Steganalysis by subtractive pixel adjacency matrix T Pevny, P Bas, J Fridrich IEEE Transactions on information Forensics and Security 5 (2), 215-224, 2010 | 1004 | 2010 |
OP-ELM: optimally pruned extreme learning machine Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse IEEE transactions on neural networks 21 (1), 158-162, 2009 | 771 | 2009 |
” Break our steganographic system”: the ins and outs of organizing BOSS P Bas, T Filler, T Pevný International workshop on information hiding, 59-70, 2011 | 737 | 2011 |
Geometrically invariant watermarking using feature points P Bas, JM Chassery, B Macq IEEE transactions on image Processing 11 (9), 1014-1028, 2002 | 731 | 2002 |
Using high-dimensional image models to perform highly undetectable steganography T Pevný, T Filler, P Bas International Workshop on Information Hiding, 161-177, 2010 | 694 | 2010 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 249 | 2013 |
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse Neurocomputing 74 (16), 2413-2421, 2011 | 221 | 2011 |
Color image watermarking using quaternion Fourier transform P Bas, N Le Bihan, JM Chassery 2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003 | 164 | 2003 |
Kerckhoffs-based embedding security classes for woa data hiding F Cayre, P Bas IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008 | 95 | 2008 |
Robust watermarking based on the warping of predefined triangular patterns P Bas, JM Chassery, BMM Macq Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000 | 86 | 2000 |
Using the fractal code to watermark images P Bas, JM Chassery, F Davoine Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998 | 84 | 1998 |
BOWS-2 P Bas, T Furon | 80 | 2007 |
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM. Y Miche, P Bas, C Jutten, O Simula, A Lendasse ESANN, 247-252, 2008 | 77 | 2008 |
Image watermarking: an evolution to content based approaches P Bas, JM Chassery, B Macq Pattern recognition 35 (3), 545-561, 2002 | 67 | 2002 |
Broken arrows T Furon, P Bas EURASIP Journal on Information Security 2008, 1-13, 2008 | 66 | 2008 |
Méthodes de tatouage d'images fondées sur le contenu P Bas Éditeur inconnu, 2000 | 54 | 2000 |
BOSS (break our steganography system) T Filler, T Pevný, P Bas | 53 | 2010 |
A new video-object watermarking scheme robust to object manipulation P Bas, B Macq Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001 | 51 | 2001 |
A feature selection methodology for steganalysis Y Miche, B Roue, A Lendasse, P Bas International Workshop on Multimedia Content Representation, Classification …, 2006 | 49 | 2006 |
A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness B Vassaux, P Bas, JM Chassery Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001 | 42 | 2001 |