Filtrer vos résultats
- 130
- 18
- 1
- 98
- 30
- 6
- 5
- 4
- 3
- 2
- 1
- 2
- 118
- 111
- 9
- 2
- 1
- 22
- 3
- 13
- 14
- 9
- 16
- 7
- 3
- 2
- 6
- 1
- 4
- 5
- 5
- 5
- 4
- 9
- 4
- 8
- 8
- 7
- 3
- 3
- 3
- 3
- 1
- 1
- 2
- 121
- 24
- 4
- 73
- 29
- 28
- 23
- 15
- 14
- 14
- 10
- 9
- 8
- 7
- 5
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 149
- 19
- 19
- 17
- 16
- 14
- 12
- 10
- 9
- 8
- 8
- 8
- 8
- 8
- 7
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
149 résultats
|
Effects and Solutions of Cover-Source Mismatch in Image SteganalysisSignal Processing: Image Communication, 2020, 86, ⟨10.1016/j.image.2020.115888⟩
Article dans une revue
hal-02631559v1
|
||
Using the Sensor Noise Model to Design Better Steganographic SchemesInternational Workshop on Digital-forensics and Watermarking (IWDW) 2020, Nov 2020, Melbourne, Australia
Communication dans un congrès
hal-03047975v1
|
|||
|
Steganography via Cover-Source SwitchingWIFS, Dec 2016, Abu Dabi, United Arab Emirates
Communication dans un congrès
hal-01386190v1
|
||
|
Leveraging Data Geometry to Mitigate CSM in SteganalysisIEEE International Workshop on Information Forensics and Security (WIFS 2023), Dec 2023, Nuremberg, Germany
Communication dans un congrès
hal-04229257v1
|
||
|
Recherche et Analyse de Sources Représentatives pour la StéganalyseXXIXème Colloque Francophone de Traitement du Signal et des Images-GRETSI'23, Aug 2023, Grenoble, France
Communication dans un congrès
hal-04166647v2
|
||
|
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG SteganographyIEEE International Workshop on Information Forensics and Security, Dec 2020, New York, United States. ⟨10.1109/WIFS49906.2020.9360884⟩
Communication dans un congrès
hal-03006635v1
|
||
|
High Quality JPEG Compressor Detection via Decompression ErrorGRETSI, Sep 2022, Nancy, France
Communication dans un congrès
hal-03697777v1
|
||
|
Finding Incompatible Blocks for Reliable JPEG Steganalysis2024
Pré-publication, Document de travail
hal-04470068v1
|
||
The Cover Source Mismatch Problem in Deep-Learning Steganalysis2022 30th European Signal Processing Conference (EUSIPCO), Aug 2022, Belgrade, Serbia. pp.1032-1036, ⟨10.23919/EUSIPCO55093.2022.9909553⟩
Communication dans un congrès
hal-04458063v1
|
|||
|
The Adobe Hidden Feature and its Impact on Sensor Attribution2023
Logiciel
hal-04456499v1
|
||
|
Authentification par codes graphiques: optimisation du canal d'impression-acquisitionGRESTI, Sep 2015, Lyon, France. pp.4
Communication dans un congrès
hal-01188056v1
|
||
|
Python Implementation of Natural Steganography: Notebooks accompanying the paper published in IEEE TIFS.Logiciel hal-04456456v1 |
||
Steganography: Embedding Data Into Multimedia ContentMultimedia Security 1, Chapter 5, Wiley, pp.161-188, 2022, Online: 9781119901808 Print: 9781789450262. ⟨10.1002/9781119901808⟩
Chapitre d'ouvrage
hal-03601267v1
|
|||
|
Extracting relevant features of steganographic schemes by feature selection techniquesWaCHa 2007 - Third Wavila Challenge, Jun 2007, Saint-Malo, France. pp.electronic version
Communication dans un congrès
hal-00166700v1
|
||
Influence des Vecteurs Caractéristiques en Stéganalyse par Séparateurs à Vastes MargesGRETSI (20ème Colloque GRETSI sur le traitement du signal et des images ), 2005, Louvain la neuve, Belgique
Communication dans un congrès
hal-00080112v1
|
|||
|
Improving LSB Steganalysis using marginal and joint probabilistic distributionsACM Multimedia and Security Workshop 2004, Sep 2004, Magdebourg, Germany. pp.electronic version
Communication dans un congrès
hal-00166577v1
|
||
|
Avantages de la Sélection de Caractéristiques pour la StéganalyseGRETSI 2007 - XXIème Colloque francophone de traitement du signal et des images, Sep 2007, Troyes, France. pp.electronic version
Communication dans un congrès
hal-00166692v1
|
||
|
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis SchemesACM Multimedia and Security Workshop 2008, Sep 2008, -, United Kingdom. pp.227--232
Communication dans un congrès
hal-00325086v1
|
||
|
An Informed Synchronization Scheme for Audio Data HidingProc of SPIE Electronic Imaging, Security and Watermarking of Multimedia Content VI, Jan 2004, San-Jose, United States. pp.116-126
Communication dans un congrès
hal-00166580v1
|
||
|
A New Measure of Watermarking Security: The Effective Key LengthIEEE Transactions on Information Forensics and Security, 2013, 8 (8), pp.1306 - 1317
Article dans une revue
hal-00836404v1
|
||
|
The Adobe Hidden Feature and its Impact on Sensor Attribution2023
Pré-publication, Document de travail
hal-04318702v3
|
||
|
Are 128 Bits Long Keys Possible in Watermarking?13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.191-191, ⟨10.1007/978-3-642-32805-3_15⟩
Communication dans un congrès
hal-01540890v1
|
||
|
Moving Steganography and Steganalysis from the Laboratory into the Real WorldACM IH-MMSEC 2013, Jun 2013, Montpellier, France. pp.ACM 978-1-4503-2081-8/13/06
Communication dans un congrès
hal-00836407v1
|
||
|
Actes de la conférence CAID 20202021
Proceedings/Recueil des communications
hal-03206297v1
|
||
Steganalysis: Detection of Hidden Data in Multimedia ContentMultimedia Security 1: Authentication and Data Hiding, 1, Wiley, Chapter 8, 2022, Online ISBN: 9781119901808 Print ISBN: 9781789450262. ⟨10.1002/9781119901808.ch8⟩
Chapitre d'ouvrage
lirmm-03815641v1
|
|||
|
Fooling an Automatic Image Quality EstimatorMediaEval 2020 - MediaEval Benchmarking Intiative for Multimedia Evaluation, Dec 2020, Online, United States. pp.1-4
Communication dans un congrès
hal-03132891v1
|
||
TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularizationNeurocomputing, 2011, 74 (16), pp.2413-2421. ⟨10.1016/j.neucom.2010.12.042⟩
Article dans une revue
istex
hal-00648069v1
|
|||
Color Image Watermarking Using Quaternion Fourier TransformICASSP, Sep 2003, Hong Kong SAR China. pp.CD-rom
Communication dans un congrès
hal-00166554v1
|
|||
|
Self-similarity based image watermarkingEUSIPCO, Oct 1998, Rhodos, Greece. pp.2277-2280
Communication dans un congrès
hal-00166545v1
|
||
A quantization Watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizersInformation Hiding Workshop, 2005, Barcelonna, Spain
Communication dans un congrès
hal-00079344v1
|