Patrick Bas
Directeur de recherche epst
Laboratoire / équipe
Publications
{
"response":{
"numFound":155,
"start":0,
"numFoundExact":true,
"docs":[{
"citationRef_s":"<i>16th IEEE International Workshop on Information Forensics and Security</i>, Dec 2024, Rome, Italy",
"citationFull_s":"Jan Butora, Etienne Levecque, Patrick Bas. Errorless Robust JPEG Steganography for Pixel Images. <i>16th IEEE International Workshop on Information Forensics and Security</i>, Dec 2024, Rome, Italy. <a target=\"_blank\" href=\"https://hal.science/hal-04671761v2\">⟨hal-04671761v2⟩</a>",
"title_s":["Errorless Robust JPEG Steganography for Pixel Images"],
"authFullName_s":["Jan Butora","Etienne Levecque","Patrick Bas"],
"halId_s":"hal-04671761",
"docType_s":"COMM",
"producedDateY_i":2024
},{
"citationRef_s":"2024",
"citationFull_s":"Julien Simon de Kergunic, Rony Abecidan, Patrick Bas, Vincent Itier. Pick the Largest Margin for Robust Detection of Splicing. 2024. <a target=\"_blank\" href=\"https://hal.science/hal-04688185v2\">⟨hal-04688185v2⟩</a>",
"title_s":["Pick the Largest Margin for Robust Detection of Splicing"],
"authFullName_s":["Julien Simon de Kergunic","Rony Abecidan","Patrick Bas","Vincent Itier"],
"halId_s":"hal-04688185",
"docType_s":"UNDEFINED",
"producedDateY_i":2024
},{
"citationRef_s":"2024",
"citationFull_s":"Etienne Levecque, Jan Butora, Patrick Bas. Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics. 2024. <a target=\"_blank\" href=\"https://hal.science/hal-04681110v1\">⟨hal-04681110⟩</a>",
"title_s":["Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics"],
"authFullName_s":["Etienne Levecque","Jan Butora","Patrick Bas"],
"halId_s":"hal-04681110",
"docType_s":"UNDEFINED",
"producedDateY_i":2024
},{
"citationRef_s":"<i>32nd European Signal Processing Conference</i>, Aug 2024, Lyon, France",
"citationFull_s":"Jan Butora, Patrick Bas. Detection of the Adobe Pattern. <i>32nd European Signal Processing Conference</i>, Aug 2024, Lyon, France. <a target=\"_blank\" href=\"https://hal.science/hal-04498274v2\">⟨hal-04498274v2⟩</a>",
"title_s":["Detection of the Adobe Pattern"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04498274",
"docType_s":"COMM",
"producedDateY_i":2024
},{
"citationRef_s":"<i>12th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2024, Baiona, Spain",
"citationFull_s":"Jan Butora, Patrick Bas. The Adobe Hidden Feature and its Impact on Sensor Attribution. <i>12th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2024, Baiona, Spain. <a target=\"_blank\" href=\"https://hal.science/hal-04318702v5\">⟨hal-04318702v5⟩</a>",
"title_s":["The Adobe Hidden Feature and its Impact on Sensor Attribution"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04318702",
"docType_s":"COMM",
"producedDateY_i":2024
},{
"citationRef_s":"<i>12th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSEC'24)</i>, Jun 2024, Baiona, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3658664.3659638\">⟨10.1145/3658664.3659638⟩</a>",
"citationFull_s":"Antoine Mallet, Patrick Bas, Rémi Cogranne. Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch. <i>12th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSEC'24)</i>, Jun 2024, Baiona, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3658664.3659638\">⟨10.1145/3658664.3659638⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04571878v2\">⟨hal-04571878v2⟩</a>",
"title_s":["Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch"],
"authFullName_s":["Antoine Mallet","Patrick Bas","Rémi Cogranne"],
"halId_s":"hal-04571878",
"docType_s":"COMM",
"producedDateY_i":2024
},{
"citationRef_s":"<i>12th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSEC'24)</i>, Jun 2024, Baiona, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3658664.3659643\">⟨10.1145/3658664.3659643⟩</a>",
"citationFull_s":"Antoine Mallet, Rémi Cogranne, Patrick Bas. Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis. <i>12th ACM Workshop on Information Hiding and Multimedia Security (ACM IH&MMSEC'24)</i>, Jun 2024, Baiona, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3658664.3659643\">⟨10.1145/3658664.3659643⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04571870v2\">⟨hal-04571870v2⟩</a>",
"title_s":["Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis"],
"authFullName_s":["Antoine Mallet","Rémi Cogranne","Patrick Bas"],
"halId_s":"hal-04571870",
"docType_s":"COMM",
"producedDateY_i":2024
},{
"citationRef_s":"2024",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný. Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis. 2024. <a target=\"_blank\" href=\"https://hal.science/hal-04587809v2\">⟨hal-04587809v2⟩</a>",
"title_s":["Blind Data Adaptation to tackle Covariate Shift in Operational Steganalysis"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas","Tomáš Pevný"],
"halId_s":"hal-04587809",
"docType_s":"UNDEFINED",
"producedDateY_i":2024
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2024, pp.2683-2695. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2024.3379849\">⟨10.1109/TIFS.2024.3379849⟩</a>",
"citationFull_s":"Jan Butora, Patrick Bas. Size-Independent Reliable CNN for RJCA Steganalysis. <i>IEEE Transactions on Information Forensics and Security</i>, 2024, pp.2683-2695. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2024.3379849\">⟨10.1109/TIFS.2024.3379849⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04223357v3\">⟨hal-04223357v3⟩</a>",
"title_s":["Size-Independent Reliable CNN for RJCA Steganalysis"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04223357",
"docType_s":"ART",
"producedDateY_i":2024
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2024, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2024.3470650\">⟨10.1109/TIFS.2024.3470650⟩</a>",
"citationFull_s":"Etienne Levecque, Jan Butora, Patrick Bas. Finding Incompatible Blocks for Reliable JPEG Steganalysis. <i>IEEE Transactions on Information Forensics and Security</i>, 2024, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2024.3470650\">⟨10.1109/TIFS.2024.3470650⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04470068v2\">⟨hal-04470068v2⟩</a>",
"title_s":["Finding Incompatible Blocks for Reliable JPEG Steganalysis"],
"authFullName_s":["Etienne Levecque","Jan Butora","Patrick Bas"],
"halId_s":"hal-04470068",
"docType_s":"ART",
"producedDateY_i":2024
},{
"citationRef_s":"2023",
"citationFull_s":"Jan Butora, Patrick Bas. The Adobe Hidden Feature and its Impact on Sensor Attribution. 2023. <a target=\"_blank\" href=\"https://hal.science/hal-04456499v1\">⟨hal-04456499⟩</a>",
"title_s":["The Adobe Hidden Feature and its Impact on Sensor Attribution"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04456499",
"docType_s":"SOFTWARE",
"producedDateY_i":2023
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security (WIFS 2023)</i>, Dec 2023, Nuremberg, Germany",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný. Leveraging Data Geometry to Mitigate CSM in Steganalysis. <i>IEEE International Workshop on Information Forensics and Security (WIFS 2023)</i>, Dec 2023, Nuremberg, Germany. <a target=\"_blank\" href=\"https://hal.science/hal-04229257v1\">⟨hal-04229257⟩</a>",
"title_s":["Leveraging Data Geometry to Mitigate CSM in Steganalysis"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas","Tomáš Pevný"],
"halId_s":"hal-04229257",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"2023",
"citationFull_s":"Jan Butora, Pauline Puteaux, Patrick Bas. Errorless Robust JPEG Steganography using Outputs of JPEG Coders. 2023. <a target=\"_blank\" href=\"https://hal.science/hal-04456487v1\">⟨hal-04456487⟩</a>",
"title_s":["Errorless Robust JPEG Steganography using Outputs of JPEG Coders"],
"authFullName_s":["Jan Butora","Pauline Puteaux","Patrick Bas"],
"halId_s":"hal-04456487",
"docType_s":"SOFTWARE",
"producedDateY_i":2023
},{
"citationRef_s":"2023",
"citationFull_s":"Jan Butora, Patrick Bas. Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. 2023. <a target=\"_blank\" href=\"https://hal.science/hal-04456482v1\">⟨hal-04456482⟩</a>",
"title_s":["Side-Informed Steganography for JPEG Images by Modeling Decompressed Images"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04456482",
"docType_s":"SOFTWARE",
"producedDateY_i":2023
},{
"citationRef_s":"<i>GRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images</i>, Aug 2023, Grenoble, France. pp.1-4",
"citationFull_s":"Patrick Bas, Gwenael Doerr, Teddy Furon, William Puech. Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'Information. <i>GRETSI 2023 - XXIXème Colloque Francophone de Traitement du Signal et des Images</i>, Aug 2023, Grenoble, France. pp.1-4. <a target=\"_blank\" href=\"https://hal.science/hal-04149340v2\">⟨hal-04149340v2⟩</a>",
"title_s":["Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'Information"],
"authFullName_s":["Patrick Bas","Gwenael Doerr","Teddy Furon","William Puech"],
"halId_s":"hal-04149340",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>XXIXème Colloque Francophone de Traitement du Signal et des Images (GRETSI'23)</i>, Aug 2023, Grenoble, France",
"citationFull_s":"Etienne Levecque, Patrick Bas, Jan Butora. Attaque de Compatibilité contre la Stéganographie JPEG. <i>XXIXème Colloque Francophone de Traitement du Signal et des Images (GRETSI'23)</i>, Aug 2023, Grenoble, France. <a target=\"_blank\" href=\"https://hal.science/hal-04170051v1\">⟨hal-04170051⟩</a>",
"title_s":["Attaque de Compatibilité contre la Stéganographie JPEG"],
"authFullName_s":["Etienne Levecque","Patrick Bas","Jan Butora"],
"halId_s":"hal-04170051",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>XXIXème Colloque Francophone de Traitement du Signal et des Images-GRETSI'23</i>, Aug 2023, Grenoble, France",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas. Recherche et Analyse de Sources Représentatives pour la Stéganalyse. <i>XXIXème Colloque Francophone de Traitement du Signal et des Images-GRETSI'23</i>, Aug 2023, Grenoble, France. <a target=\"_blank\" href=\"https://hal.science/hal-04166647v2\">⟨hal-04166647v2⟩</a>",
"title_s":["Recherche et Analyse de Sources Représentatives pour la Stéganalyse","Research and analysis of representatives sources for steganalysis"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas"],
"halId_s":"hal-04166647",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>IH&MMSec'23</i>, Jun 2023, Chicago, United States. pp.59-66, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3577163.3595092\">⟨10.1145/3577163.3595092⟩</a>",
"citationFull_s":"Jan Butora, Patrick Bas, Rémi Cogranne. Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack. <i>IH&MMSec'23</i>, Jun 2023, Chicago, United States. pp.59-66, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3577163.3595092\">⟨10.1145/3577163.3595092⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04098685v2\">⟨hal-04098685v2⟩</a>",
"title_s":["Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack"],
"authFullName_s":["Jan Butora","Patrick Bas","Rémi Cogranne"],
"halId_s":"hal-04098685",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>Workshop on Information Hiding and Multimedia Security</i>, ACM, Jun 2023, Chicago, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3577163.3595093\">⟨10.1145/3577163.3595093⟩</a>",
"citationFull_s":"Etienne Levecque, Patrick Bas, Jan Butora. Compatibility and Timing Attacks for JPEG Steganalysis. <i>Workshop on Information Hiding and Multimedia Security</i>, ACM, Jun 2023, Chicago, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3577163.3595093\">⟨10.1145/3577163.3595093⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04098582v2\">⟨hal-04098582v2⟩</a>",
"title_s":["Compatibility and Timing Attacks for JPEG Steganalysis","Attaque par compatibilité et temporelle pour la stéganalyse JPEG"],
"authFullName_s":["Etienne Levecque","Patrick Bas","Jan Butora"],
"halId_s":"hal-04098582",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>XXIIème édition de la conférence CORESA (COmpression et REprésentation des Signaux Audiovisuels)</i>, Jun 2023, Lille, France",
"citationFull_s":"Jan Butora, Pauline Puteaux, Patrick Bas. Stéganographie robuste et sans erreur dans des images JPEG en utilisant les sorties des codeurs JPEG. <i>XXIIème édition de la conférence CORESA (COmpression et REprésentation des Signaux Audiovisuels)</i>, Jun 2023, Lille, France. <a target=\"_blank\" href=\"https://hal.science/hal-04439584v1\">⟨hal-04439584⟩</a>",
"title_s":["Stéganographie robuste et sans erreur dans des images JPEG en utilisant les sorties des codeurs JPEG"],
"authFullName_s":["Jan Butora","Pauline Puteaux","Patrick Bas"],
"halId_s":"hal-04439584",
"docType_s":"COMM",
"producedDateY_i":2023
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2023.3268884\">⟨10.1109/TIFS.2023.3268884⟩</a>",
"citationFull_s":"Jan Butora, Patrick Bas. Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. <i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2023.3268884\">⟨10.1109/TIFS.2023.3268884⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04083163v1\">⟨hal-04083163⟩</a>",
"title_s":["Side-Informed Steganography for JPEG Images by Modeling Decompressed Images"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-04083163",
"docType_s":"ART",
"producedDateY_i":2023
},{
