Follow
Jan Butora
Jan Butora
CNRS CRIStAL
Verified email at univ-lille.fr - Homepage
Title
Cited by
Cited by
Year
ImageNet pre-trained CNNs for JPEG steganalysis
Y Yousfi, J Butora, E Khvedchenya, J Fridrich
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
662020
Breaking ALASKA: Color separation for steganalysis in JPEG domain
Y Yousfi, J Butora, J Fridrich, Q Giboulot
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
592019
Reverse JPEG compatibility attack
J Butora, J Fridrich
IEEE Transactions on Information Forensics and Security 15, 1444-1454, 2019
512019
Improving EfficientNet for JPEG steganalysis
Y Yousfi, J Butora, J Fridrich, C Fuji Tsang
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
452021
How to pretrain for steganalysis
J Butora, Y Yousfi, J Fridrich
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
372021
Effect of jpeg quality on steganographic security
J Butora, J Fridrich
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
182019
Detection of diversified stego sources with CNNs
J Butora, J Fridrich
Electronic Imaging 31, 1-11, 2019
142019
Turning cost-based steganography into model-based
J Butora, Y Yousfi, J Fridrich
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020
132020
Steganography and its detection in JPEG images obtained with the" trunc" quantizer
J Butora, J Fridrich
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
122020
Errorless robust JPEG steganography using outputs of JPEG coders
J Butora, P Puteaux, P Bas
IEEE Transactions on Dependable and Secure Computing, 2023
82023
Fighting the reverse JPEG compatibility attack: Pick your side
J Butora, P Bas
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia …, 2022
52022
Minimum perturbation cost modulation for side-informed steganography
J Butora, J Fridrich
Electronic Imaging 32, 1-8, 2020
52020
CNN steganalyzers leverage local embedding artifacts
Y Yousfi, J Butora, J Fridrich
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
42021
Extending the reverse JPEG compatibility attack to double compressed images
J Butora, J Fridrich
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
42021
Analysis and mitigation of the false alarms of the reverse jpeg compatibility attack
J Butora, P Bas, R Cogranne
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023
22023
Side-informed steganography for jpeg images by modeling decompressed images
J Butora, P Bas
IEEE Transactions on Information Forensics and Security, 2023
22023
Toward reliable jpeg steganalysis (at qf100)
E Levecque, J Klein, P Bas, J Butora
2022 IEEE International Workshop on Information Forensics and Security (WIFS …, 2022
22022
High quality JPEG compressor detection via decompression error
J Butora, P Bas
GRETSI, 2022
22022
Revisiting perturbed quantization
J Butora, J Fridrich
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
22021
The Adobe Hidden Feature and its Impact on Sensor Attribution
J Butora, P Bas
arXiv preprint arXiv:2401.01366, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20