Search Results - "Cogranne, Rémi"
-
1
Content-Adaptive Steganography by Minimizing Statistical Detectability
Published in IEEE transactions on information forensics and security (01-02-2016)“…Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated…”
Get full text
Journal Article -
2
Rich model for Steganalysis of color images
Published in 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (03-12-2014)“…In this paper, we propose an extension of the spatial rich model for steganalysis of color images. The additional features are formed by three-dimensional…”
Get full text
Conference Proceeding -
3
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector
Published in IEEE transactions on information forensics and security (01-01-2022)“…Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis…”
Get full text
Journal Article -
4
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory
Published in IEEE transactions on information forensics and security (01-12-2015)“…The machine learning paradigm currently predominantly used for steganalysis of digital images works on the principle of fusing the decisions of many weak base…”
Get full text
Journal Article -
5
Effects and solutions of Cover-Source Mismatch in image steganalysis
Published in Signal processing. Image communication (01-08-2020)“…The Cover-Source Mismatch (CSM) has been long recognized as a major problem in modern steganography and steganalysis. Indeed, while a vast majority of works in…”
Get full text
Journal Article -
6
Selection-Channel-Aware Reverse JPEG Compatibility for Highly Reliable Steganalysis of JPEG Images
Published in ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2020)“…This paper deeply studies the principle of the recent reverse JPEG compatibility attack [1]. This analysis allows us to cast the problem of hidden data…”
Get full text
Conference Proceeding -
7
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off
Published in IEEE transactions on information forensics and security (01-01-2021)“…The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG steganography are usually subpar with respect to…”
Get full text
Journal Article -
8
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability
Published in IEEE transactions on information forensics and security (01-01-2022)“…Steganography schemes based on a deflection criterion for embedding posses a clear advantage against schemes based on heuristics as they provide a direct link…”
Get full text
Journal Article -
9
Statistical detection of defects in radiographic images using an adaptive parametric model
Published in Signal processing (01-03-2014)“…In this paper, a new methodology is presented for detecting anomalies from radiographic images. This methodology exploits a statistical model adapted to the…”
Get full text
Journal Article -
10
Camera Model Identification Based on the Heteroscedastic Noise Model
Published in IEEE transactions on image processing (01-01-2014)“…The goal of this paper is to design a statistical test for the camera model identification problem. The approach is based on the heteroscedastic noise model,…”
Get full text
Journal Article -
11
Cover-source mismatch in steganalysis: systematic review
Published in EURASIP Journal on Information Security (12-08-2024)“…Operational steganalysis contends with a major problem referred to as the cover-source mismatch (CSM), which is essentially a difference in distribution caused…”
Get full text
Journal Article -
12
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm
Published in IEEE transactions on image processing (01-05-2014)“…The goal of this paper is to propose a statistical model of quantized discrete cosine transform (DCT) coefficients. It relies on a mathematical framework of…”
Get full text
Journal Article -
13
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S
Published in Journal of network and systems management (01-03-2023)“…New services with low-latency (LL) requirements are one of the major challenges for the envisioned Internet. Many optimizations targeting the latency reduction…”
Get full text
Journal Article -
14
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics
Published in IEEE transactions on information forensics and security (01-01-2017)“…The goal of this paper is to propose an accurate method for estimating quantization steps from an image that has been previously JPEG-compressed and stored in…”
Get full text
Journal Article -
15
Estimation of Primary Quantization Steps in Double-Compressed JPEG Images Using a Statistical Model of Discrete Cosine Transform
Published in IEEE access (01-01-2019)“…Double compression of images occurs when one compresses twice, possibly with different quality factors, a digital image. Estimation of the first compression…”
Get full text
Journal Article -
16
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection
Published in IEEE transactions on information forensics and security (01-03-2013)“…This paper investigates the detection of information hidden in digital media by the least significant bit (LSB) matching scheme. In a theoretical context of…”
Get full text
Journal Article -
17
Statistical decision methods in the presence of linear nuisance parameters and despite imaging system heteroscedastic noise: Application to wheel surface inspection
Published in Signal processing (01-03-2018)“…•An original adaptive linear model with high accuracy is proposed.•The flexibility of this model allows applications to a wide range of objects.•Imaging system…”
Get full text
Journal Article -
18
Individual camera device identification from JPEG images
Published in Signal processing. Image communication (01-03-2017)“…The goal of this paper is to investigate the problem of source camera device identification for natural images in JPEG format. We propose an improved…”
Get full text
Journal Article -
19
Practical strategies for content-adaptive batch steganography and pooled steganalysis
Published in 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-03-2017)“…This paper investigates practical strategies for distributing payload across images with content-adaptive steganography and for pooling outputs of a…”
Get full text
Conference Proceeding -
20
Application of hypothesis testing theory for optimal detection of LSB matching data hiding
Published in Signal processing (01-07-2013)“…This paper addresses the problem of detecting the presence of data hidden in digital media by the Least Significant Bit (LSB) matching scheme. In a theoretical…”
Get full text
Journal Article