
Effect of jpeg quality on steganographic security J Butora, J Fridrich Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 19 | 2019 |
Detection of diversified stego sources with CNNs J Butora, J Fridrich Electronic Imaging 31, 1-11, 2019 | 16 | 2019 |
Turning cost-based steganography into model-based J Butora, Y Yousfi, J Fridrich Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020 | 14 | 2020 |
Steganography and its detection in JPEG images obtained with the" trunc" quantizer J Butora, J Fridrich ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 14 | 2020 |
Errorless robust JPEG steganography using outputs of JPEG coders J Butora, P Puteaux, P Bas IEEE Transactions on Dependable and Secure Computing, 2023 | 11 | 2023 |
Fighting the reverse JPEG compatibility attack: Pick your side J Butora, P Bas Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia …, 2022 | 5 | 2022 |
Extending the reverse JPEG compatibility attack to double compressed images J Butora, J Fridrich ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 5 | 2021 |
Minimum perturbation cost modulation for side-informed steganography J Butora, J Fridrich Electronic Imaging 32, 1-8, 2020 | 5 | 2020 |
Side-informed steganography for jpeg images by modeling decompressed images J Butora, P Bas IEEE Transactions on Information Forensics and Security 18, 2683-2695, 2023 | 4 | 2023 |
CNN steganalyzers leverage local embedding artifacts Y Yousfi, J Butora, J Fridrich 2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021 | 4 | 2021 |
High quality JPEG compressor detection via decompression error J Butora, P Bas GRETSI, 2022 | 3 | 2022 |
The adobe hidden feature and its impact on sensor attribution J Butora, P Bas Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia …, 2024 | 2 | 2024 |
Size-Independent Reliable CNN for RJCA Steganalysis J Butora, P Bas IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
Finding Incompatibles Blocks for Reliable JPEG Steganalysis E Levecque, J Butora, P Bas arXiv preprint arXiv:2402.13660, 2024 | 2 | 2024 |
Compatibility and Timing Attacks for JPEG Steganalysis E Levecque, P Bas, J Butora Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023 | 2 | 2023 |