Publications

1.
Etienne Levecque, John Klein, Patrick Bas, and Jan Butora. Toward Reliable JPEG Steganalysis (at QF100). In WIFS 2022 – 14th IEEE International Workshop on Information Forensics and Security, Shanghai (virtual), China, December 2022. IEEE.
2.
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, and Tomáš Pevný. Using Set Covering to Generate Databases for Holistic Steganalysis. In WIFS 2022 – 14th IEEE International Workshop on Information Forensics and Security, Shanghai (virtual), China, December 2022. IEEE.
3.
Rony Abecidan, Vincent Itier, Jérémie Boulanger, and Patrick Bas. Adaptation de domaine pour l’analyse forensique d’images. In GRETSI 2022 – Colloque Francophone de Traitement du Signal et des Images, Nancy, France, September 2022.
4.
Etienne Levecque, Jan Butora, John Klein, and Patrick Bas. Vers une stéganalyse certifiée pour des images JPEG. In GRETSI 2022, Nancy, France, September 2022.
5.
Elena Rodríguez-Lois, David Vázquez-Padín, Fernando Pérez-González and Pedro Comesaña-Alfaro, A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection, 2022 30th European Signal Processing Conference (EUSIPCO), 2022, pp. 1022-1026.
6.
Dominik Šepák, Lukáš Adam, Tomáš Pevný, Czech Technical University in Prague, Czech Republic. Formalizing cover-source mismatch as a robust optimization. European Signal Processing Conference (EUSIPCO), 2022
7.
Quentin Giboulot, Patrick Bas, Rémi Cogranne, and Dirk Borghys. The Cover Source Mismatch Problem in Deep-Learning Steganalysis. In European Signal Processing Conference, Belgrade, Serbia, August 2022.

Journal Publication

8.
Vaila Leask, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx. UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media. 17th International Conference on Availability, Reliability and Security (ARES 2022), Aug 2022, Vienna, Austria. ffhal-03696116
9.
Martin Beneš, Nora Hofer and Rainer Böhme. The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis. In Proceedings of the 30th European Signal Processing Conference (EUSIPCO). EURASIP, Belgrade, Serbia, 2022, pp. 1057–1061
10.
Martin Beneš, Nora Hofer and Rainer Böhme. Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. In Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC). ACM, 2022, pp. 19–25.

Journal Publication

11.
Quentin Giboulot, Patrick Bas, Rémi Cogranne. Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, In press, 17, pp.1841 – 1854. ff10.1109/TIFS.2022.3173184ff. ffhal-03663628

Journal Publication

12.
Jan Butora, Patrick Bas, and Rémi Cogranne. Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack. In 10th ACM Workshop on Information Hiding and Multimedia Security – ACM IH&MMSEC’23. Chicago, Illinois, June 28-30, 2023. ACM IH&MMSEC
13.
Etienne Levecque, Patrick Bas, and Jan Butora. Compatibility and Timing Attacks for JPEG Steganalysis. In 10th ACM Workshop on Information Hiding and Multimedia Security – ACM IH&MMSEC’23. Chicago, Illinois, June 28-30, 2023. ACM IH&MMSEC.
14.
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics by Nora Hofer and Rainer Boehme, ACM IH&MMSEC’23. Chicago, Illinois, June 28-30, June 2023. ACM IH&MMSEC

AWARDED

15.
Jan Butora, Patrick Bas. Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. IEEE Transactions on Information Forensics and Security, In press, ff10.1109/TIFS.2023.3268884ff. ffhal-04083163

Journal Publication

16.
Alexander Schlögl, Nora Hofer and Rainer Böhme. Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks. In Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS 2023). December, 2023.
17.
Martin Beneš, Benedikt Lorch and Rainer Böhme. JPEG Steganalysis Using Leaked Cover Thumbnails. IEEE International Workshop on Information Forensics and Security (WIFS), Nürnberg, Germany, 2023, DOI: 10.1109/WIFS58808.2023.10374587
18.
R. Abecidan, V. Itier, J. Boulanger, P. Bas and T. Pevný, “Leveraging Data Geometry to Mitigate CSM in Steganalysis“, 2023 IEEE International Workshop on Information Forensics and Security (WIFS), Nürnberg, Germany, 2023, pp. 1-6. https://hal.science/hal-04229257v1

AWARDED

19.
C. Kraetzer, M. Hildebrandt: Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect. In Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2024) – Volume 4: VISAPP, pages 585-592, DOI: 10.5220/0012423800003660, ISBN: 978-989-758-679-8; ISSN: 2184-4321, SCITEPRESS – Science and Technology Publications, Lda., 2024.
20.
Nicolás-Sánchez, A., Castro-Toledo, F.J. Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective. Crime Sci 13, 11 (2024). https://doi.org/10.1186/s40163-024-00209-7

