Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Pour SE"'
Publikováno v:
European Signal Processing Conference
European Signal Processing Conference, Aug 2022, Belgrade, Serbia
European Signal Processing Conference, Aug 2022, Belgrade, Serbia
International audience; This paper studies the problem of Cover Source Mismatch (CSM) in steganalysis, i.e. the impact of a testing set which does not originate from the same source than the training set. In this study, the trained steganalyzer uses
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d5ac13ed410d80a33528c551b4c43dbc
https://utt.hal.science/hal-03694662/file/Giboulot_EUSIPCO_2022.pdf
https://utt.hal.science/hal-03694662/file/Giboulot_EUSIPCO_2022.pdf
Autor:
Cogranne, Rémi
This article provides a brief review of the ALASKA project (ANR-18-ASTR-0009: https://alaska.utt.fr), which is continuing through the European Horizon 2020 project UNCOVER (No 101021687). The interest in presenting this project lies mainly in the two
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9bbcc657e8b81871e3797185ae54bc06
https://hal-utt.archives-ouvertes.fr/hal-03625587/file/RESSI2022_RC_ALASKA_en.pdf
https://hal-utt.archives-ouvertes.fr/hal-03625587/file/RESSI2022_RC_ALASKA_en.pdf
Autor:
Giboulot, Quentin
Publikováno v:
Cryptography and Security [cs.CR]. Université de Technologie de Troyes; École doctorale 361 : Sciences pour l'Ingénieur (SPI), 2022. English. ⟨NNT : 2022TROY0003⟩
Cryptography and Security [cs.CR]. Université de Technologie Troyes, 2022. English. ⟨NNT : 2022TROY0003⟩
Cryptography and Security [cs.CR]. Université de Technologie Troyes, 2022. English. ⟨NNT : 2022TROY0003⟩
Steganography is the discipline concerned with techniques designed to embed hidden data into an innocuous cover media. In the case of this manuscript, the cover media of choice are JPEG images. Steganography schemes based on a statistical model of na
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9287df93f74ecf8e8e5db01bf841c348
https://utt.hal.science/tel-03804939/file/Quentin_Giboulot_2022TROY0003.pdf
https://utt.hal.science/tel-03804939/file/Quentin_Giboulot_2022TROY0003.pdf
Autor:
Cogranne, Rémi
Publikováno v:
ERI Network & Telcom-EUt+ Workshop
ERI Network & Telcom-EUt+ Workshop, 2022
ERI Network & Telcom-EUt+ Workshop, 2022
International audience; This article provides a brief review of the ALASKA project (ANR-18-ASTR-0009: https://alaska.utt.fr), which is continuing through the European Horizon 2020 project UNCOVER (No 101021687). The interest in presenting this projec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::cf2bf7d428f8ebc09cb512891109f1ab
https://utt.hal.science/hal-03625585
https://utt.hal.science/hal-03625585
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, In press, ⟨10.1109/TIFS.2021.3138616⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, In press
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2021.3138616⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, In press, ⟨10.1109/TIFS.2021.3138616⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, In press
IEEE Transactions on Information Forensics and Security, In press, ⟨10.1109/TIFS.2021.3138616⟩
International audience; Many adversarial attacks produce floating-point tensors which are no longer adversarial when converted to raster or JPEG images due to rounding. This paper proposes a method dedicated to quantize adversarial perturbations. Thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e242c9dca4234557002286581c00bb85
https://hal.archives-ouvertes.fr/hal-03467692v2/file/paper.pdf
https://hal.archives-ouvertes.fr/hal-03467692v2/file/paper.pdf
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, pp.1-16. ⟨10.1109/TIFS.2021.3111713⟩
IEEE Transactions on Information Forensics and Security, 2021, 17, pp.1328-1343. ⟨10.1109/TIFS.2021.3111713⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, pp.1-16. ⟨10.1109/TIFS.2021.3111713⟩
IEEE Transactions on Information Forensics and Security, 2021, 17, pp.1328-1343. ⟨10.1109/TIFS.2021.3111713⟩