"citationRef_s":"<i>IEEE Transactions on Dependable and Secure Computing</i>, 2023, pp.1-13. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TDSC.2023.3306379\">⟨10.1109/TDSC.2023.3306379⟩</a>",
"citationFull_s":"Jan Butora, Pauline Puteaux, Patrick Bas. Errorless Robust JPEG Steganography using Outputs of JPEG Coders. <i>IEEE Transactions on Dependable and Secure Computing</i>, 2023, pp.1-13. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TDSC.2023.3306379\">⟨10.1109/TDSC.2023.3306379⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04181480v1\">⟨hal-04181480⟩</a>",
"title_s":["Errorless Robust JPEG Steganography using Outputs of JPEG Coders"],
"authFullName_s":["Jan Butora","Pauline Puteaux","Patrick Bas"],
"halId_s":"hal-04181480",
"docType_s":"ART",
"producedDateY_i":2023
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security (WIFS 2022)</i>, Dec 2022, Shanghai, China. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS55849.2022.9975430\">⟨10.1109/WIFS55849.2022.9975430⟩</a>",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný. Using Set Covering to Generate Databases for Holistic Steganalysis. <i>IEEE International Workshop on Information Forensics and Security (WIFS 2022)</i>, Dec 2022, Shanghai, China. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS55849.2022.9975430\">⟨10.1109/WIFS55849.2022.9975430⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03840926v2\">⟨hal-03840926v2⟩</a>",
"title_s":["Using Set Covering to Generate Databases for Holistic Steganalysis"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas","Tomáš Pevný"],
"halId_s":"hal-03840926",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2022, Shanghai, China",
"citationFull_s":"Etienne Levecque, John Klein, Patrick Bas, Jan Butora. Toward Reliable JPEG Steganalysis (at QF100). <i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2022, Shanghai, China. <a target=\"_blank\" href=\"https://hal.science/hal-03808390v1\">⟨hal-03808390⟩</a>",
"title_s":["Toward Reliable JPEG Steganalysis (at QF100)"],
"authFullName_s":["Etienne Levecque","John Klein","Patrick Bas","Jan Butora"],
"halId_s":"hal-03808390",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>ICIP 2022 - 29th IEEE International Conference on Image Processing</i>, Oct 2022, Bordeaux, France. pp.1-5",
"citationFull_s":"Teddy Furon, Benoit Bonnet, Patrick Bas. Adversarial images with downscaling. <i>ICIP 2022 - 29th IEEE International Conference on Image Processing</i>, Oct 2022, Bordeaux, France. pp.1-5. <a target=\"_blank\" href=\"https://inria.hal.science/hal-03806425v1\">⟨hal-03806425⟩</a>",
"title_s":["Adversarial images with downscaling"],
"authFullName_s":["Teddy Furon","Benoit Bonnet","Patrick Bas"],
"halId_s":"hal-03806425",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>GRETSI 2022</i>, Sep 2022, Nancy, France",
"citationFull_s":"Etienne Levecque, Jan Butora, John Klein, Patrick Bas. Vers une stéganalyse certifiée pour des images JPEG. <i>GRETSI 2022</i>, Sep 2022, Nancy, France. <a target=\"_blank\" href=\"https://hal.science/hal-03762836v1\">⟨hal-03762836⟩</a>",
"title_s":["Vers une stéganalyse certifiée pour des images JPEG","Toward Reliable JPEG Steganalysis (at QF100)"],
"authFullName_s":["Etienne Levecque","Jan Butora","John Klein","Patrick Bas"],
"halId_s":"hal-03762836",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>GRETSI 2022 - Colloque Francophone de Traitement du Signal et des Images</i>, Sep 2022, Nancy, France",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas. Adaptation de domaine pour l'analyse forensique d'images. <i>GRETSI 2022 - Colloque Francophone de Traitement du Signal et des Images</i>, Sep 2022, Nancy, France. <a target=\"_blank\" href=\"https://hal.science/hal-03704712v1\">⟨hal-03704712⟩</a>",
"title_s":["Adaptation de domaine pour l'analyse forensique d'images","Domain Adaptation for Digital Forensics"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas"],
"halId_s":"hal-03704712",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>GRETSI</i>, Sep 2022, Nancy, France",
"citationFull_s":"Jan Butora, Patrick Bas. High Quality JPEG Compressor Detection via Decompression Error. <i>GRETSI</i>, Sep 2022, Nancy, France. <a target=\"_blank\" href=\"https://hal.science/hal-03697777v2\">⟨hal-03697777v2⟩</a>",
"title_s":["High Quality JPEG Compressor Detection via Decompression Error"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-03697777",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>European Signal Processing Conference</i>, Aug 2022, Belgrade, Serbia",
"citationFull_s":"Quentin Giboulot, Patrick Bas, Rémi Cogranne, Dirk Borghys. The Cover Source Mismatch Problem in Deep-Learning Steganalysis. <i>European Signal Processing Conference</i>, Aug 2022, Belgrade, Serbia. <a target=\"_blank\" href=\"https://utt.hal.science/hal-03694662v1\">⟨hal-03694662⟩</a>",
"title_s":["The Cover Source Mismatch Problem in Deep-Learning Steganalysis"],
"authFullName_s":["Quentin Giboulot","Patrick Bas","Rémi Cogranne","Dirk Borghys"],
"halId_s":"hal-03694662",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>2022 30th European Signal Processing Conference (EUSIPCO)</i>, Aug 2022, Belgrade, Serbia. pp.1032-1036, <a target=\"_blank\" href=\"https://dx.doi.org/10.23919/EUSIPCO55093.2022.9909553\">⟨10.23919/EUSIPCO55093.2022.9909553⟩</a>",
"citationFull_s":"Quentin Giboulot, Patrick Bas, Rémi Cogranne, Borghys Dirk. The Cover Source Mismatch Problem in Deep-Learning Steganalysis. <i>2022 30th European Signal Processing Conference (EUSIPCO)</i>, Aug 2022, Belgrade, Serbia. pp.1032-1036, <a target=\"_blank\" href=\"https://dx.doi.org/10.23919/EUSIPCO55093.2022.9909553\">⟨10.23919/EUSIPCO55093.2022.9909553⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-04458063v1\">⟨hal-04458063⟩</a>",
"title_s":["The Cover Source Mismatch Problem in Deep-Learning Steganalysis"],
"authFullName_s":["Quentin Giboulot","Patrick Bas","Rémi Cogranne","Borghys Dirk"],
"halId_s":"hal-04458063",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>The 10th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2022, Santa Barbara, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3531536.3532955\">⟨10.1145/3531536.3532955⟩</a>",
"citationFull_s":"Jan Butora, Patrick Bas. Fighting the Reverse JPEG Compatibility Attack: Pick your Side. <i>The 10th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2022, Santa Barbara, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3531536.3532955\">⟨10.1145/3531536.3532955⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03662307v2\">⟨hal-03662307v2⟩</a>",
"title_s":["Fighting the Reverse JPEG Compatibility Attack: Pick your Side"],
"authFullName_s":["Jan Butora","Patrick Bas"],
"halId_s":"hal-03662307",
"docType_s":"COMM",
"producedDateY_i":2022
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2022, 17, pp.1841 - 1854. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2022.3173184\">⟨10.1109/TIFS.2022.3173184⟩</a>",
"citationFull_s":"Quentin Giboulot, Patrick Bas, Rémi Cogranne. Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. <i>IEEE Transactions on Information Forensics and Security</i>, 2022, 17, pp.1841 - 1854. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2022.3173184\">⟨10.1109/TIFS.2022.3173184⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-03663628v1\">⟨hal-03663628⟩</a>",
"title_s":["Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability"],
"authFullName_s":["Quentin Giboulot","Patrick Bas","Rémi Cogranne"],
"halId_s":"hal-03663628",
"docType_s":"ART",
"producedDateY_i":2022
},{
"citationRef_s":"<i>Multimedia Security 1: Authentication and Data Hiding</i>, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. <a target=\"_blank\" href=\"https://dx.doi.org/10.1002/9781119901808.ch8\">⟨10.1002/9781119901808.ch8⟩</a>",
"citationFull_s":"Rémi Cogranne, Marc Chaumont, Patrick Bas. Steganalysis: Detection of Hidden Data in Multimedia Content. <i>Multimedia Security 1: Authentication and Data Hiding</i>, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. <a target=\"_blank\" href=\"https://dx.doi.org/10.1002/9781119901808.ch8\">⟨10.1002/9781119901808.ch8⟩</a>. <a target=\"_blank\" href=\"https://hal-lirmm.ccsd.cnrs.fr/lirmm-03815641v1\">⟨lirmm-03815641⟩</a>",
"title_s":["Steganalysis: Detection of Hidden Data in Multimedia Content"],
"authFullName_s":["Rémi Cogranne","Marc Chaumont","Patrick Bas"],
"halId_s":"lirmm-03815641",
"docType_s":"COUV",
"producedDateY_i":2022
},{
"citationRef_s":"<i>Multimedia Security 1</i>, Chapter 5, Wiley, pp.161-188, 2022, Online: 9781119901808 Print: 9781789450262. <a target=\"_blank\" href=\"https://dx.doi.org/10.1002/9781119901808.ch5\">⟨10.1002/9781119901808.ch5⟩</a>",
"citationFull_s":"Patrick Bas, Rémi Cogranne, Marc Chaumont. Steganography: Embedding Data Into Multimedia Content. <i>Multimedia Security 1</i>, Chapter 5, Wiley, pp.161-188, 2022, Online: 9781119901808 Print: 9781789450262. <a target=\"_blank\" href=\"https://dx.doi.org/10.1002/9781119901808.ch5\">⟨10.1002/9781119901808.ch5⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03601267v1\">⟨hal-03601267⟩</a>",
"title_s":["Steganography: Embedding Data Into Multimedia Content"],
"authFullName_s":["Patrick Bas","Rémi Cogranne","Marc Chaumont"],
"halId_s":"hal-03601267",
"docType_s":"COUV",
"producedDateY_i":2022
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, In press",
"citationFull_s":"Solène Bernard, Patrick Bas, John Klein, Tomáš Pevný. Backpack: a Backpropagable Adversarial Embedding Scheme. <i>IEEE Transactions on Information Forensics and Security</i>, In press. <a target=\"_blank\" href=\"https://hal.science/hal-03760241v1\">⟨hal-03760241⟩</a>",
"title_s":["Backpack: a Backpropagable Adversarial Embedding Scheme"],
"authFullName_s":["Solène Bernard","Patrick Bas","John Klein","Tomáš Pevný"],
"halId_s":"hal-03760241",
"docType_s":"ART",
"producedDateY_i":2022
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3138616\">⟨10.1109/TIFS.2021.3138616⟩</a>",
"citationFull_s":"Benoit Bonnet, Teddy Furon, Patrick Bas. Generating Adversarial Images in Quantized Domains. <i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3138616\">⟨10.1109/TIFS.2021.3138616⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03467692v2\">⟨hal-03467692v2⟩</a>",
"title_s":["Generating Adversarial Images in Quantized Domains"],
"authFullName_s":["Benoit Bonnet","Teddy Furon","Patrick Bas"],
"halId_s":"hal-03467692",
"docType_s":"ART",
"producedDateY_i":2022
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security (WIFS 2021)</i>, Dec 2021, Montpellier, France",
"citationFull_s":"Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas. Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics. <i>IEEE International Workshop on Information Forensics and Security (WIFS 2021)</i>, Dec 2021, Montpellier, France. <a target=\"_blank\" href=\"https://hal.science/hal-03374780v2\">⟨hal-03374780v2⟩</a>",
"title_s":["Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics"],
"authFullName_s":["Rony Abecidan","Vincent Itier","Jérémie Boulanger","Patrick Bas"],
"halId_s":"hal-03374780",
"docType_s":"COMM",
"producedDateY_i":2021
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2021, 17, pp.1328 - 1343. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3111713\">⟨10.1109/TIFS.2021.3111713⟩</a>",
"citationFull_s":"Rémi Cogranne, Quentin Giboulot, Patrick Bas. Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector. <i>IEEE Transactions on Information Forensics and Security</i>, 2021, 17, pp.1328 - 1343. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3111713\">⟨10.1109/TIFS.2021.3111713⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-03342645v1\">⟨hal-03342645⟩</a>",
"title_s":["Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector"],
"authFullName_s":["Rémi Cogranne","Quentin Giboulot","Patrick Bas"],
"halId_s":"hal-03342645",
"docType_s":"ART",
"producedDateY_i":2021
},{
"citationRef_s":"<i>EUSIPCO 2021 - 29th European Signal Processing Conference</i>, Aug 2021, Dublin (virtual), Ireland. pp.806-810, <a target=\"_blank\" href=\"https://dx.doi.org/10.23919/EUSIPCO54536.2021.9616041\">⟨10.23919/EUSIPCO54536.2021.9616041⟩</a>",
"citationFull_s":"Pauline Puteaux, Vincent Itier, Patrick Bas. Combining Forensics and Privacy Requirements for Digital Images. <i>EUSIPCO 2021 - 29th European Signal Processing Conference</i>, Aug 2021, Dublin (virtual), Ireland. pp.806-810, <a target=\"_blank\" href=\"https://dx.doi.org/10.23919/EUSIPCO54536.2021.9616041\">⟨10.23919/EUSIPCO54536.2021.9616041⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03160123v2\">⟨hal-03160123v2⟩</a>",
"title_s":["Combining Forensics and Privacy Requirements for Digital Images"],
"authFullName_s":["Pauline Puteaux","Vincent Itier","Patrick Bas"],
"halId_s":"hal-03160123",
"docType_s":"COMM",
"producedDateY_i":2021
},{
"citationRef_s":"<i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 5, ISTE Group, pp.171-200, 2021, 9781789480269. <a target=\"_blank\" href=\"https://dx.doi.org/10.51926/ISTE.9026.ch5\">⟨10.51926/ISTE.9026.ch5⟩</a>",
"citationFull_s":"Patrick Bas, Rémi Cogranne, Marc Chaumont. Stéganographie : insertion d’informations dans des contenus multimédias. <i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 5, ISTE Group, pp.171-200, 2021, 9781789480269. <a target=\"_blank\" href=\"https://dx.doi.org/10.51926/ISTE.9026.ch5\">⟨10.51926/ISTE.9026.ch5⟩</a>. <a target=\"_blank\" href=\"https://hal-lirmm.ccsd.cnrs.fr/lirmm-03819891v1\">⟨lirmm-03819891⟩</a>",
