Publications
2024
- Errorless Robust JPEG Steganography for Pixel ImagesButora, J., Bas, P., & Levecque, E.IEEE WIFS 2024
- Finding Incompatible Blocks for Reliable JPEG SteganalysisLecevque, E., Butora, J., & Bas, P.IEEE Transactions on Information Forensics and Security
- Detection of the Adobe PatternButora, J., & Bas, P.32nd European Signal Processing Conference
- The Adobe Hidden Feature and its Impact on Sensor AttributionButora, J., & Bas, P.12th IH&MMSec. Workshop 2024
- Size-Independent Reliable CNN for RJCA SteganalysisButora, J., & Bas, P.IEEE Transactions on Information Forensics and Security
2023
- Attaque temporelle de la compatibilité JPEGLevecque, E., Bas, P., & Butora, J.GRETSI
- Errorless Robust JPEG Steganography using Outputs of JPEG CodersButora, J., Puteaux, P., & Bas, P.IEEE Transactions on Dependable and Secure Computing
- Stéganographie robuste et sans erreur dans des images JPEG en utilisant les sorties des codeurs JPEGButora, J., Puteaux, P., & Bas, P.CORESA
- Compatibility and Timing Attacks for JPEG SteganalysisLevecque, E., Bas, P., & Butora, J.11th IH&MMSec. Workshop 2023
- Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility AttackButora, J., Bas, P., & Cogranne, R.11th IH&MMSec. Workshop 2023
- Side-Informed Steganography for JPEG Images by Modeling Decompressed ImagesButora, J., & Bas, P.IEEE Transactions on Information Forensics and Security
2022
- Toward Reliable JPEG Steganalysis (at QF100)Levecque, E., Klein, J., Bas, P., & Butora, J.IEEE WIFS 2022
- Vers une stéganalyse certifiée pour des images JPEGLevecque, E., Butora, J., Klein, J., & Bas, P.GRETSI
- High Quality JPEG Compressor Detection via Decompression ErrorButora, J., & Bas, P.GRETSI
- Fighting the Reverse JPEG Compatibility Attack: Pick your SideButora, J., & Bas, P.10th IH&MMSec. Workshop 2022
2021
- CNN Steganalyzers Leverage Local Embedding ArtifactsYousfi, Y., Butora, J., & Fridrich, J.IEEE WIFS 2021
- How to Pretrain for SteganalysisButora, J., Yousfi, Y., & Fridrich, J.9th IH&MMSec. Workshop 2021
- Revisiting Perturbed QuantizationButora, J., & Fridrich, J.9th IH&MMSec. Workshop 2021
- Extending the Reverse JPEG Compatibility Attack to Double Compressed ImagesButora, J., & Fridrich, J.IEEE ICASSP 2021
- Improving EfficientNet for JPEG SteganalysisYousfi, Y., Butora, J., Fridrich, J., & Fuji Tsang, C.9th IH&MMSec. Workshop 2021
- Statistical Models for Image Steganography: Explaining and Replacing HeuristicsButora, J.In PhD Thesis, Binghamton University
2020
- ImageNet Pre-trained CNNs for JPEG SteganalysisYousfi, Y., Butora, J., Khvedchenya, E., & Fridrich, J.IEEE WIFS 2020
- Turning Cost-Based Steganography into Model-BasedButora, J., Yousfi, Y., & Fridrich, J.8th IH&MMSec. Workshop 2020
- Steganography and its Detection in JPEG Images Obtained with the "TRUNC" QuantizerButora, J., & Fridrich, J.IEEE ICASSP 2020
- Minimum Perturbation Cost Modulation for Side-Informed SteganographyButora, J., & Fridrich, J.Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020
2019
- Reverse JPEG Compatibility AttackButora, J., & Fridrich, J.IEEE Transactions on Information Forensics and Security
- Effect of JPEG Quality on Steganographic SecurityButora, J., & Fridrich, J.7th IH&MMSec. Workshop 2019
- Breaking ALASKA: Color Separation for Steganalysis in JPEG DomainYousfi, Y., Butora, J., Fridrich, J., & Giboulot, Q.7th IH&MMSec. Workshop 2019
- Detection of Diversified Stego Sources with CNNsButora, J., & Fridrich, J.Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019