?
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security ,
3
The Adobe Hidden Feature and its Impact on Sensor Attributi..:
, In:
?
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security ,
5
Analysis and Mitigation of the False Alarms of the Reverse ..:
, In:
?
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security ,
6
Compatibility and Timing Attacks for JPEG Steganalysis:
, In:
?
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security ,
8
Fighting the Reverse JPEG Compatibility Attack: Pick your S..:
, In:
?
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security ,
9
Session details: Session 6: Steganography II:
, In:
?
2022 IEEE International Workshop on Information Forensics and Security (WIFS) ,
10
Toward Reliable JPEG Steganalysis (at QF100):
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
11
Improving EfficientNet for JPEG Steganalysis:
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
12
How to Pretrain for Steganalysis:
, In:
?
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security ,
13
Revisiting Perturbed Quantization:
, In:
?
ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) ,
14
Steganography and its Detection in JPEG Images Obtained wit..:
, In:
?
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security ,
15