Steganalysis by subtractive pixel adjacency matrix T Pevný, P Bas, J Fridrich Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009 | 1369 | 2009 |
” Break our steganographic system”: the ins and outs of organizing BOSS P Bas, T Filler, T Pevný International workshop on information hiding, 59-70, 2011 | 1345 | 2011 |
Using high-dimensional image models to perform highly undetectable steganography T Pevný, T Filler, P Bas Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010 | 1118 | 2010 |
OP-ELM: optimally pruned extreme learning machine Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse IEEE transactions on neural networks 21 (1), 158-162, 2009 | 901 | 2009 |
Geometrically invariant watermarking using feature points P Bas, JM Chassery, B Macq IEEE transactions on image Processing 11 (9), 1014-1028, 2002 | 763 | 2002 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 334 | 2013 |
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse Neurocomputing 74 (16), 2413-2421, 2011 | 264 | 2011 |
Color image watermarking using quaternion Fourier transform P Bas, N Le Bihan, JM Chassery 2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003 | 213 | 2003 |
The ALASKA steganalysis challenge: A first step towards steganalysis R Cogranne, Q Giboulot, P Bas Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 149 | 2019 |
BOWS-2 P Bas, T Furon | 147 | 2007 |
Kerckhoffs-based embedding security classes for woa data hiding F Cayre, P Bas IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008 | 109 | 2008 |
Image database of BOWS-2 P Bas, T Furon Accessed: Jun 20, 2016-2017, 2017 | 105 | 2017 |
Robust watermarking based on the warping of predefined triangular patterns P Bas, JM Chassery, BMM Macq Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000 | 92 | 2000 |
ALASKA# 2: Challenging academic research on steganalysis with realistic images R Cogranne, Q Giboulot, P Bas 2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020 | 89 | 2020 |
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM. Y Miche, P Bas, C Jutten, O Simula, A Lendasse ESANN, 247-252, 2008 | 84 | 2008 |
Using the fractal code to watermark images P Bas, JM Chassery, F Davoine Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998 | 84 | 1998 |
Image watermarking: an evolution to content based approaches P Bas, JM Chassery, B Macq Pattern recognition 35 (3), 545-561, 2002 | 75 | 2002 |
Broken arrows T Furon, P Bas EURASIP Journal on Information Security 2008, 1-13, 2008 | 74 | 2008 |
Steganography by minimizing statistical detectability: The cases of JPEG and color images R Cogranne, Q Giboulot, P Bas Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020 | 64 | 2020 |
BOSS (break our steganography system) T Filler, T Pevný, P Bas | 64 | 2010 |