"title_s":["Stéganographie : insertion d’informations dans des contenus multimédias"],
"authFullName_s":["Patrick Bas","Rémi Cogranne","Marc Chaumont"],
"halId_s":"lirmm-03819891",
"docType_s":"COUV",
"producedDateY_i":2021
},{
"citationRef_s":"<i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 8, pp.261-303, 2021, 9781789480269. <a target=\"_blank\" href=\"https://dx.doi.org/10.51926/ISTE.9026.ch8\">⟨10.51926/ISTE.9026.ch8⟩</a>",
"citationFull_s":"Rémi Cogranne, Patrick Bas, Marc Chaumont. Stéganalyse : détection d'information cachée dans des contenus multimédias. <i>Sécurité Multimédia - Partie 1 : Authentification et Insertion de Données Cachées</i>, Chapitre 8, pp.261-303, 2021, 9781789480269. <a target=\"_blank\" href=\"https://dx.doi.org/10.51926/ISTE.9026.ch8\">⟨10.51926/ISTE.9026.ch8⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-02470070v1\">⟨hal-02470070⟩</a>",
"title_s":["Stéganalyse : détection d'information cachée dans des contenus multimédias"],
"authFullName_s":["Rémi Cogranne","Patrick Bas","Marc Chaumont"],
"halId_s":"hal-02470070",
"docType_s":"COUV",
"producedDateY_i":2021
},{
"citationRef_s":"<i>9th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2021, Brussels (en ligne), Belgium",
"citationFull_s":"Solène Bernard, Patrick Bas, John Klein, Tomas Pevny. Optimizing Additive Approximations of Non-Additive Distortion Functions. <i>9th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2021, Brussels (en ligne), Belgium. <a target=\"_blank\" href=\"https://hal.science/hal-03208143v2\">⟨hal-03208143v2⟩</a>",
"title_s":["Optimizing Additive Approximations of Non-Additive Distortion Functions"],
"authFullName_s":["Solène Bernard","Patrick Bas","John Klein","Tomas Pevny"],
"halId_s":"hal-03208143",
"docType_s":"COMM",
"producedDateY_i":2021
},{
"citationRef_s":"2021",
"citationFull_s":"François de Vieilleville, Stéphane May, Adrien Lagrange, A Dupuis, Rosa Ruiloba, et al.. Actes de la conférence CAID 2020. 2021. <a target=\"_blank\" href=\"https://hal.science/hal-03206297v1\">⟨hal-03206297⟩</a>",
"title_s":["Actes de la conférence CAID 2020","Proceedings of the Conference on Artificial Intelligence for Defence 2020"],
"authFullName_s":["François de Vieilleville","Stéphane May","Adrien Lagrange","A Dupuis","Rosa Ruiloba","Fred Ngolè Mboula","Tristan Bitard-Feildel","Erwan Nogues","Corentin Larroche","Johan Mazel","Stephan Clémençon","Romain Burgot","Alric Gaurier","Louis Hulot","Léo Isaac-Dognin","Laetitia Leichtnam","Eric Totel","Nicolas Prigent","Ludovic Mé","Rémi Bernhard","Pierre-Alain Moëllic","Jean-Max Dutertre","Katarzyna Kapusta","Vincent Thouvenot","Olivier Bettan","Tristan Charrier","Luc Bonnafoux","Francisco-Pierre Puig","Quentin Lhoest","Thomas Renault","Adrien Benamira","Benoit Bonnet","Teddy Furon","Patrick Bas","Benjamin Farcy","Silvia Gil-Casals","Juliette Mattioli","Marc Fiammante","Marc Lambert","Roman Bresson","Johanne Cohen","Eyke Hullermeier","Christophe Labreuche","Michele Sebag","Thomas Thebaud","Anthony Larcher","Gaël Le Lan","Nouredine Nour","Reda Belhaj-Soullami","Cédric L.R. Buron","Alain Peres","Frédéric Barbaresco","Antoine D’acremont","Guillaume Quin","Alexandre Baussard","Ronan Fablet","Marie-Caroline Corbineau","Louis Morge-Rollet","Frederic Le Roy","Denis Le Jeune","Roland Gautier","Benjamin Camus","Eric Monteux","Mikaël Vermet","Alex Goupilleau","Tugdual Ceillier"],
"halId_s":"hal-03206297",
"docType_s":"PROCEEDINGS",
"producedDateY_i":2021
},{
"citationRef_s":"<i>ICPR-MMForWILD 2020 - Workshop MultiMedia FORensics in the WILD</i>, Jan 2021, Milan, Italy. pp.1-17",
"citationFull_s":"Benoît Bonnet, Teddy Furon, Patrick Bas. Forensics Through Stega Glasses: the Case of Adversarial Images. <i>ICPR-MMForWILD 2020 - Workshop MultiMedia FORensics in the WILD</i>, Jan 2021, Milan, Italy. pp.1-17. <a target=\"_blank\" href=\"https://hal.science/hal-03047954v1\">⟨hal-03047954⟩</a>",
"title_s":["Forensics Through Stega Glasses: the Case of Adversarial Images"],
"authFullName_s":["Benoît Bonnet","Teddy Furon","Patrick Bas"],
"halId_s":"hal-03047954",
"docType_s":"COMM",
"producedDateY_i":2021
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2021, 16, pp.2202-2217. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3050063\">⟨10.1109/TIFS.2021.3050063⟩</a>",
"citationFull_s":"Quentin Giboulot, Rémi Cogranne, Patrick Bas. Detectability-based JPEG steganography modeling the processing pipeline: the noise-content trade-off. <i>IEEE Transactions on Information Forensics and Security</i>, 2021, 16, pp.2202-2217. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2021.3050063\">⟨10.1109/TIFS.2021.3050063⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03096658v1\">⟨hal-03096658⟩</a>",
"title_s":["Detectability-based JPEG steganography modeling the processing pipeline: the noise-content trade-off"],
"authFullName_s":["Quentin Giboulot","Rémi Cogranne","Patrick Bas"],
"halId_s":"hal-03096658",
"docType_s":"ART",
"producedDateY_i":2021
},{
"citationRef_s":"<i>MediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation</i>, Dec 2020, Online, United States. pp.1-4",
"citationFull_s":"Benoit Bonnet, Teddy Furon, Patrick Bas. Fooling an Automatic Image Quality Estimator. <i>MediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation</i>, Dec 2020, Online, United States. pp.1-4. <a target=\"_blank\" href=\"https://hal.science/hal-03132891v1\">⟨hal-03132891⟩</a>",
"title_s":["Fooling an Automatic Image Quality Estimator"],
"authFullName_s":["Benoit Bonnet","Teddy Furon","Patrick Bas"],
"halId_s":"hal-03132891",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2020, New York City (Virtual Conference), United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS49906.2020.9360896\">⟨10.1109/WIFS49906.2020.9360896⟩</a>",
"citationFull_s":"Rémi Cogranne, Quentin Giboulot, Patrick Bas. ALASKA-2 : Challenging Academic Research on Steganalysis with Realistic Images. <i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2020, New York City (Virtual Conference), United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS49906.2020.9360896\">⟨10.1109/WIFS49906.2020.9360896⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-02950094v1\">⟨hal-02950094⟩</a>",
"title_s":["ALASKA-2 : Challenging Academic Research on Steganalysis with Realistic Images"],
"authFullName_s":["Rémi Cogranne","Quentin Giboulot","Patrick Bas"],
"halId_s":"hal-02950094",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2020, New York, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS49906.2020.9360884\">⟨10.1109/WIFS49906.2020.9360884⟩</a>",
"citationFull_s":"Quentin Giboulot, Patrick Bas, Rémi Cogranne. Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography. <i>IEEE International Workshop on Information Forensics and Security</i>, Dec 2020, New York, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/WIFS49906.2020.9360884\">⟨10.1109/WIFS49906.2020.9360884⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-03006635v1\">⟨hal-03006635⟩</a>",
"title_s":["Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography"],
"authFullName_s":["Quentin Giboulot","Patrick Bas","Rémi Cogranne"],
"halId_s":"hal-03006635",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"2020",
"citationFull_s":"Solène Bernard, Patrick Bas, John Klein, Tomas Pevny. Adversarial Embedding in the JPEG Domain Induces Correlations Between DCT Coefficients to Remove Blocking Artifacts Generated by Additive Embedding. 2020. <a target=\"_blank\" href=\"https://hal.science/hal-03032278v1\">⟨hal-03032278⟩</a>",
"title_s":["Adversarial Embedding in the JPEG Domain Induces Correlations Between DCT Coefficients to Remove Blocking Artifacts Generated by Additive Embedding"],
"authFullName_s":["Solène Bernard","Patrick Bas","John Klein","Tomas Pevny"],
"halId_s":"hal-03032278",
"docType_s":"UNDEFINED",
"producedDateY_i":2020
},{
"citationRef_s":"<i>International Workshop on Digital-forensics and Watermarking (IWDW) 2020</i>, Nov 2020, Melbourne, Australia",
"citationFull_s":"Patrick Bas. Using the Sensor Noise Model to Design Better Steganographic Schemes. <i>International Workshop on Digital-forensics and Watermarking (IWDW) 2020</i>, Nov 2020, Melbourne, Australia. <a target=\"_blank\" href=\"https://hal.science/hal-03047975v1\">⟨hal-03047975⟩</a>",
"title_s":["Using the Sensor Noise Model to Design Better Steganographic Schemes"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-03047975",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"2020, <a target=\"_blank\" style=\"word-break: break-all;\" href=\"https://archive.softwareheritage.org/browse/swh:1:dir:93fc9fed5665023207649107e27c3e39c92883b9;origin=https://hal.archives-ouvertes.fr/hal-04456456;visit=swh:1:snp:4a50d2eb06a501bf4d04da4042ffdc4bce61061e;anchor=swh:1:rel:a414e4907230581b3e44103a606749101427f3f4;path=/\">⟨swh:1:dir:93fc9fed5665023207649107e27c3e39c92883b9;origin=https://hal.archives-ouvertes.fr/hal-04456456;visit=swh:1:snp:4a50d2eb06a501bf4d04da4042ffdc4bce61061e;anchor=swh:1:rel:a414e4907230581b3e44103a606749101427f3f4;path=/⟩</a>",
"citationFull_s":"Théo Taburet, Wadih Sawaya, Patrick Bas, Jessica Fridrich. Python Implementation of Natural Steganography: Notebooks accompanying the paper published in IEEE TIFS.. 2020, <a target=\"_blank\" style=\"word-break: break-all;\" href=\"https://archive.softwareheritage.org/browse/swh:1:dir:93fc9fed5665023207649107e27c3e39c92883b9;origin=https://hal.archives-ouvertes.fr/hal-04456456;visit=swh:1:snp:4a50d2eb06a501bf4d04da4042ffdc4bce61061e;anchor=swh:1:rel:a414e4907230581b3e44103a606749101427f3f4;path=/\">⟨swh:1:dir:93fc9fed5665023207649107e27c3e39c92883b9;origin=https://hal.archives-ouvertes.fr/hal-04456456;visit=swh:1:snp:4a50d2eb06a501bf4d04da4042ffdc4bce61061e;anchor=swh:1:rel:a414e4907230581b3e44103a606749101427f3f4;path=/⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04456456v1\">⟨hal-04456456⟩</a>",
"title_s":["Python Implementation of Natural Steganography: Notebooks accompanying the paper published in IEEE TIFS."],
"authFullName_s":["Théo Taburet","Wadih Sawaya","Patrick Bas","Jessica Fridrich"],
"halId_s":"hal-04456456",
"docType_s":"SOFTWARE",
"producedDateY_i":2020
},{
"citationRef_s":"2020",
"citationFull_s":"Benoît Bonnet, Teddy Furon, Patrick Bas. Adversarial Images through Stega Glasses. 2020. <a target=\"_blank\" href=\"https://hal.science/hal-02946732v1\">⟨hal-02946732⟩</a>",
"title_s":["Adversarial Images through Stega Glasses"],
"authFullName_s":["Benoît Bonnet","Teddy Furon","Patrick Bas"],
"halId_s":"hal-02946732",
"docType_s":"UNDEFINED",
"producedDateY_i":2020
},{
"citationRef_s":"Publication CNRS; Gildas Avoine, Marc-olivier Killijian. <i>13 Défis de la cybersécurité</i>, 2020, 2271130611",
"citationFull_s":"Patrick Bas. Le tatouage des données multimédias. Publication CNRS; Gildas Avoine, Marc-olivier Killijian. <i>13 Défis de la cybersécurité</i>, 2020, 2271130611. <a target=\"_blank\" href=\"https://hal.science/hal-02950779v1\">⟨hal-02950779⟩</a>",
"title_s":["Le tatouage des données multimédias"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-02950779",
"docType_s":"COUV",
"producedDateY_i":2020
},{
"citationRef_s":"<i>Signal Processing: Image Communication</i>, 2020, 86, <a target=\"_blank\" href=\"https://dx.doi.org/10.1016/j.image.2020.115888\">⟨10.1016/j.image.2020.115888⟩</a>",
"citationFull_s":"Quentin Giboulot, Rémi Cogranne, Dirk Borghys, Patrick Bas. Effects and Solutions of Cover-Source Mismatch in Image Steganalysis. <i>Signal Processing: Image Communication</i>, 2020, 86, <a target=\"_blank\" href=\"https://dx.doi.org/10.1016/j.image.2020.115888\">⟨10.1016/j.image.2020.115888⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-02631559v1\">⟨hal-02631559⟩</a>",
"title_s":["Effects and Solutions of Cover-Source Mismatch in Image Steganalysis"],
"authFullName_s":["Quentin Giboulot","Rémi Cogranne","Dirk Borghys","Patrick Bas"],
"halId_s":"hal-02631559",
"docType_s":"ART",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IH&MMSec 2020 - ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, United States. pp.39-48, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395061\">⟨10.1145/3369412.3395061⟩</a>",
"citationFull_s":"Mehdi Yedroudj, Marc Chaumont, Frédéric Comby, Ahmed Oulad-Amara, Patrick Bas. Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis. <i>IH&MMSec 2020 - ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, United States. pp.39-48, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395061\">⟨10.1145/3369412.3395061⟩</a>. <a target=\"_blank\" href=\"https://hal-lirmm.ccsd.cnrs.fr/lirmm-02559838v1\">⟨lirmm-02559838⟩</a>",
"title_s":["Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis"],
"authFullName_s":["Mehdi Yedroudj","Marc Chaumont","Frédéric Comby","Ahmed Oulad-Amara","Patrick Bas"],
"halId_s":"lirmm-02559838",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>ACM Information Hiding and MultiMedia Security (IH&MMSec)</i>, Jun 2020, Denver, CO, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395075\">⟨10.1145/3369412.3395075⟩</a>",
