Butora, Jan
73  Ergebnisse:
Personensuche X
?
1

Size-Independent Reliable CNN for RJCA Steganalysis:

Butora, Jan ; Bas, Patrick
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 4420-4431 , 2024
 
?
2

The Adobe Hidden Feature and its Impact on Sensor Attributi..:

, In: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security,
Butora, Jan ; Bas, Patrick - p. 143-148 , 2024
 
?
4

Analysis and Mitigation of the False Alarms of the Reverse ..:

, In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security,
Butora, Jan ; Bas, Patrick ; Cogranne, Rémi - p. 59-66 , 2023
 
?
5

Compatibility and Timing Attacks for JPEG Steganalysis:

, In: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security,
 
?
6

Side-Informed Steganography for JPEG Images by Modeling Dec..:

Butora, Jan ; Bas, Patrick
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 2683-2695 , 2023
 
?
8

Toward Reliable JPEG Steganalysis (at QF100):

, In: 2022 IEEE International Workshop on Information Forensics and Security (WIFS),
 
?
9

Session details: Session 6: Steganography II:

, In: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security,
Butora, Jan , 2022
 
?
10

Fighting the Reverse JPEG Compatibility Attack: Pick your S..:

, In: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security,
Butora, Jan ; Bas, Patrick - p. 113-121 , 2022
 
?
11

How to Pretrain for Steganalysis:

, In: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security,
 
?
12

Revisiting Perturbed Quantization:

, In: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security,
Butora, Jan ; Fridrich, Jessica - p. 125-136 , 2021
 
?
13

Improving EfficientNet for JPEG Steganalysis:

, In: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security,
Yousfi, Yassine ; Butora, Jan ; Fridrich, Jessica. - p. 149-157 , 2021
 
?
14

Turning Cost-Based Steganography into Model-Based:

, In: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security,
 
?
15

Steganography and its Detection in JPEG Images Obtained wit..:

, In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Butora, Jan ; Fridrich, Jessica - p. 2762-2766 , 2020
 
1-15