Publications

2024

  1. Errorless Robust JPEG Steganography for Pixel Images
    Butora, J., Bas, P., & Levecque, E.
    IEEE WIFS 2024
  2. Finding Incompatible Blocks for Reliable JPEG Steganalysis
    Lecevque, E., Butora, J., & Bas, P.
    IEEE Transactions on Information Forensics and Security
  3. Detection of the Adobe Pattern
    Butora, J., & Bas, P.
    32nd European Signal Processing Conference
  4. The Adobe Hidden Feature and its Impact on Sensor Attribution
    Butora, J., & Bas, P.
    12th IH&MMSec. Workshop 2024
  5. Size-Independent Reliable CNN for RJCA Steganalysis
    Butora, J., & Bas, P.
    IEEE Transactions on Information Forensics and Security

2023

  1. Attaque temporelle de la compatibilité JPEG
    Levecque, E., Bas, P., & Butora, J.
    GRETSI
  2. Errorless Robust JPEG Steganography using Outputs of JPEG Coders
    Butora, J., Puteaux, P., & Bas, P.
    IEEE Transactions on Dependable and Secure Computing
  3. Stéganographie robuste et sans erreur dans des images JPEG en utilisant les sorties des codeurs JPEG
    Butora, J., Puteaux, P., & Bas, P.
    CORESA
  4. Compatibility and Timing Attacks for JPEG Steganalysis
    Levecque, E., Bas, P., & Butora, J.
    11th IH&MMSec. Workshop 2023
  5. Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack
    Butora, J., Bas, P., & Cogranne, R.
    11th IH&MMSec. Workshop 2023
  6. Side-Informed Steganography for JPEG Images by Modeling Decompressed Images
    Butora, J., & Bas, P.
    IEEE Transactions on Information Forensics and Security

2022

  1. Toward Reliable JPEG Steganalysis (at QF100)
    Levecque, E., Klein, J., Bas, P., & Butora, J.
    IEEE WIFS 2022
  2. Vers une stéganalyse certifiée pour des images JPEG
    Levecque, E., Butora, J., Klein, J., & Bas, P.
    GRETSI
  3. High Quality JPEG Compressor Detection via Decompression Error
    Butora, J., & Bas, P.
    GRETSI
  4. Fighting the Reverse JPEG Compatibility Attack: Pick your Side
    Butora, J., & Bas, P.
    10th IH&MMSec. Workshop 2022

2021

  1. CNN Steganalyzers Leverage Local Embedding Artifacts
    Yousfi, Y., Butora, J., & Fridrich, J.
    IEEE WIFS 2021
  2. How to Pretrain for Steganalysis
    Butora, J., Yousfi, Y., & Fridrich, J.
    9th IH&MMSec. Workshop 2021
  3. Revisiting Perturbed Quantization
    Butora, J., & Fridrich, J.
    9th IH&MMSec. Workshop 2021
  4. Extending the Reverse JPEG Compatibility Attack to Double Compressed Images
    Butora, J., & Fridrich, J.
    IEEE ICASSP 2021
  5. Improving EfficientNet for JPEG Steganalysis
    Yousfi, Y., Butora, J., Fridrich, J., & Fuji Tsang, C.
    9th IH&MMSec. Workshop 2021
  6. Statistical Models for Image Steganography: Explaining and Replacing Heuristics
    Butora, J.
    In PhD Thesis, Binghamton University

2020

  1. ImageNet Pre-trained CNNs for JPEG Steganalysis
    Yousfi, Y., Butora, J., Khvedchenya, E., & Fridrich, J.
    IEEE WIFS 2020
  2. Turning Cost-Based Steganography into Model-Based
    Butora, J., Yousfi, Y., & Fridrich, J.
    8th IH&MMSec. Workshop 2020
  3. Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer
    Butora, J., & Fridrich, J.
    IEEE ICASSP 2020
  4. Minimum Perturbation Cost Modulation for Side-Informed Steganography
    Butora, J., & Fridrich, J.
    Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020

2019

  1. Reverse JPEG Compatibility Attack
    Butora, J., & Fridrich, J.
    IEEE Transactions on Information Forensics and Security
  2. Effect of JPEG Quality on Steganographic Security
    Butora, J., & Fridrich, J.
    7th IH&MMSec. Workshop 2019
  3. Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain
    Yousfi, Y., Butora, J., Fridrich, J., & Giboulot, Q.
    7th IH&MMSec. Workshop 2019
  4. Detection of Diversified Stego Sources with CNNs
    Butora, J., & Fridrich, J.
    Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019