"citationFull_s":"Rémi Cogranne, Quentin Giboulot, Patrick Bas. Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.. <i>ACM Information Hiding and MultiMedia Security (IH&MMSec)</i>, Jun 2020, Denver, CO, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395075\">⟨10.1145/3369412.3395075⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-02542075v1\">⟨hal-02542075⟩</a>",
"title_s":["Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images."],
"authFullName_s":["Rémi Cogranne","Quentin Giboulot","Patrick Bas"],
"halId_s":"hal-02542075",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IH&MMSEC 2020 - 8th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, France. pp.1-11, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395062\">⟨10.1145/3369412.3395062⟩</a>",
"citationFull_s":"Benoît Bonnet, Teddy Furon, Patrick Bas. What if Adversarial Samples were Digital Images?. <i>IH&MMSEC 2020 - 8th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, France. pp.1-11, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395062\">⟨10.1145/3369412.3395062⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02553006v2\">⟨hal-02553006v2⟩</a>",
"title_s":["What if Adversarial Samples were Digital Images?"],
"authFullName_s":["Benoît Bonnet","Teddy Furon","Patrick Bas"],
"halId_s":"hal-02553006",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395074\">⟨10.1145/3369412.3395074⟩</a>",
"citationFull_s":"Théo Taburet, Patrick Bas, Wadih Sawaya, Rémi Cogranne. JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline. <i>ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2020, Denver, United States. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3369412.3395074\">⟨10.1145/3369412.3395074⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02553023v2\">⟨hal-02553023v2⟩</a>",
"title_s":["JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline"],
"authFullName_s":["Théo Taburet","Patrick Bas","Wadih Sawaya","Rémi Cogranne"],
"halId_s":"hal-02553023",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>International Conference on Acoustics, Speech, and Signal Processing (ICASSP)</i>, May 2020, Barcelone, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/ICASSP40776.2020.9054486\">⟨10.1109/ICASSP40776.2020.9054486⟩</a>",
"citationFull_s":"Quentin Giboulot, Rémi Cogranne, Patrick Bas. JPEG STEGANOGRAPHY WITH SIDE INFORMATION FROM THE PROCESSING PIPELINE. <i>International Conference on Acoustics, Speech, and Signal Processing (ICASSP)</i>, May 2020, Barcelone, Spain. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/ICASSP40776.2020.9054486\">⟨10.1109/ICASSP40776.2020.9054486⟩</a>. <a target=\"_blank\" href=\"https://utt.hal.science/hal-02470179v1\">⟨hal-02470179⟩</a>",
"title_s":["JPEG STEGANOGRAPHY WITH SIDE INFORMATION FROM THE PROCESSING PIPELINE"],
"authFullName_s":["Quentin Giboulot","Rémi Cogranne","Patrick Bas"],
"halId_s":"hal-02470179",
"docType_s":"COMM",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2020.3021913\">⟨10.1109/TIFS.2020.3021913⟩</a>",
"citationFull_s":"Solène Bernard, Patrick Bas, John Klein, Tomáš Pevný. Explicit Optimization of min max Steganographic Game. <i>IEEE Transactions on Information Forensics and Security</i>, In press, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2020.3021913\">⟨10.1109/TIFS.2020.3021913⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02926034v1\">⟨hal-02926034⟩</a>",
"title_s":["Explicit Optimization of min max Steganographic Game"],
"authFullName_s":["Solène Bernard","Patrick Bas","John Klein","Tomáš Pevný"],
"halId_s":"hal-02926034",
"docType_s":"ART",
"producedDateY_i":2020
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2020, 16, pp.173-186. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2020.3007354\">⟨10.1109/TIFS.2020.3007354⟩</a>",
"citationFull_s":"Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica Fridrich. Natural Steganography in JPEG Domain With a Linear Development Pipeline. <i>IEEE Transactions on Information Forensics and Security</i>, 2020, 16, pp.173-186. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2020.3007354\">⟨10.1109/TIFS.2020.3007354⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02910206v1\">⟨hal-02910206⟩</a>",
"title_s":["Natural Steganography in JPEG Domain With a Linear Development Pipeline"],
"authFullName_s":["Théo Taburet","Patrick Bas","Wadih Sawaya","Jessica Fridrich"],
"halId_s":"hal-02910206",
"docType_s":"ART",
"producedDateY_i":2020
},{
"citationRef_s":"<i>GRETSI</i>, Aug 2019, Lille, France",
"citationFull_s":"Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica Fridrich. Stéganographie naturelle pour images JPEG. <i>GRETSI</i>, Aug 2019, Lille, France. <a target=\"_blank\" href=\"https://hal.science/hal-02165880v1\">⟨hal-02165880⟩</a>",
"title_s":["Stéganographie naturelle pour images JPEG"],
"authFullName_s":["Théo Taburet","Patrick Bas","Wadih Sawaya","Jessica Fridrich"],
"halId_s":"hal-02165880",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>GRETSI</i>, Aug 2019, Lille, France",
"citationFull_s":"Solène Bernard, Tomas Pevny, Patrick Bas, John Klein. Utilisation d’insertions adverses pour améliorer la stéganographie. <i>GRETSI</i>, Aug 2019, Lille, France. <a target=\"_blank\" href=\"https://hal.science/hal-02177369v1\">⟨hal-02177369⟩</a>",
"title_s":["Utilisation d’insertions adverses pour améliorer la stéganographie"],
"authFullName_s":["Solène Bernard","Tomas Pevny","Patrick Bas","John Klein"],
"halId_s":"hal-02177369",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>Colloque GRETSI (Groupement de Recherche en Traitement du Signal et des Images)</i>, Aug 2019, Lille, France",
"citationFull_s":"Quentin Giboulot, Rémi Cogranne, Dirk Borghys, Patrick Bas. Méthodes de réduction de la sensibilité à la base d'apprentissage en stéganalyse. <i>Colloque GRETSI (Groupement de Recherche en Traitement du Signal et des Images)</i>, Aug 2019, Lille, France. <a target=\"_blank\" href=\"https://hal.science/hal-02152785v1\">⟨hal-02152785⟩</a>",
"title_s":["Méthodes de réduction de la sensibilité à la base d'apprentissage en stéganalyse"],
"authFullName_s":["Quentin Giboulot","Rémi Cogranne","Dirk Borghys","Patrick Bas"],
"halId_s":"hal-02152785",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>IH-MMSec</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335715\">⟨10.1145/3335203.3335715⟩</a>",
"citationFull_s":"Théo Taburet, Patrick Bas, Jessica Fridrich, Wadih Sawaya. Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain. <i>IH-MMSec</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335715\">⟨10.1145/3335203.3335715⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02165866v2\">⟨hal-02165866v2⟩</a>",
"title_s":["Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain"],
"authFullName_s":["Théo Taburet","Patrick Bas","Jessica Fridrich","Wadih Sawaya"],
"halId_s":"hal-02165866",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>IH-MMSec</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335737\">⟨10.1145/3335203.3335737⟩</a>",
"citationFull_s":"Solène Bernard, Tomáš Pevný, Patrick Bas, John Klein. Exploiting Adversarial Embeddings for Better Steganography. <i>IH-MMSec</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335737\">⟨10.1145/3335203.3335737⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02177259v1\">⟨hal-02177259⟩</a>",
"title_s":["Exploiting Adversarial Embeddings for Better Steganography"],
"authFullName_s":["Solène Bernard","Tomáš Pevný","Patrick Bas","John Klein"],
"halId_s":"hal-02177259",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>ACM IH&MMSec (Information Hiding & Multimedia Security)</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335726\">⟨10.1145/3335203.3335726⟩</a>",
"citationFull_s":"Rémi Cogranne, Quentin Giboulot, Patrick Bas. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis \"Into The Wild\". <i>ACM IH&MMSec (Information Hiding & Multimedia Security)</i>, Jul 2019, Paris, France. <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3335203.3335726\">⟨10.1145/3335203.3335726⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-02147763v1\">⟨hal-02147763⟩</a>",
"title_s":["The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis \"Into The Wild"],
"authFullName_s":["Rémi Cogranne","Quentin Giboulot","Patrick Bas"],
"halId_s":"hal-02147763",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>Electronic Imaging 2019</i>, Jan 2019, Burlingame, United States",
"citationFull_s":"Théo Taburet, Patrick Bas, Wadih Sawaya, Jessica Fridrich. A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain. <i>Electronic Imaging 2019</i>, Jan 2019, Burlingame, United States. <a target=\"_blank\" href=\"https://hal.science/hal-02005407v2\">⟨hal-02005407v2⟩</a>",
"title_s":["A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain"],
"authFullName_s":["Théo Taburet","Patrick Bas","Wadih Sawaya","Jessica Fridrich"],
"halId_s":"hal-02005407",
"docType_s":"COMM",
"producedDateY_i":2019
},{
"citationRef_s":"<i>IWDW, International Workshop on Digital Forensics and Watermarking</i>, Oct 2018, Jeju, South Korea",
"citationFull_s":"Théo Taburet, Louis Filstroff, Patrick Bas, Wadih Sawaya. An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain. <i>IWDW, International Workshop on Digital Forensics and Watermarking</i>, Oct 2018, Jeju, South Korea. <a target=\"_blank\" href=\"https://hal.science/hal-01904482v1\">⟨hal-01904482⟩</a>",
"title_s":["An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain"],
"authFullName_s":["Théo Taburet","Louis Filstroff","Patrick Bas","Wadih Sawaya"],
"halId_s":"hal-01904482",
"docType_s":"COMM",
"producedDateY_i":2018
},{
"citationRef_s":"<i>IH-MMSEC</i>, Jun 2018, Innsbruck, Austria. pp.17-22, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3206004.3206021\">⟨10.1145/3206004.3206021⟩</a>",
"citationFull_s":"Dirk Borghys, Patrick Bas, Helena Bruyninckx. Facing the Cover-Source Mismatch on JPHide using Training-Set Design. <i>IH-MMSEC</i>, Jun 2018, Innsbruck, Austria. pp.17-22, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/3206004.3206021\">⟨10.1145/3206004.3206021⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-01833873v1\">⟨hal-01833873⟩</a>",
"title_s":["Facing the Cover-Source Mismatch on JPHide using Training-Set Design"],
"authFullName_s":["Dirk Borghys","Patrick Bas","Helena Bruyninckx"],
"halId_s":"hal-01833873",
"docType_s":"COMM",
"producedDateY_i":2018
},{
"citationRef_s":"<i>Electronic Imaging</i>, Jan 2018, San Francisco, United States",
"citationFull_s":"Tomáš Denemark, Patrick Bas, Jessica Fridrich. Natural Steganography in JPEG Compressed Images. <i>Electronic Imaging</i>, Jan 2018, San Francisco, United States. <a target=\"_blank\" href=\"https://hal.science/hal-01687194v1\">⟨hal-01687194⟩</a>",
"title_s":["Natural Steganography in JPEG Compressed Images"],
"authFullName_s":["Tomáš Denemark","Patrick Bas","Jessica Fridrich"],
"halId_s":"hal-01687194",
"docType_s":"COMM",
"producedDateY_i":2018
},{
"citationRef_s":"<i>GRETSI</i>, Sep 2017, Juan les Pins, France",
"citationFull_s":"Patrick Bas. Utilisation du bruit photonique pour la stéganographie. <i>GRETSI</i>, Sep 2017, Juan les Pins, France. <a target=\"_blank\" href=\"https://hal.science/hal-01687182v1\">⟨hal-01687182⟩</a>",
"title_s":["Utilisation du bruit photonique pour la stéganographie"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-01687182",
"docType_s":"COMM",
"producedDateY_i":2017
},{
"citationRef_s":"<i>ICASSP</i>, Mar 2017, New Orleans, United States",
"citationFull_s":"Patrick Bas. AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING. <i>ICASSP</i>, Mar 2017, New Orleans, United States. <a target=\"_blank\" href=\"https://hal.science/hal-01687178v1\">⟨hal-01687178⟩</a>",
"title_s":["AN EMBEDDING MECHANISM FOR NATURAL STEGANOGRAPHY AFTER DOWN-SAMPLING"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-01687178",
"docType_s":"COMM",
"producedDateY_i":2017
},{
"citationRef_s":"<i>WIFS</i>, Dec 2016, Abu Dabi, United Arab Emirates",
"citationFull_s":"Patrick Bas. Steganography via Cover-Source Switching. <i>WIFS</i>, Dec 2016, Abu Dabi, United Arab Emirates. <a target=\"_blank\" href=\"https://hal.science/hal-01386190v1\">⟨hal-01386190⟩</a>",
"title_s":["Steganography via Cover-Source Switching"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-01386190",
"docType_s":"COMM",
"producedDateY_i":2016
},{
"citationRef_s":"<i> International Symposium on Information Theory and Its Applications</i>, Oct 2016, Monterey, CA, United States",
"citationFull_s":"Anh Thu Phan Ho, Wadih Sawaya, Patrick Bas. Rare Event Probability Estimation Using Information Projection. <i> International Symposium on Information Theory and Its Applications</i>, Oct 2016, Monterey, CA, United States. <a target=\"_blank\" href=\"https://hal.science/hal-01359999v1\">⟨hal-01359999⟩</a>",
"title_s":["Rare Event Probability Estimation Using Information Projection"],
"authFullName_s":["Anh Thu Phan Ho","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-01359999",
"docType_s":"COMM",
"producedDateY_i":2016
},{
"citationRef_s":"2016",
"citationFull_s":"Patrick Bas. Natural Steganography: cover-source switching for better steganography. 2016. <a target=\"_blank\" href=\"https://hal.science/hal-01360024v1\">⟨hal-01360024⟩</a>",
"title_s":["Natural Steganography: cover-source switching for better steganography"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-01360024",
"docType_s":"UNDEFINED",
"producedDateY_i":2016
},{