International audience; Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods. While those approaches have been successful, they rely on in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::7edb266552ce16d1ae015efc581a2dda
https://hal-utt.archives-ouvertes.fr/hal-03342645
https://hal-utt.archives-ouvertes.fr/hal-03342645
Publikováno v:
EUSIPCO 2021-29th European Signal Processing Conference
EUSIPCO 2021-29th European Signal Processing Conference, Aug 2021, Dublin (virtual), Ireland. In press
29th European Signal Processing Conference (EUSIPCO 2021)
29th European Signal Processing Conference (EUSIPCO 2021), Aug 2021, Dublin (virtual), Ireland
EUSIPCO 2021-29th European Signal Processing Conference, Aug 2021, Dublin (virtual), Ireland. pp.806-810, ⟨10.23919/EUSIPCO54536.2021.9616041⟩
EUSIPCO 2021-29th European Signal Processing Conference, Aug 2021, Dublin (virtual), Ireland. In press
29th European Signal Processing Conference (EUSIPCO 2021)
29th European Signal Processing Conference (EUSIPCO 2021), Aug 2021, Dublin (virtual), Ireland
EUSIPCO 2021-29th European Signal Processing Conference, Aug 2021, Dublin (virtual), Ireland. pp.806-810, ⟨10.23919/EUSIPCO54536.2021.9616041⟩
International audience; This paper proposes to study the impact of image selective encryption on both forensics and privacy preserving mechanisms. The proposed selective encryption scheme works independently on each bitplane by encrypting the s most
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a63a5217b2cc8f553aecc92f84bcb21b
http://arxiv.org/abs/2103.03569
http://arxiv.org/abs/2103.03569
Detectability-based JPEG steganography modeling the processing pipeline: the noise-content trade-off
Publikováno v:
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, Early access (Early access), pp.Early access. ⟨10.1109/TIFS.2021.3050063⟩
IEEE Transactions on Information Forensics and Security, 2021, 16, pp.2202-2217. ⟨10.1109/TIFS.2021.3050063⟩
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, Early access (Early access), pp.Early access. ⟨10.1109/TIFS.2021.3050063⟩
IEEE Transactions on Information Forensics and Security, 2021, 16, pp.2202-2217. ⟨10.1109/TIFS.2021.3050063⟩
International audience; The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG steganography are usually subpar with respect to distortionbased schemes. We link this lack of performance to a poor est
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9a24cab075961205c06e490f48e82e35
https://hal.archives-ouvertes.fr/hal-03096658
https://hal.archives-ouvertes.fr/hal-03096658
Publikováno v:
IEEE International Workshop on Information Forensics and Security
IEEE International Workshop on Information Forensics and Security, Dec 2020, New York, United States. ⟨10.1109/WIFS49906.2020.9360884⟩
WIFS
IEEE International Workshop on Information Forensics and Security, Dec 2020, New York, United States. ⟨10.1109/WIFS49906.2020.9360884⟩
WIFS
International audience; Current schemes in steganography relying on synchronization are all based on a general heuristic to take into account interactions between embedding changes. However these approaches, while often competitive, lack a clear mode
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd3694c58d775244c363f699fa8a17c4
https://hal.science/hal-03006635/document
https://hal.science/hal-03006635/document
Publikováno v:
IEEE International Workshop on Information Forensics and Security
IEEE International Workshop on Information Forensics and Security, Dec 2020, New York City (Virtual Conference), United States. ⟨10.1109/WIFS49906.2020.9360896⟩
WIFS
IEEE International Workshop on Information Forensics and Security, Dec 2020, New York City (Virtual Conference), United States. ⟨10.1109/WIFS49906.2020.9360896⟩
WIFS
International audience; This paper briefly summarizes the ALASKA#2 steganalysis challenge which has been organized on the Kaggle machine learning competition platform. We especially focus on the context, the organization (rules, timeline, evaluation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6dfaf2650997fad3364448844215318e
https://hal-utt.archives-ouvertes.fr/hal-02950094/file/ALASKAv2_cpy.pdf
https://hal-utt.archives-ouvertes.fr/hal-02950094/file/ALASKAv2_cpy.pdf