Journal Publication

21.
Mallet, A., Cogranne, R., & Bas, P. (2023). Linking intrinsic difficulty and regret to properties of multivariate Gaussians in image steganalysis. In Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security (pp. 95-106). ACM. https://doi.org/10.1145/3658664.3659643
22.
Beneš, M., & Böhme, R. (2024). Exploring diffusion-inspired pixel predictors for WS steganalysis. In Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security (pp. 107-118). ACM. https://doi.org/10.1145/3658664.3659645
23.
Mallet, A., Bas, P., & Cogranne, R. (2024). Statistical correlation as a forensic feature to mitigate the cover-source mismatch. In Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security (pp. 65-76). ACM. https://doi.org/10.1145/3658664.3659638
24.
Butora, J., & Bas, P. (2024). The Adobe hidden feature and its impact on sensor attribution (Honorable Mention Award). In Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security (pp. 139-150). ACM. https://doi.org/10.1145/3658664.3659650

AWARDED

25.
Arthur Méreur, Antoine Mallet, Rémi Cogranne. Are Deepfakes a Game Changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?. The 19th International Conference on Availability, Reliability and Security (ARES 2024), August 2024, https://hal.science/hal-04601453/ 
26.
Kombrink, M. H., Geradts, Z. J. M. H., & Worring, M. (2024). Image steganography approaches and their detection strategies: A survey. ACM Computing Surveys. https://doi.org/10.1145/3694965
27.
Jan Butora, Pauline Puteaux, Patrick Bas. Errorless Robust JPEG Steganography using Outputs of JPEG Coders. IEEE Transactions on Dependable and Secure Computing, 2023, pp.1-13. ff10.1109/TDSC.2023.3306379ff. ffhal-04181480f

Journal Publication

28.
Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas – “Recherche et Analyse de Sources Représentatives pour la Stéganalyse” -Colloque Francophone de Traitement du Signal et des Images – GRETSI’23
29.
Jan Butora, Patrick Bas. Detection of the Adobe Pattern. 32nd European Signal Processing Conference, Aug 2024, Lyon, France.
30.
Etienne Levecque, Patrick Bas, Jan Butora. Attaque de Compatibilité contre la Stéganographie JPEG. XXIXème Colloque Francophone de Traitement du Signal et des Images (GRETSI’23), Aug 2023, Grenoble, France. ffhal-04170051f
31.
Quentin Giboulot, Tomáš Pevný, Andrew D Ker. The Non-Zero-Sum Game of Steganography in Heterogeneous Environments. IEEE Transactions on Information Forensics and Security, 2023, 18, pp.4436 – 4448. ff10.1109/tifs.2023.3295945ff. ffhal-04463469f

Journal Publication

32.
Mallet, A., & Cogranne, R. Identification de développements d’images par matrices de corrélations. The 18th International Conference on Availability, Reliability and Security (Colloque Francophone de Traitement du Signal et des Images – GRETSI’23), August 2023.
33.
Rémi Cogranne. The ALASKA project: An interesting mix of theoretical advances and open science. ERI Network & Telcom – EUt+ Workshop, 2022. ffhal-03625585f
34.
Mallet, A., Benes, M., & Cogranne, R. Cover-source mismatch in steganalysis: Systematic review. Research Square, October 2023.
35.
Jan Butora, Patrick Bas. Size-Independent Reliable CNN for RJCA Steganalysis. IEEE Transactions on Information Forensics and Security, 2024, pp.2683-2695. ff10.1109/TIFS.2024.3379849ff.

Journal Publication

36.
Jan Butora, Patrick Bas. Fighting the Reverse JPEG Compatibility Attack: Pick your Side. The 10th ACM Workshop on Information Hiding and Multimedia Security, Jun 2022, Santa Barbara, United States. ff10.1145/3531536.3532955ff. ffhal-03662307f
37.
Etienne Levecque, Jan Butora, Patrick Bas. Finding Incompatible Blocks for Reliable JPEG Steganalysis. IEEE Transactions on Information Forensics and Security, 2024. 

Journal Publication

38.
Jan Butora and Patrick Bas. High Quality JPEG Compressor Detection via Decompression Error. In GRETSI, Nancy, France, September 2022.
39.
Beneš, M., & Böhme, R. (2024). Kerckhoffs in prison: A study of the steganalyst’s knowledge. Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS). University of Innsbruck.
40.
Lorch, B., & Böhme, R. (2024). Landscape more secure than portrait? Zooming into the directionality of digital images with security implications. Proceedings of the 33rd USENIX Security Symposium. Retrieved from https://www.usenix.org/conference/usenixsecurity24/presentation/lorch
41.
N. Hofer, “Increasing Trust in Image Analysis by Detecting Trellis Quantization in JPEG Images,” 2024 IEEE International Conference on Image Processing (ICIP), Abu Dhabi, United Arab Emirates, 2024, pp. 3834-3840, doi: 10.1109/ICIP51287.2024.10648207.