"citationRef_s":"<i>4th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2016, Vigo, Spain. pp.93-102, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/2909827.2930797\">⟨10.1145/2909827.2930797⟩</a>",
"citationFull_s":"Andrew Ker, Tomáš Pevný, Patrick Bas. Rethinking Optimal Embedding. <i>4th ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2016, Vigo, Spain. pp.93-102, <a target=\"_blank\" href=\"https://dx.doi.org/10.1145/2909827.2930797\">⟨10.1145/2909827.2930797⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-01360016v1\">⟨hal-01360016⟩</a>",
"title_s":["Rethinking Optimal Embedding"],
"authFullName_s":["Andrew Ker","Tomáš Pevný","Patrick Bas"],
"halId_s":"hal-01360016",
"docType_s":"COMM",
"producedDateY_i":2016
},{
"citationRef_s":"<a target=\"_blank\" href=\"https://link.springer.com/book/10.1007/978-981-10-0506-0#book-header\">Springer Singapore</a>, IX, 125 p., 2016, SpringerBriefs in Electrical and Computer Engineering, 978-981-10-0505-3. <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-981-10-0506-0\">⟨10.1007/978-981-10-0506-0⟩</a>",
"citationFull_s":"Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon. Watermarking Security. <a target=\"_blank\" href=\"https://link.springer.com/book/10.1007/978-981-10-0506-0#book-header\">Springer Singapore</a>, IX, 125 p., 2016, SpringerBriefs in Electrical and Computer Engineering, 978-981-10-0505-3. <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-981-10-0506-0\">⟨10.1007/978-981-10-0506-0⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-04432624v1\">⟨hal-04432624⟩</a>",
"title_s":["Watermarking Security"],
"authFullName_s":["Patrick Bas","Teddy Furon","François Cayre","Gwenaël Doërr","Benjamin Mathon"],
"halId_s":"hal-04432624",
"docType_s":"OUV",
"producedDateY_i":2016
},{
"citationRef_s":"<i>ICASSP</i>, Mar 2016, Shanghai, China",
"citationFull_s":"Slava Voloshynovskiy, Taras Holotyak, Patrick Bas. PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESS. <i>ICASSP</i>, Mar 2016, Shanghai, China. <a target=\"_blank\" href=\"https://hal.science/hal-01283068v1\">⟨hal-01283068⟩</a>",
"title_s":["PHYSICAL OBJECT AUTHENTICATION: DETECTION-THEORETIC COMPARISON OF NATURAL AND ARTIFICIAL RANDOMNESS"],
"authFullName_s":["Slava Voloshynovskiy","Taras Holotyak","Patrick Bas"],
"halId_s":"hal-01283068",
"docType_s":"COMM",
"producedDateY_i":2016
},{
"citationRef_s":"<i>GRESTI</i>, Sep 2015, Lyon, France. pp.4",
"citationFull_s":"Anh Thu Phan Ho, Bao An Hoang Mai, Wadih Sawaya, Patrick Bas. Authentification par codes graphiques: optimisation du canal d'impression-acquisition. <i>GRESTI</i>, Sep 2015, Lyon, France. pp.4. <a target=\"_blank\" href=\"https://hal.science/hal-01188056v1\">⟨hal-01188056⟩</a>",
"title_s":["Authentification par codes graphiques: optimisation du canal d'impression-acquisition"],
"authFullName_s":["Anh Thu Phan Ho","Bao An Hoang Mai","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-01188056",
"docType_s":"COMM",
"producedDateY_i":2015
},{
"citationRef_s":"<i>IEEE International Conference on Image Processing</i>, Oct 2014, France. pp.IEEE ICIP",
"citationFull_s":"Bao An Hoang Mai, Wadih Sawaya, Patrick Bas. IMAGE MODEL AND PRINTED DOCUMENT AUTHENTICATION: A THEORETICAL ANALYSIS. <i>IEEE International Conference on Image Processing</i>, Oct 2014, France. pp.IEEE ICIP. <a target=\"_blank\" href=\"https://hal.science/hal-01056706v1\">⟨hal-01056706⟩</a>",
"title_s":["IMAGE MODEL AND PRINTED DOCUMENT AUTHENTICATION: A THEORETICAL ANALYSIS"],
"authFullName_s":["Bao An Hoang Mai","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-01056706",
"docType_s":"COMM",
"producedDateY_i":2014
},{
"citationRef_s":"<i>EUSIPCO 2014</i>, Sep 2014, Portugal. Eusipco",
"citationFull_s":"Anh Thu Phan Ho, Bao An Hoang Mai, Wadih Sawaya, Patrick Bas. AUTHENTICATION USING GRAPHICAL CODES: OPTIMISATION OF THE PRINT AND SCAN CHANNELS. <i>EUSIPCO 2014</i>, Sep 2014, Portugal. Eusipco. <a target=\"_blank\" href=\"https://hal.science/hal-01056702v1\">⟨hal-01056702⟩</a>",
"title_s":["AUTHENTICATION USING GRAPHICAL CODES: OPTIMISATION OF THE PRINT AND SCAN CHANNELS"],
"authFullName_s":["Anh Thu Phan Ho","Bao An Hoang Mai","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-01056702",
"docType_s":"COMM",
"producedDateY_i":2014
},{
"citationRef_s":"<i>EURASIP Journal on Information Security</i>, 2014, pp.10.1186/1687-417X-2014-9. <a target=\"_blank\" href=\"https://dx.doi.org/10.1186/1687-417X-2014-9\">⟨10.1186/1687-417X-2014-9⟩</a>",
"citationFull_s":"Anh Thu Phan Ho, Bao An Hoang Mai, Wadih Sawaya, Patrick Bas. Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization. <i>EURASIP Journal on Information Security</i>, 2014, pp.10.1186/1687-417X-2014-9. <a target=\"_blank\" href=\"https://dx.doi.org/10.1186/1687-417X-2014-9\">⟨10.1186/1687-417X-2014-9⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-01056699v1\">⟨hal-01056699⟩</a>",
"title_s":["Document Authentication Using Graphical Codes: Reliable Performance Analysis and Channel Optimization"],
"authFullName_s":["Anh Thu Phan Ho","Bao An Hoang Mai","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-01056699",
"docType_s":"ART",
"producedDateY_i":2014
},{
"citationRef_s":"<i>IEEE Transactions on Image Processing</i>, 2014, 23 (4), pp.1694-1705. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIP.2014.2305873\">⟨10.1109/TIP.2014.2305873⟩</a>",
"citationFull_s":"Benjamin Mathon, François Cayre, Patrick Bas, Benoît Macq. Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images. <i>IEEE Transactions on Image Processing</i>, 2014, 23 (4), pp.1694-1705. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIP.2014.2305873\">⟨10.1109/TIP.2014.2305873⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00940754v2\">⟨hal-00940754v2⟩</a>",
"title_s":["Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images"],
"authFullName_s":["Benjamin Mathon","François Cayre","Patrick Bas","Benoît Macq"],
"halId_s":"hal-00940754",
"docType_s":"ART",
"producedDateY_i":2014
},{
"citationRef_s":"<i>GRETSI 2013</i>, Sep 2013, Brest, France",
"citationFull_s":"Emmanuel Zidel - Cauffet, Patrick Bas, Pierre Chainais. Quantification adaptative pour la stéganalyse d'images texturées. <i>GRETSI 2013</i>, Sep 2013, Brest, France. <a target=\"_blank\" href=\"https://hal.science/hal-00868550v1\">⟨hal-00868550⟩</a>",
"title_s":["Quantification adaptative pour la stéganalyse d'images texturées"],
"authFullName_s":["Emmanuel Zidel - Cauffet","Patrick Bas","Pierre Chainais"],
"halId_s":"hal-00868550",
"docType_s":"COMM",
"producedDateY_i":2013
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2013, 8 (8), pp.1306 - 1317",
"citationFull_s":"Patrick Bas, Teddy Furon. A New Measure of Watermarking Security: The Effective Key Length. <i>IEEE Transactions on Information Forensics and Security</i>, 2013, 8 (8), pp.1306 - 1317. <a target=\"_blank\" href=\"https://hal.science/hal-00836404v1\">⟨hal-00836404⟩</a>",
"title_s":["A New Measure of Watermarking Security: The Effective Key Length"],
"authFullName_s":["Patrick Bas","Teddy Furon"],
"halId_s":"hal-00836404",
"docType_s":"ART",
"producedDateY_i":2013
},{
"citationRef_s":"<i>ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06",
"citationFull_s":"Anh Thu Phan Ho, Bao An Hoang Mai, Wadih Sawaya, Patrick Bas. Document Authentication Using Graphical Codes: Impacts of the Channel Model. <i>ACM Workshop on Information Hiding and Multimedia Security</i>, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06. <a target=\"_blank\" href=\"https://hal.science/hal-00836409v1\">⟨hal-00836409⟩</a>",
"title_s":["Document Authentication Using Graphical Codes: Impacts of the Channel Model"],
"authFullName_s":["Anh Thu Phan Ho","Bao An Hoang Mai","Wadih Sawaya","Patrick Bas"],
"halId_s":"hal-00836409",
"docType_s":"COMM",
"producedDateY_i":2013
},{
"citationRef_s":"<i>ACM IH-MMSEC 2013</i>, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06",
"citationFull_s":"Andrew Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, et al.. Moving Steganography and Steganalysis from the Laboratory into the Real World. <i>ACM IH-MMSEC 2013</i>, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06. <a target=\"_blank\" href=\"https://hal.science/hal-00836407v1\">⟨hal-00836407⟩</a>",
"title_s":["Moving Steganography and Steganalysis from the Laboratory into the Real World"],
"authFullName_s":["Andrew Ker","Patrick Bas","Rainer Böhme","Rémi Cogranne","Scott Craver","Tomáš Filler","Jessica Fridrich","Tomas Pevny"],
"halId_s":"hal-00836407",
"docType_s":"COMM",
"producedDateY_i":2013
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2013, 8 (6), pp.1038 - 1050. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2013.2260158\">⟨10.1109/TIFS.2013.2260158⟩</a>",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Impacts of Watermarking Security on Tardos-based Fingerprinting. <i>IEEE Transactions on Information Forensics and Security</i>, 2013, 8 (6), pp.1038 - 1050. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2013.2260158\">⟨10.1109/TIFS.2013.2260158⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00813362v1\">⟨hal-00813362⟩</a>",
"title_s":["Impacts of Watermarking Security on Tardos-based Fingerprinting"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00813362",
"docType_s":"ART",
"producedDateY_i":2013
},{
"citationRef_s":"<i>13th International Conference on Communications and Multimedia Security (CMS)</i>, Sep 2012, Canterbury, United Kingdom. pp.191-191, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-32805-3_15\">⟨10.1007/978-3-642-32805-3_15⟩</a>",
"citationFull_s":"Patrick Bas, Teddy Furon. Are 128 Bits Long Keys Possible in Watermarking?. <i>13th International Conference on Communications and Multimedia Security (CMS)</i>, Sep 2012, Canterbury, United Kingdom. pp.191-191, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-32805-3_15\">⟨10.1007/978-3-642-32805-3_15⟩</a>. <a target=\"_blank\" href=\"https://inria.hal.science/hal-01540890v1\">⟨hal-01540890⟩</a>",
"title_s":["Are 128 Bits Long Keys Possible in Watermarking?"],
"authFullName_s":["Patrick Bas","Teddy Furon"],
"halId_s":"hal-01540890",
"docType_s":"COMM",
"producedDateY_i":2012
},{
"citationRef_s":"<i>13th International Conference on Communications and Multimedia Security (CMS)</i>, Sep 2012, Canterbury, United Kingdom. pp.39-54, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-32805-3_4\">⟨10.1007/978-3-642-32805-3_4⟩</a>",
"citationFull_s":"Lamine Diong, Patrick Bas, Chloé Pelle, Wadih Sawaya. Document authentication using 2D codes: Maximizing the decoding performance using statistical inference. <i>13th International Conference on Communications and Multimedia Security (CMS)</i>, Sep 2012, Canterbury, United Kingdom. pp.39-54, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-32805-3_4\">⟨10.1007/978-3-642-32805-3_4⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00728161v1\">⟨hal-00728161⟩</a>",
"title_s":["Document authentication using 2D codes: Maximizing the decoding performance using statistical inference"],
"authFullName_s":["Lamine Diong","Patrick Bas","Chloé Pelle","Wadih Sawaya"],
"halId_s":"hal-00728161",
"docType_s":"COMM",
"producedDateY_i":2012
},{
"citationRef_s":"<i>EUSIPCO - 20th European Signal Processing Conference</i>, Aug 2012, Romania. pp.TBA",
"citationFull_s":"Patrick Bas, Teddy Furon. Key Length Estimation of Zero-Bit Watermarking Schemes. <i>EUSIPCO - 20th European Signal Processing Conference</i>, Aug 2012, Romania. pp.TBA. <a target=\"_blank\" href=\"https://hal.science/hal-00728159v1\">⟨hal-00728159⟩</a>",
"title_s":["Key Length Estimation of Zero-Bit Watermarking Schemes"],
"authFullName_s":["Patrick Bas","Teddy Furon"],
"halId_s":"hal-00728159",
"docType_s":"COMM",
"producedDateY_i":2012
},{
"citationRef_s":"<i>IH - Information Hiding</i>, May 2012, Berkeley, United States. pp.TBA",
"citationFull_s":"Teddy Furon, Patrick Bas. A New Measure of Watermarking Security Applied on DC-DM QIM. <i>IH - Information Hiding</i>, May 2012, Berkeley, United States. pp.TBA. <a target=\"_blank\" href=\"https://hal.science/hal-00702689v2\">⟨hal-00702689v2⟩</a>",
"title_s":["A New Measure of Watermarking Security Applied on DC-DM QIM"],
"authFullName_s":["Teddy Furon","Patrick Bas"],
"halId_s":"hal-00702689",
"docType_s":"COMM",
"producedDateY_i":2012
},{
"citationRef_s":"<i>ICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing</i>, Mar 2012, Kyoto, Japan",
"citationFull_s":"Patrick Bas, Teddy Furon, François Cayre. Practical Key Length of Watermarking Systems. <i>ICASSP 2012 - IEEE International Conference on Acoustics, Speech and Signal Processing</i>, Mar 2012, Kyoto, Japan. <a target=\"_blank\" href=\"https://inria.hal.science/hal-00686813v1\">⟨hal-00686813⟩</a>",
"title_s":["Practical Key Length of Watermarking Systems"],
"authFullName_s":["Patrick Bas","Teddy Furon","François Cayre"],
"halId_s":"hal-00686813",
"docType_s":"COMM",
"producedDateY_i":2012
},{
"citationRef_s":"<i>GRETSI 2011 - XXIIIème Colloque francophone de traitement du signal et des images</i>, Sep 2011, Bordeaux, France. pp.ID232",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Théorie du transport appliquée au tatouage sûr d'images naturelles. <i>GRETSI 2011 - XXIIIème Colloque francophone de traitement du signal et des images</i>, Sep 2011, Bordeaux, France. pp.ID232. <a target=\"_blank\" href=\"https://hal.science/hal-00609187v1\">⟨hal-00609187⟩</a>",
