A reversible data hiding method for encrypted images W Puech, M Chaumont, O Strauss Security, forensics, steganography, and watermarking of multimedia contents …, 2008 | 351 | 2008 |
Yedroudj-net: An efficient CNN for spatial steganalysis M Yedroudj, F Comby, M Chaumont 2018 IEEE international conference on acoustics, speech and signal …, 2018 | 307 | 2018 |
Camera model identification with the use of deep convolutional neural networks A Tuama, F Comby, M Chaumont 2016 IEEE International workshop on information forensics and security (WIFS …, 2016 | 275 | 2016 |
A deep learning method for accurate and fast identification of coral reef fishes in underwater images S Villon, D Mouillot, M Chaumont, ES Darling, G Subsol, T Claverie, ... Ecological informatics 48, 238-244, 2018 | 215 | 2018 |
Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch L Pibre, P Jérôme, D Ienco, M Chaumont arXiv preprint arXiv:1511.04855, 2015 | 210* | 2015 |
Fast protection of H. 264/AVC by selective encryption of CAVLC and CABAC for I and P frames Z Shahid, M Chaumont, W Puech IEEE Transactions on Circuits and Systems for Video Technology 21 (5), 565-576, 2011 | 210 | 2011 |
Coral reef fish detection and recognition in underwater videos by supervised machine learning: Comparison between Deep Learning and HOG+ SVM methods S Villon, M Chaumont, G Subsol, S Villéger, T Claverie, D Mouillot International Conference on Advanced Concepts for Intelligent Vision Systems …, 2016 | 156 | 2016 |
Deep learning in steganography and steganalysis M Chaumont Digital media steganography, 321-349, 2020 | 90 | 2020 |
Adaptive steganography by oracle (ASO) S Kouider, M Chaumont, W Puech 2013 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2013 | 63 | 2013 |
Pelican: deep architecture for the light curve analysis J Pasquet, J Pasquet, M Chaumont, D Fouchez Astronomy & Astrophysics 627, A21, 2019 | 61 | 2019 |
Camera model identification based machine learning approach with high order statistics features A Tuama, F Comby, M Chaumont 2016 24th European Signal Processing Conference (EUSIPCO), 1183-1187, 2016 | 55 | 2016 |
Steganalysis with cover-source mismatch and a small learning database J Pasquet, S Bringay, M Chaumont 2014 22nd European signal processing conference (EUSIPCO), 2425-2429, 2014 | 48 | 2014 |
How to augment a small learning set for improving the performances of a CNN-based steganalyzer? M Yedroudj, M Chaumont, F Comby arXiv preprint arXiv:1801.04076, 2018 | 46 | 2018 |
A DCT-based data-hiding method to embed the color information in a JPEG grey level image M Chaumont, W Puech 2006 14th European Signal Processing Conference, 1-5, 2006 | 46 | 2006 |
Color image steganalysis based on steerable gaussian filters bank H Abdulrahman, M Chaumont, P Montesinos, B Magnier Proceedings of the 4th ACM workshop on Information Hiding and Multimedia …, 2016 | 45 | 2016 |
Considering the reconstruction loop for data hiding of intra-and inter-frames of H. 264/AVC Z Shahid, M Chaumont, W Puech Signal, Image and Video Processing 7, 75-93, 2013 | 44 | 2013 |
Fast protection of H. 264/AVC by selective encryption of CABAC for I & P frames Z Shahid, M Chaumont, W Puech 2009 17th European Signal Processing Conference, 2201-2205, 2009 | 44 | 2009 |
A new method to control error rates in automated species identification with deep learning algorithms S Villon, D Mouillot, M Chaumont, G Subsol, T Claverie, S Villéger Scientific reports 10 (1), 10972, 2020 | 41 | 2020 |
Steganography using a 3-player game M Yedroudj, F Comby, M Chaumont Journal of Visual Communication and Image Representation 72, 102910, 2020 | 40 | 2020 |
Deep learning in steganography and steganalysis from 2015 to 2018 M Chaumont arXiv preprint arXiv:1904.01444, 2019 | 40 | 2019 |