Publications

2022

  1. Vers une stéganalyse certifiée pour des images JPEG
    Levecque, E., Butora, J., Klein, J., & Bas, P.
    GRETSI
  2. High Quality JPEG Compressor Detection via Decompression Error
    Butora, J., & Bas, P.
    GRETSI
  3. Fighting the Reverse JPEG Compatibility Attack: Pick your Side
    Butora, J., & Bas, P.
    10th IH&MMSec. Workshop 2022

2021

  1. CNN Steganalyzers Leverage Local Embedding Artifacts
    Yousfi, Y., Butora, J., & Fridrich, J.
    IEEE WIFS 2021
  2. How to Pretrain for Steganalysis
    Butora, J., Yousfi, Y., & Fridrich, J.
    9th IH&MMSec. Workshop 2021
  3. Revisiting Perturbed Quantization
    Butora, J., & Fridrich, J.
    9th IH&MMSec. Workshop 2021
  4. Extending the Reverse JPEG Compatibility Attack to Double Compressed Images
    Butora, J., & Fridrich, J.
    IEEE ICASSP 2021
  5. Improving EfficientNet for JPEG Steganalysis
    Yousfi, Y., Butora, J., Fridrich, J., & Fuji Tsang, C.
    9th IH&MMSec. Workshop 2021
  6. Statistical Models for Image Steganography: Explaining and Replacing Heuristics
    Butora, J.
    In PhD Thesis, Binghamton University

2020

  1. ImageNet Pre-trained CNNs for JPEG Steganalysis
    Yousfi, Y., Butora, J., Khvedchenya, E., & Fridrich, J.
    IEEE WIFS 2020
  2. Turning Cost-Based Steganography into Model-Based
    Butora, J., Yousfi, Y., & Fridrich, J.
    8th IH&MMSec. Workshop 2020
  3. Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer
    Butora, J., & Fridrich, J.
    IEEE ICASSP 2020
  4. Minimum Perturbation Cost Modulation for Side-Informed Steganography
    Butora, J., & Fridrich, J.
    Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020

2019

  1. Reverse JPEG Compatibility Attack
    Butora, J., & Fridrich, J.
    IEEE Transactions on Information Forensics and Security, 15, 1444–1454
  2. Effect of JPEG Quality on Steganographic Security
    Butora, J., & Fridrich, J.
    7th IH&MMSec. Workshop 2019
  3. Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain
    Yousfi, Y., Butora, J., Fridrich, J., & Giboulot, Q.
    7th IH&MMSec. Workshop 2019
  4. Detection of Diversified Stego Sources with CNNs
    Butora, J., & Fridrich, J.
    Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019