"title_s":["Théorie du transport appliquée au tatouage sûr d'images naturelles"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00609187",
"docType_s":"COMM",
"producedDateY_i":2011
},{
"citationRef_s":"<i>Neurocomputing</i>, 2011, 74 (16), pp.2413-2421. <a target=\"_blank\" href=\"https://dx.doi.org/10.1016/j.neucom.2010.12.042\">⟨10.1016/j.neucom.2010.12.042⟩</a>",
"citationFull_s":"Yoan Miche, Mark van Heeswijk, Patrick Bas, Amaury Lendasse, Olli Simula. TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization. <i>Neurocomputing</i>, 2011, 74 (16), pp.2413-2421. <a target=\"_blank\" href=\"https://dx.doi.org/10.1016/j.neucom.2010.12.042\">⟨10.1016/j.neucom.2010.12.042⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00648069v1\">⟨hal-00648069⟩</a>",
"title_s":["TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization"],
"authFullName_s":["Yoan Miche","Mark van Heeswijk","Patrick Bas","Amaury Lendasse","Olli Simula"],
"halId_s":"hal-00648069",
"docType_s":"ART",
"producedDateY_i":2011
},{
"citationRef_s":"<i>INFORMATION HIDING</i>, May 2011, Czech Republic. pp.208-222, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-24178-9_15\">⟨10.1007/978-3-642-24178-9_15⟩</a>",
"citationFull_s":"Patrick Bas. Soft-SCS: improving the security and robustness of the Scalar-Costa-Scheme by optimal distribution matching. <i>INFORMATION HIDING</i>, May 2011, Czech Republic. pp.208-222, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-24178-9_15\">⟨10.1007/978-3-642-24178-9_15⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00648055v1\">⟨hal-00648055⟩</a>",
"title_s":["Soft-SCS: improving the security and robustness of the Scalar-Costa-Scheme by optimal distribution matching"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-00648055",
"docType_s":"COMM",
"producedDateY_i":2011
},{
"citationRef_s":"<i>Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on</i>, May 2011, Czech Republic. pp.1848 - 1851, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/ICASSP.2011.5946865\">⟨10.1109/ICASSP.2011.5946865⟩</a>",
"citationFull_s":"Patrick Bas. Informed secure watermarking using optimal transport. <i>Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on</i>, May 2011, Czech Republic. pp.1848 - 1851, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/ICASSP.2011.5946865\">⟨10.1109/ICASSP.2011.5946865⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00648064v1\">⟨hal-00648064⟩</a>",
"title_s":["Informed secure watermarking using optimal transport"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-00648064",
"docType_s":"COMM",
"producedDateY_i":2011
},{
"citationRef_s":"<i>INFORMATION HIDING</i>, May 2011, Czech Republic. pp.59-70, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-24178-9_15\">⟨10.1007/978-3-642-24178-9_15⟩</a>",
"citationFull_s":"Patrick Bas, Tomas Filler, Tomas Pevny. \"Break Our Steganographic System\": The Ins and Outs of Organizing BOSS. <i>INFORMATION HIDING</i>, May 2011, Czech Republic. pp.59-70, <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/978-3-642-24178-9_15\">⟨10.1007/978-3-642-24178-9_15⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00648057v1\">⟨hal-00648057⟩</a>",
"title_s":["Break Our Steganographic System\": The Ins and Outs of Organizing BOSS"],
"authFullName_s":["Patrick Bas","Tomas Filler","Tomas Pevny"],
"halId_s":"hal-00648057",
"docType_s":"COMM",
"producedDateY_i":2011
},{
"citationRef_s":"<i>WIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10)</i>, Dec 2010, Seattle, United States. pp.2010",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting. <i>WIFS 2010 - IEEE international Workshop on Information Forensics and Security (WIFS'10)</i>, Dec 2010, Seattle, United States. pp.2010. <a target=\"_blank\" href=\"https://hal.science/hal-00541383v1\">⟨hal-00541383⟩</a>",
"title_s":["Security and Robustness Constraints for Spread-Spectrum Tardos Fingerprinting"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00541383",
"docType_s":"COMM",
"producedDateY_i":2010
},{
"citationRef_s":"<i>MMSP 2010 - IEEE International Workshop on Multimedia Signal Processing</i>, Oct 2010, Saint-Malo, France. pp.46-51, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/MMSP.2010.5661992\">⟨10.1109/MMSP.2010.5661992⟩</a>",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Considering Security and Robustness Constraints for Watermark-based Tardos Fingerprinting. <i>MMSP 2010 - IEEE International Workshop on Multimedia Signal Processing</i>, Oct 2010, Saint-Malo, France. pp.46-51, <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/MMSP.2010.5661992\">⟨10.1109/MMSP.2010.5661992⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00537139v2\">⟨hal-00537139v2⟩</a>",
"title_s":["Considering Security and Robustness Constraints for Watermark-based Tardos Fingerprinting"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00537139",
"docType_s":"COMM",
"producedDateY_i":2010
},{
"citationRef_s":"<i>Information Hiding</i>, Jun 2010, Calgary, Canada. pp.2010",
"citationFull_s":"Tomas Pevny, Tomas Filler, Patrick Bas. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. <i>Information Hiding</i>, Jun 2010, Calgary, Canada. pp.2010. <a target=\"_blank\" href=\"https://hal.science/hal-00541353v1\">⟨hal-00541353⟩</a>",
"title_s":["Using High-Dimensional Image Models to Perform Highly Undetectable Steganography"],
"authFullName_s":["Tomas Pevny","Tomas Filler","Patrick Bas"],
"halId_s":"hal-00541353",
"docType_s":"COMM",
"producedDateY_i":2010
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2010, 5 (2), pp.215--224",
"citationFull_s":"Tomas Pevny, Patrick Bas, Jessica Fridrich. Steganalysis by Subtractive Pixel Adjacency Matrix. <i>IEEE Transactions on Information Forensics and Security</i>, 2010, 5 (2), pp.215--224. <a target=\"_blank\" href=\"https://hal.science/hal-00541410v1\">⟨hal-00541410⟩</a>",
"title_s":["Steganalysis by Subtractive Pixel Adjacency Matrix"],
"authFullName_s":["Tomas Pevny","Patrick Bas","Jessica Fridrich"],
"halId_s":"hal-00541410",
"docType_s":"ART",
"producedDateY_i":2010
},{
"citationRef_s":"<i>IEEE Transactions on Neural Networks</i>, 2009, 21 (1), pp.158-162. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TNN.2009.2036259\">⟨10.1109/TNN.2009.2036259⟩</a>",
"citationFull_s":"Yoan Miche, Patrick Bas, Christian Jutten, Amaury Lendasse, Olli Simula, et al.. OP-ELM: Optimally-Pruned Extreme Learning Machine. <i>IEEE Transactions on Neural Networks</i>, 2009, 21 (1), pp.158-162. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TNN.2009.2036259\">⟨10.1109/TNN.2009.2036259⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00541415v1\">⟨hal-00541415⟩</a>",
"title_s":["OP-ELM: Optimally-Pruned Extreme Learning Machine"],
"authFullName_s":["Yoan Miche","Patrick Bas","Christian Jutten","Amaury Lendasse","Olli Simula","Antti Sorjamaa"],
"halId_s":"hal-00541415",
"docType_s":"ART",
"producedDateY_i":2009
},{
"citationRef_s":"<i>Annals of Telecommunications - annales des télécommunications</i>, 2009, 64 (11-12), pp.801-813. <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/s12243-009-0119-9\">⟨10.1007/s12243-009-0119-9⟩</a>",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Comparison of secure spread-spectrum modulations applied to still image watermarking. <i>Annals of Telecommunications - annales des télécommunications</i>, 2009, 64 (11-12), pp.801-813. <a target=\"_blank\" href=\"https://dx.doi.org/10.1007/s12243-009-0119-9\">⟨10.1007/s12243-009-0119-9⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00437864v1\">⟨hal-00437864⟩</a>",
"title_s":["Comparison of secure spread-spectrum modulations applied to still image watermarking"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00437864",
"docType_s":"ART",
"producedDateY_i":2009
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.75-84",
"citationFull_s":"Tomas Pevny, Patrick Bas, Jessica Fridrich. Steganalysis by Subtractive Pixel Adjacency Matrix. <i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.75-84. <a target=\"_blank\" href=\"https://hal.science/hal-00437905v1\">⟨hal-00437905⟩</a>",
"title_s":["Steganalysis by Subtractive Pixel Adjacency Matrix"],
"authFullName_s":["Tomas Pevny","Patrick Bas","Jessica Fridrich"],
"halId_s":"hal-00437905",
"docType_s":"COMM",
"producedDateY_i":2009
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.1-8",
"citationFull_s":"Patrick Bas, Andreas Westfeld. Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme. <i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.1-8. <a target=\"_blank\" href=\"https://hal.science/hal-00384058v1\">⟨hal-00384058⟩</a>",
"title_s":["Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme"],
"authFullName_s":["Patrick Bas","Andreas Westfeld"],
"halId_s":"hal-00384058",
"docType_s":"COMM",
"producedDateY_i":2009
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.1-8",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Optimization of Natural Watermarking Using Transportation Theory. <i>ACM Multimedia and Security Workshop 2009</i>, Sep 2009, Princeton NJ, United States. pp.1-8. <a target=\"_blank\" href=\"https://hal.science/hal-00437902v1\">⟨hal-00437902⟩</a>",
"title_s":["Optimization of Natural Watermarking Using Transportation Theory"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Benoît Macq"],
"halId_s":"hal-00437902",
"docType_s":"COMM",
"producedDateY_i":2009
},{
"citationRef_s":"<i>Traitement du Signal</i>, 2009, 26 (1), pp.13-30",
"citationFull_s":"Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten, Olli Simula. Une methodologie pour la selection de variables pour la steganalyse. <i>Traitement du Signal</i>, 2009, 26 (1), pp.13-30. <a target=\"_blank\" href=\"https://hal.science/hal-00437891v1\">⟨hal-00437891⟩</a>",
"title_s":["Une methodologie pour la selection de variables pour la steganalyse"],
"authFullName_s":["Yoan Miche","Patrick Bas","Amaury Lendasse","Christian Jutten","Olli Simula"],
"halId_s":"hal-00437891",
"docType_s":"ART",
"producedDateY_i":2009
},{
"citationRef_s":"<i>EURASIP Journal on Information Security</i>, 2009, 2009, pp.ID 901381. <a target=\"_blank\" href=\"https://dx.doi.org/10.1155/2009/901381\">⟨10.1155/2009/901381⟩</a>",
"citationFull_s":"Yoan Miche, Patrick Bas, Christian Jutten, Amaury Lendasse, Olli Simula. Reliable Steganalysis Using a Minimum Set of Samples and Features. <i>EURASIP Journal on Information Security</i>, 2009, 2009, pp.ID 901381. <a target=\"_blank\" href=\"https://dx.doi.org/10.1155/2009/901381\">⟨10.1155/2009/901381⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00437868v1\">⟨hal-00437868⟩</a>",
"title_s":["Reliable Steganalysis Using a Minimum Set of Samples and Features"],
"authFullName_s":["Yoan Miche","Patrick Bas","Christian Jutten","Amaury Lendasse","Olli Simula"],
"halId_s":"hal-00437868",
"docType_s":"ART",
"producedDateY_i":2009
},{
"citationRef_s":"<i>Media Forensics and Security</i>, Jan 2009, San Jose, United States. pp.id 807487, <a target=\"_blank\" href=\"https://dx.doi.org/10.1117/12.807487\">⟨10.1117/12.807487⟩</a>",
"citationFull_s":"Oleksiy Koval, Sviatoslav Voloshynovskiy, Patrick Bas, François Cayre. On security threats for robust perceptual hashing. <i>Media Forensics and Security</i>, Jan 2009, San Jose, United States. pp.id 807487, <a target=\"_blank\" href=\"https://dx.doi.org/10.1117/12.807487\">⟨10.1117/12.807487⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00371146v1\">⟨hal-00371146⟩</a>",
"title_s":["On security threats for robust perceptual hashing"],
"authFullName_s":["Oleksiy Koval","Sviatoslav Voloshynovskiy","Patrick Bas","François Cayre"],
"halId_s":"hal-00371146",
"docType_s":"COMM",
"producedDateY_i":2009
},{
"citationRef_s":"2009, http://www.irccyn.ec-nantes.fr/~autrusse/Databases/BrokenArrows/",
"citationFull_s":"Florent Autrusseau, Patrick Bas. Subjective Quality assessment of the Broken Arrows watermarking technique. 2009, http://www.irccyn.ec-nantes.fr/~autrusse/Databases/BrokenArrows/. <a target=\"_blank\" href=\"https://hal.science/hal-00580748v1\">⟨hal-00580748⟩</a>",
"title_s":["Subjective Quality assessment of the Broken Arrows watermarking technique"],
"authFullName_s":["Florent Autrusseau","Patrick Bas"],
"halId_s":"hal-00580748",
"docType_s":"OTHER",
"producedDateY_i":2009
},{
"citationRef_s":"<i>EURASIP Journal on Information Security</i>, 2008, 2008, pp.ID 597040. <a target=\"_blank\" href=\"https://dx.doi.org/10.1155/2008/597040\">⟨10.1155/2008/597040⟩</a>",
"citationFull_s":"Teddy Furon, Patrick Bas. Broken Arrows. <i>EURASIP Journal on Information Security</i>, 2008, 2008, pp.ID 597040. <a target=\"_blank\" href=\"https://dx.doi.org/10.1155/2008/597040\">⟨10.1155/2008/597040⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00335311v1\">⟨hal-00335311⟩</a>",
"title_s":["Broken Arrows"],
"authFullName_s":["Teddy Furon","Patrick Bas"],
"halId_s":"hal-00335311",
"docType_s":"ART",
"producedDateY_i":2008
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2008</i>, Sep 2008, -, United Kingdom. pp.227--232",
"citationFull_s":"Patrick Bas, Gwenaël Doërr. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes. <i>ACM Multimedia and Security Workshop 2008</i>, Sep 2008, -, United Kingdom. pp.227--232. <a target=\"_blank\" href=\"https://hal.science/hal-00325086v1\">⟨hal-00325086⟩</a>",
