关注
Patrick Bas
Patrick Bas
CNRS CRIStAL
在 centralelille.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Steganalysis by subtractive pixel adjacency matrix
T Pevný, P Bas, J Fridrich
Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009
13692009
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
13452011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
11182010
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
9012009
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7632002
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3342013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2642011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
2132003
The ALASKA steganalysis challenge: A first step towards steganalysis
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
1492019
BOWS-2
P Bas, T Furon
1472007
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
1092008
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
1052017
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
922000
ALASKA# 2: Challenging academic research on steganalysis with realistic images
R Cogranne, Q Giboulot, P Bas
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
892020
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
842008
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
841998
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
752002
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
742008
Steganography by minimizing statistical detectability: The cases of JPEG and color images
R Cogranne, Q Giboulot, P Bas
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
642020
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
642010
系统目前无法执行此操作,请稍后再试。
文章 1–20