"title_s":["Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes"],
"authFullName_s":["Patrick Bas","Gwenaël Doërr"],
"halId_s":"hal-00325086",
"docType_s":"COMM",
"producedDateY_i":2008
},{
"citationRef_s":"<i>IH 2008 - Information Hiding: 10th International Workshop</i>, Jun 2008, Santa-Barbara, United States",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre, Fernando Pérez Gonzalez. Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding. <i>IH 2008 - Information Hiding: 10th International Workshop</i>, Jun 2008, Santa-Barbara, United States. <a target=\"_blank\" href=\"https://hal.science/hal-00325080v1\">⟨hal-00325080⟩</a>",
"title_s":["Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre","Fernando Pérez Gonzalez"],
"halId_s":"hal-00325080",
"docType_s":"COMM",
"producedDateY_i":2008
},{
"citationRef_s":"<i>IEEE Transactions on Information Forensics and Security</i>, 2008, 3 (1), pp.1-15. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2007.916006\">⟨10.1109/TIFS.2007.916006⟩</a>",
"citationFull_s":"François Cayre, Patrick Bas. Kerckhoffs-based embedding security classes for WOA data-hiding. <i>IEEE Transactions on Information Forensics and Security</i>, 2008, 3 (1), pp.1-15. <a target=\"_blank\" href=\"https://dx.doi.org/10.1109/TIFS.2007.916006\">⟨10.1109/TIFS.2007.916006⟩</a>. <a target=\"_blank\" href=\"https://hal.science/hal-00325091v1\">⟨hal-00325091⟩</a>",
"title_s":["Kerckhoffs-based embedding security classes for WOA data-hiding"],
"authFullName_s":["François Cayre","Patrick Bas"],
"halId_s":"hal-00325091",
"docType_s":"ART",
"producedDateY_i":2008
},{
"citationRef_s":"<i>CORESA 2007 - 12èmes Journées d´Etudes et d´Echanges COmpression et REprésentation des Signaux Audiovisuels</i>, Nov 2007, Montpellier, France. pp.electronic version",
"citationFull_s":"Benjamin Mathon, François Cayre, Patrick Bas. Techniques sûres de tatouage pour l'image. <i>CORESA 2007 - 12èmes Journées d´Etudes et d´Echanges COmpression et REprésentation des Signaux Audiovisuels</i>, Nov 2007, Montpellier, France. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166725v1\">⟨hal-00166725⟩</a>",
"title_s":["Techniques sûres de tatouage pour l'image"],
"authFullName_s":["Benjamin Mathon","François Cayre","Patrick Bas"],
"halId_s":"hal-00166725",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2007</i>, Sep 2007, Dallas, United States. pp.electronic version",
"citationFull_s":"Benjamin Mathon, Patrick Bas, François Cayre. Practical Performance Analysis of Secure Modulations for WOA Spread-Spectrum based Image Watermarking. <i>ACM Multimedia and Security Workshop 2007</i>, Sep 2007, Dallas, United States. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166726v1\">⟨hal-00166726⟩</a>",
"title_s":["Practical Performance Analysis of Secure Modulations for WOA Spread-Spectrum based Image Watermarking"],
"authFullName_s":["Benjamin Mathon","Patrick Bas","François Cayre"],
"halId_s":"hal-00166726",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"<i>GRETSI 2007 - XXIème Colloque francophone de traitement du signal et des images</i>, Sep 2007, Troyes, France. pp.electronic version",
"citationFull_s":"Yoan Miche, Patrick Bas, Amaury Lendasse, Olli Simula, Christian Jutten. Avantages de la Sélection de Caractéristiques pour la Stéganalyse. <i>GRETSI 2007 - XXIème Colloque francophone de traitement du signal et des images</i>, Sep 2007, Troyes, France. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166692v1\">⟨hal-00166692⟩</a>",
"title_s":["Avantages de la Sélection de Caractéristiques pour la Stéganalyse"],
"authFullName_s":["Yoan Miche","Patrick Bas","Amaury Lendasse","Olli Simula","Christian Jutten"],
"halId_s":"hal-00166692",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"<i>IWANN 2007 - 9th International Work-Conference on Artificial Neural Networks</i>, Jun 2007, San Sebastian, Spain. pp.electronic version",
"citationFull_s":"Yoan Miche, Patrick Bas, Christian Jutten, Amaury Lendasse, Olli Simula. Advantages of Using Feature Selection Techniques on Steganalysis Schemes. <i>IWANN 2007 - 9th International Work-Conference on Artificial Neural Networks</i>, Jun 2007, San Sebastian, Spain. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166695v1\">⟨hal-00166695⟩</a>",
"title_s":["Advantages of Using Feature Selection Techniques on Steganalysis Schemes"],
"authFullName_s":["Yoan Miche","Patrick Bas","Christian Jutten","Amaury Lendasse","Olli Simula"],
"halId_s":"hal-00166695",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"<i>WaCHa 2007 - Third Wavila Challenge</i>, Jun 2007, Saint-Malo, France. pp.electronic version",
"citationFull_s":"Yoan Miche, Patrick Bas, Christian Jutten, Amaury Lendasse, Olli Simula. Extracting relevant features of steganographic schemes by feature selection techniques. <i>WaCHa 2007 - Third Wavila Challenge</i>, Jun 2007, Saint-Malo, France. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166700v1\">⟨hal-00166700⟩</a>",
"title_s":["Extracting relevant features of steganographic schemes by feature selection techniques"],
"authFullName_s":["Yoan Miche","Patrick Bas","Christian Jutten","Amaury Lendasse","Olli Simula"],
"halId_s":"hal-00166700",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"<i>IH 2007 - Information Hiding: 9th International Workshop</i>, Jun 2007, Saint-Malo, France. pp.396",
"citationFull_s":"Patrick Bas, Gwenaël Doërr. Practical Security Analysis of Dirty Paper Trellis Watermarking. <i>IH 2007 - Information Hiding: 9th International Workshop</i>, Jun 2007, Saint-Malo, France. pp.396. <a target=\"_blank\" href=\"https://hal.science/hal-00166690v1\">⟨hal-00166690⟩</a>",
"title_s":["Practical Security Analysis of Dirty Paper Trellis Watermarking"],
"authFullName_s":["Patrick Bas","Gwenaël Doërr"],
"halId_s":"hal-00166690",
"docType_s":"COMM",
"producedDateY_i":2007
},{
"citationRef_s":"Teddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. Springer Verlag, 4567, pp.1--391, 2007",
"citationFull_s":"Teddy Furon, Gwenaël Doërr, Patrick Bas, François Cayre (Dir.). Proceedings of the 9th Information Hiding Workshop. Teddy Furon and Gwenaël Doërr and Patrick Bas and François Cayre. Springer Verlag, 4567, pp.1--391, 2007. <a target=\"_blank\" href=\"https://inria.hal.science/inria-00504303v1\">⟨inria-00504303⟩</a>",
"title_s":["Proceedings of the 9th Information Hiding Workshop"],
"authFullName_s":["Teddy Furon","Gwenaël Doërr","Patrick Bas","François Cayre"],
"halId_s":"inria-00504303",
"docType_s":"OUV",
"producedDateY_i":2007
},{
"citationRef_s":"2007, pp.8",
"citationFull_s":"Patrick Bas, François Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. 2007, pp.8. <a target=\"_blank\" href=\"https://hal.science/hal-00157965v1\">⟨hal-00157965⟩</a>",
"title_s":["Natural Watermarking: a secure spread spectrum technique for WOA"],
"authFullName_s":["Patrick Bas","François Cayre"],
"halId_s":"hal-00157965",
"docType_s":"OTHER",
"producedDateY_i":2007
},{
"citationRef_s":"<i>Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006</i>, Sep 2006, Istambul, Turkey. pp.49-56",
"citationFull_s":"Yoan Miche, Benoit Roue, Amaury Lendasse, Patrick Bas. A Feature Selection Methodology for Steganalysis. <i>Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006</i>, Sep 2006, Istambul, Turkey. pp.49-56. <a target=\"_blank\" href=\"https://hal.science/hal-00166578v1\">⟨hal-00166578⟩</a>",
"title_s":["A Feature Selection Methodology for Steganalysis"],
"authFullName_s":["Yoan Miche","Benoit Roue","Amaury Lendasse","Patrick Bas"],
"halId_s":"hal-00166578",
"docType_s":"COMM",
"producedDateY_i":2006
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop</i>, Sep 2006, Geneva, Switzerland. pp.digital version",
"citationFull_s":"Patrick Bas, François Cayre. Achieving subspace or key security for WOA using Natural or Circular Watermarking. <i>ACM Multimedia and Security Workshop</i>, Sep 2006, Geneva, Switzerland. pp.digital version. <a target=\"_blank\" href=\"https://hal.science/hal-00166575v1\">⟨hal-00166575⟩</a>",
"title_s":["Achieving subspace or key security for WOA using Natural or Circular Watermarking"],
"authFullName_s":["Patrick Bas","François Cayre"],
"halId_s":"hal-00166575",
"docType_s":"COMM",
"producedDateY_i":2006
},{
"citationRef_s":"<i>Information Hiding 2006</i>, Jul 2006, Alexandria, United States. pp.digital version",
"citationFull_s":"Patrick Bas, François Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. <i>Information Hiding 2006</i>, Jul 2006, Alexandria, United States. pp.digital version. <a target=\"_blank\" href=\"https://hal.science/hal-00166574v1\">⟨hal-00166574⟩</a>",
"title_s":["Natural Watermarking: a secure spread spectrum technique for WOA"],
"authFullName_s":["Patrick Bas","François Cayre"],
"halId_s":"hal-00166574",
"docType_s":"COMM",
"producedDateY_i":2006
},{
"citationRef_s":"<i>Information Hiding Workshop (IH06)</i>, Jul 2006, Alexandria, United States. pp.digital version",
"citationFull_s":"Patrick Bas, François Cayre. Natural Watermarking: a secure spread spectrum technique for WOA. <i>Information Hiding Workshop (IH06)</i>, Jul 2006, Alexandria, United States. pp.digital version. <a target=\"_blank\" href=\"https://hal.science/hal-00166572v1\">⟨hal-00166572⟩</a>",
"title_s":["Natural Watermarking: a secure spread spectrum technique for WOA"],
"authFullName_s":["Patrick Bas","François Cayre"],
"halId_s":"hal-00166572",
"docType_s":"COMM",
"producedDateY_i":2006
},{
"citationRef_s":"<i>Handicap</i>, Jun 2006, Paris, France. pp.265-270",
"citationFull_s":"Gérard Bailly, Cléo Baras, Patrick Bas, Séverine Baudry, Denis Beautemps, et al.. ARTUS : calcul et tatouage audiovisuel des mouvements d'un personnage animé virtuel pour l'accessibilité d'émissions télévisuelles aux téléspectateurs sourds comprenant la Langue Française Parlée Complétée. <i>Handicap</i>, Jun 2006, Paris, France. pp.265-270. <a target=\"_blank\" href=\"https://hal.science/hal-00366492v1\">⟨hal-00366492⟩</a>",
"title_s":["ARTUS : calcul et tatouage audiovisuel des mouvements d'un personnage animé virtuel pour l'accessibilité d'émissions télévisuelles aux téléspectateurs sourds comprenant la Langue Française Parlée Complétée"],
"authFullName_s":["Gérard Bailly","Cléo Baras","Patrick Bas","Séverine Baudry","Denis Beautemps","Rémi Brun","Jean-Marc Chassery","Frank Davoine","Frédéric Elisei","Guillaume Gibert","Laurent Girin","Denis Grison","Jean-Pierre Léoni","Joël Liénard","Nicolas Moreau","Philippe Nguyen"],
"halId_s":"hal-00366492",
"docType_s":"COMM",
"producedDateY_i":2006
},{
"citationRef_s":"<i>IEE Proceedings - Information Security</i>, 2006, 153 (3), pp.127-13",
"citationFull_s":"Patrick Bas, Jarmo Hurri. Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent components. <i>IEE Proceedings - Information Security</i>, 2006, 153 (3), pp.127-13. <a target=\"_blank\" href=\"https://hal.science/hal-00166596v1\">⟨hal-00166596⟩</a>",
"title_s":["Vulnerability of DM watermarking of non-iid host signals to attacks utilising the statistics of independent components"],
"authFullName_s":["Patrick Bas","Jarmo Hurri"],
"halId_s":"hal-00166596",
"docType_s":"ART",
"producedDateY_i":2006
},{
"citationRef_s":"<i>Proceeding of the 8th workshop on Multimedia and security</i>, 2006, pp.80-88",
"citationFull_s":"Patrick Bas, François Cayre. Achieving subspace or key security for WOA using natural or circular watermarking. <i>Proceeding of the 8th workshop on Multimedia and security</i>, 2006, pp.80-88. <a target=\"_blank\" href=\"https://hal.science/hal-00157995v1\">⟨hal-00157995⟩</a>",
"title_s":["Achieving subspace or key security for WOA using natural or circular watermarking"],
"authFullName_s":["Patrick Bas","François Cayre"],
"halId_s":"hal-00157995",
"docType_s":"OTHER",
"producedDateY_i":2006
},{
"citationRef_s":"<i>Modelling, measurement and control C</i>, 2006, 67SH (2, supplement : handicap), pp.177-187",
"citationFull_s":"Gérard Bailly, Virginie Attina, Cléo Baras, Patrick Bas, Séverine Baudry, et al.. ARTUS: synthesis and audiovisual watermarking of the movements of a virtual agent interpreting subtitling using cued speech for deaf televiewers. <i>Modelling, measurement and control C</i>, 2006, 67SH (2, supplement : handicap), pp.177-187. <a target=\"_blank\" href=\"https://hal.science/hal-00157826v1\">⟨hal-00157826⟩</a>",
"title_s":["ARTUS: synthesis and audiovisual watermarking of the movements of a virtual agent interpreting subtitling using cued speech for deaf televiewers"],
"authFullName_s":["Gérard Bailly","Virginie Attina","Cléo Baras","Patrick Bas","Séverine Baudry","Denis Beautemps","Rémi Brun","Jean-Marc Chassery","Frank Davoine","Frédéric Elisei","Guillaume Gibert","Laurent Girin","Denis Grison","Jean-Pierre Léoni","Joël Liénard","Nicolas Moreau","Philippe Nguyen"],
"halId_s":"hal-00157826",
"docType_s":"ART",
"producedDateY_i":2006
},{
"citationRef_s":"<i>IWDW 2005</i>, Sep 2005, Siena, Italy. pp.186-200 ISBN 3-540-28768-X",
"citationFull_s":"Patrick Bas, Jarmo Hurri. Security of DM quantization watermarking scheme: a practical study for digital images. <i>IWDW 2005</i>, Sep 2005, Siena, Italy. pp.186-200 ISBN 3-540-28768-X. <a target=\"_blank\" href=\"https://hal.science/hal-00166571v1\">⟨hal-00166571⟩</a>",
"title_s":["Security of DM quantization watermarking scheme: a practical study for digital images"],
"authFullName_s":["Patrick Bas","Jarmo Hurri"],
"halId_s":"hal-00166571",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>Information Hiding</i>, Jul 2005, Barcelona, Spain. pp.106-117",
"citationFull_s":"Patrick Bas. A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers. <i>Information Hiding</i>, Jul 2005, Barcelona, Spain. pp.106-117. <a target=\"_blank\" href=\"https://hal.science/hal-00166559v1\">⟨hal-00166559⟩</a>",
"title_s":["A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-00166559",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>Information Hiding Workshop</i>, 2005, Barcelonna, Spain",
"citationFull_s":"Patrick Bas. A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers. <i>Information Hiding Workshop</i>, 2005, Barcelonna, Spain. <a target=\"_blank\" href=\"https://hal.science/hal-00079344v1\">⟨hal-00079344⟩</a>",
"title_s":["A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers"],
"authFullName_s":["Patrick Bas"],
"halId_s":"hal-00079344",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>International Workshop of Digital Watermarking</i>, 2005, France",
"citationFull_s":"Patrick Bas, J. Hurri. Security of DM quantization watermarking scheme: a practical study for digital images. <i>International Workshop of Digital Watermarking</i>, 2005, France. <a target=\"_blank\" href=\"https://hal.science/hal-00080110v1\">⟨hal-00080110⟩</a>",
"title_s":["Security of DM quantization watermarking scheme: a practical study for digital images"],
"authFullName_s":["Patrick Bas","J. Hurri"],
"halId_s":"hal-00080110",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>First Wavilla Challenge</i>, 2005, Barcelonna, Spain",
"citationFull_s":"Patrick Bas, Alejandro Loboguerrero. several consideration on the security of a feature-based synchronisation scheme for digital image watermarking. <i>First Wavilla Challenge</i>, 2005, Barcelonna, Spain. <a target=\"_blank\" href=\"https://hal.science/hal-00079345v1\">⟨hal-00079345⟩</a>",
"title_s":["several consideration on the security of a feature-based synchronisation scheme for digital image watermarking"],
"authFullName_s":["Patrick Bas","Alejandro Loboguerrero"],
"halId_s":"hal-00079345",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>Wavila Challenge, 1st edition</i>, 2005, Barcelona, Spain. pp.electronic version",
"citationFull_s":"Patrick Bas, Alejandro Loboguerrero. First wavila challenge: several considerations on the security of a feature-based synchronisation scheme for digital image watermarking. <i>Wavila Challenge, 1st edition</i>, 2005, Barcelona, Spain. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166569v1\">⟨hal-00166569⟩</a>",
"title_s":["First wavila challenge: several considerations on the security of a feature-based synchronisation scheme for digital image watermarking"],
"authFullName_s":["Patrick Bas","Alejandro Loboguerrero"],
"halId_s":"hal-00166569",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>GRETSI (20ème Colloque GRETSI sur le traitement du signal et des images )</i>, 2005, Louvain la neuve, Belgique",
"citationFull_s":"Benoît Roué, Patrick Bas, Jean-Marc Chassery. Influence des Vecteurs Caractéristiques en Stéganalyse par Séparateurs à Vastes Marges. <i>GRETSI (20ème Colloque GRETSI sur le traitement du signal et des images )</i>, 2005, Louvain la neuve, Belgique. <a target=\"_blank\" href=\"https://hal.science/hal-00080112v1\">⟨hal-00080112⟩</a>",
"title_s":["Influence des Vecteurs Caractéristiques en Stéganalyse par Séparateurs à Vastes Marges"],
"authFullName_s":["Benoît Roué","Patrick Bas","Jean-Marc Chassery"],
"halId_s":"hal-00080112",
"docType_s":"COMM",
"producedDateY_i":2005
},{
"citationRef_s":"<i>Traitement du Signal</i>, 2004, pp.eletronic version",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery. Tatouage couleur adaptatif fondé sur l'utilisation d'espaces perceptifs uniformes. <i>Traitement du Signal</i>, 2004, pp.eletronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166595v1\">⟨hal-00166595⟩</a>",
"title_s":["Tatouage couleur adaptatif fondé sur l'utilisation d'espaces perceptifs uniformes"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery"],
"halId_s":"hal-00166595",
"docType_s":"ART",
"producedDateY_i":2004
},{
"citationRef_s":"<i>ACM Multimedia and Security Workshop 2004</i>, Sep 2004, Magdebourg, Germany. pp.electronic version",
"citationFull_s":"Benoit Roue, Patrick Bas, Jean-Marc Chassery. Improving LSB Steganalysis using marginal and joint probabilistic distributions. <i>ACM Multimedia and Security Workshop 2004</i>, Sep 2004, Magdebourg, Germany. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166577v1\">⟨hal-00166577⟩</a>",
"title_s":["Improving LSB Steganalysis using marginal and joint probabilistic distributions"],
"authFullName_s":["Benoit Roue","Patrick Bas","Jean-Marc Chassery"],
"halId_s":"hal-00166577",
"docType_s":"COMM",
"producedDateY_i":2004
},{
"citationRef_s":"<i>Proc of SPIE Electronic Imaging, Security and Watermarking of Multimedia Content VI</i>, Jan 2004, San-Jose, United States. pp.116-126",
"citationFull_s":"A. Loboguerrero, Patrick Bas, J. Lienard. An Informed Synchronization Scheme for Audio Data Hiding. <i>Proc of SPIE Electronic Imaging, Security and Watermarking of Multimedia Content VI</i>, Jan 2004, San-Jose, United States. pp.116-126. <a target=\"_blank\" href=\"https://hal.science/hal-00166580v1\">⟨hal-00166580⟩</a>",
"title_s":["An Informed Synchronization Scheme for Audio Data Hiding"],
"authFullName_s":["A. Loboguerrero","Patrick Bas","J. Lienard"],
"halId_s":"hal-00166580",
"docType_s":"COMM",
"producedDateY_i":2004
},{
"citationRef_s":"<i>ICASSP</i>, Sep 2003, Hong Khong, Hong Kong SAR China. pp.CD-rom",
"citationFull_s":"Patrick Bas, Nicolas Le Bihan, Jean-Marc Chassery. Color Image Watermarking Using Quaternion Fourier Transform. <i>ICASSP</i>, Sep 2003, Hong Khong, Hong Kong SAR China. pp.CD-rom. <a target=\"_blank\" href=\"https://hal.science/hal-00166554v1\">⟨hal-00166554⟩</a>",
"title_s":["Color Image Watermarking Using Quaternion Fourier Transform"],
"authFullName_s":["Patrick Bas","Nicolas Le Bihan","Jean-Marc Chassery"],
"halId_s":"hal-00166554",
"docType_s":"COMM",
"producedDateY_i":2003
},{
"citationRef_s":"<i>ICASSP</i>, Sep 2003, Hong Khong, Hong Kong SAR China. pp.CD-rom",
"citationFull_s":"Patrick Bas, Nicolas Le Bihan, Jean-Marc Chassery. Color Image Watermarking Using Quaternion Fourier Transform. <i>ICASSP</i>, Sep 2003, Hong Khong, Hong Kong SAR China. pp.CD-rom. <a target=\"_blank\" href=\"https://hal.science/hal-00166555v1\">⟨hal-00166555⟩</a>",
"title_s":["Color Image Watermarking Using Quaternion Fourier Transform"],
"authFullName_s":["Patrick Bas","Nicolas Le Bihan","Jean-Marc Chassery"],
"halId_s":"hal-00166555",
"docType_s":"COMM",
"producedDateY_i":2003
},{
"citationRef_s":"<i>2003 International Conference on Communication Technology ICCT2003</i>, Sep 2003, Bejin, China. pp.electronic version",
"citationFull_s":"A. Loboguerrero, Patrick Bas, J. Lienard. Iterative Informed Audio Data Hiding Scheme Using Optimal Filter. <i>2003 International Conference on Communication Technology ICCT2003</i>, Sep 2003, Bejin, China. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166579v1\">⟨hal-00166579⟩</a>",
"title_s":["Iterative Informed Audio Data Hiding Scheme Using Optimal Filter"],
"authFullName_s":["A. Loboguerrero","Patrick Bas","J. Lienard"],
"halId_s":"hal-00166579",
"docType_s":"COMM",
"producedDateY_i":2003
},{
"citationRef_s":"<i>Pattern Recognition</i>, 2002, Special Issue on Image/Video Communication, pp.545-561",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, Benoit Macq. Image Watermarking: an evolution to content based approaches. <i>Pattern Recognition</i>, 2002, Special Issue on Image/Video Communication, pp.545-561. <a target=\"_blank\" href=\"https://hal.science/hal-00166587v1\">⟨hal-00166587⟩</a>",
"title_s":["Image Watermarking: an evolution to content based approaches"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","Benoit Macq"],
"halId_s":"hal-00166587",
"docType_s":"ART",
"producedDateY_i":2002
},{
"citationRef_s":"<i>IEEE Transactions on Image Processing</i>, 2002, 11 (9), pp.1014-1028",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, Benoit Macq. Geometrically Invariant Watermarking Using Feature Points. <i>IEEE Transactions on Image Processing</i>, 2002, 11 (9), pp.1014-1028. <a target=\"_blank\" href=\"https://hal.science/hal-00166590v1\">⟨hal-00166590⟩</a>",
"title_s":["Geometrically Invariant Watermarking Using Feature Points"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","Benoit Macq"],
"halId_s":"hal-00166590",
"docType_s":"ART",
"producedDateY_i":2002
},{
"citationRef_s":"<i>Traitement du Signal</i>, 2002, 19 (1), pp.11,18",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, Benoît Macq. Méthode de tatouage fondée sur le contenu. <i>Traitement du Signal</i>, 2002, 19 (1), pp.11,18. <a target=\"_blank\" href=\"https://hal.science/hal-00166593v1\">⟨hal-00166593⟩</a>",
"title_s":["Méthode de tatouage fondée sur le contenu"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","Benoît Macq"],
"halId_s":"hal-00166593",
"docType_s":"ART",
"producedDateY_i":2002
},{
"citationRef_s":"<i>ICIP 2001</i>, Sep 2001, France. pp.electronic version",
"citationFull_s":"Patrick Bas, Benoit Macq. A New Video-Object Watermarking Scheme Robust to Object Manipulation. <i>ICIP 2001</i>, Sep 2001, France. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166583v1\">⟨hal-00166583⟩</a>",
"title_s":["A New Video-Object Watermarking Scheme Robust to Object Manipulation"],
"authFullName_s":["Patrick Bas","Benoit Macq"],
"halId_s":"hal-00166583",
"docType_s":"COMM",
"producedDateY_i":2001
},{
"citationRef_s":"<i>SPIE Anual Metting</i>, Aug 2001, San-Diego, United States. pp.electronic version",
"citationFull_s":"Patrick Bas, N. V. Boulgouris, F. D. Kovaros, Jean-Marc Chassery, M. G. Strintzis, et al.. Robust Watermarking of Video Object for MPEG-4 Applications. <i>SPIE Anual Metting</i>, Aug 2001, San-Diego, United States. pp.electronic version. <a target=\"_blank\" href=\"https://hal.science/hal-00166582v1\">⟨hal-00166582⟩</a>",
"title_s":["Robust Watermarking of Video Object for MPEG-4 Applications"],
"authFullName_s":["Patrick Bas","N. V. Boulgouris","F. D. Kovaros","Jean-Marc Chassery","M. G. Strintzis","B. Macq"],
"halId_s":"hal-00166582",
"docType_s":"COMM",
"producedDateY_i":2001
},{
"citationRef_s":"<i>Traitement du Signal</i>, 2001, 18 (4), pp.249-257",
"citationFull_s":"Patrick Bas, Benoit Macq. Tatouage d'objets vidéos résistant aux manipulations. <i>Traitement du Signal</i>, 2001, 18 (4), pp.249-257. <a target=\"_blank\" href=\"https://hal.science/hal-00166588v1\">⟨hal-00166588⟩</a>",
"title_s":["Tatouage d'objets vidéos résistant aux manipulations"],
"authFullName_s":["Patrick Bas","Benoit Macq"],
"halId_s":"hal-00166588",
"docType_s":"ART",
"producedDateY_i":2001
},{
"citationRef_s":"<i>SPIE Electronic Imaging, Security and Watermarking of Multimedia Content II</i>, Jan 2000, San-Jose, United States. pp.99-109",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, B. Macq. Robust Watermarking Based on the Warping of Pre-Defined Triangular Patterns. <i>SPIE Electronic Imaging, Security and Watermarking of Multimedia Content II</i>, Jan 2000, San-Jose, United States. pp.99-109. <a target=\"_blank\" href=\"https://hal.science/hal-00166552v1\">⟨hal-00166552⟩</a>",
"title_s":["Robust Watermarking Based on the Warping of Pre-Defined Triangular Patterns"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","B. Macq"],
"halId_s":"hal-00166552",
"docType_s":"COMM",
"producedDateY_i":2000
},{
"citationRef_s":"<i>Electronic Imaging, Security and Watermarking of Multimedia Content I</i>, Jan 1999, San Jose (CA), United States. pp.264-272",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, F. Davoine. A Geometrical and Frequential Watermarking Scheme Using Similarities. <i>Electronic Imaging, Security and Watermarking of Multimedia Content I</i>, Jan 1999, San Jose (CA), United States. pp.264-272. <a target=\"_blank\" href=\"https://hal.science/hal-00166550v1\">⟨hal-00166550⟩</a>",
"title_s":["A Geometrical and Frequential Watermarking Scheme Using Similarities"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","F. Davoine"],
"halId_s":"hal-00166550",
"docType_s":"COMM",
"producedDateY_i":1999
},{
"citationRef_s":"<i>EUSIPCO</i>, Oct 1998, Rhodos, Greece. pp.2277-2280",
"citationFull_s":"Patrick Bas, Jean-Marc Chassery, Franck Davoine. Self-similarity based image watermarking. <i>EUSIPCO</i>, Oct 1998, Rhodos, Greece. pp.2277-2280. <a target=\"_blank\" href=\"https://hal.science/hal-00166545v1\">⟨hal-00166545⟩</a>",
"title_s":["Self-similarity based image watermarking"],
"authFullName_s":["Patrick Bas","Jean-Marc Chassery","Franck Davoine"],
"halId_s":"hal-00166545",
"docType_s":"COMM",
"producedDateY_i":1998
},{
"citationRef_s":"<i>ICIP</i>, Aug 1998, France. pp.469-473",
"citationFull_s":"Patrick Bas, J.-M. Chassery, F. Davoine. Using the fractal Code to Watermark Images. <i>ICIP</i>, Aug 1998, France. pp.469-473. <a target=\"_blank\" href=\"https://hal.science/hal-00166548v1\">⟨hal-00166548⟩</a>",
"title_s":["Using the fractal Code to Watermark Images"],
"authFullName_s":["Patrick Bas","J.-M. Chassery","F. Davoine"],
"halId_s":"hal-00166548",
"docType_s":"COMM",
"producedDateY_i":1998
}]
}
}