Suivre
Rémi Cogranne
Rémi Cogranne
Troyes University of Technology (UTT)
Adresse e-mail validée de utt.fr - Page d'accueil
Titre
Citée par
Citée par
Année
Content-adaptive steganography by minimizing statistical detectability
V Sedighi, R Cogranne, J Fridrich
IEEE Transactions on Information Forensics and Security 11 (2), 221-234, 2015
5622015
Selection-Channel-Aware Rich Model for Steganalysis of Digital Images
T Denemark, V Sedighi, V Holub, R Cogranne, J Fridrich
Information Forensics and Security (WIFS), 2014 IEEE International Workshop …, 2014
4102014
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3232013
Rich Model for Steganalysis of Color Images
M Goljan, J Fridrich, R Cogranne
Information Forensics and Security (WIFS), 2014 IEEE International Workshop …, 2014
1802014
Camera Model Identification Based on the Heteroscedastic Noise Model
TH Thai, R Cogranne, F Retraint
Image Processing, IEEE Transactions on 23 (1), 250-263, 2014
1452014
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis "into the wild"
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
1412019
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
V Sedighi, J Fridrich, R Cogranne
Media Watermarking, Security, and Forensics 2015 9409, 144-156, 2015
1332015
JPEG quantization step estimation and its applications to digital image forensics
TH Thai, R Cogranne, F Retraint
IEEE Transactions on Information Forensics and Security 12 (1), 123-133, 2016
1032016
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?
R Cogranne, V Sedighi, J Fridrich, T Pevný
Information Forensics and Security (WIFS), 2015 IEEE International Workshop …, 2015
1002015
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm
TH Thai, R Cogranne, F Retraint
Image Processing, IEEE Transactions on 23 (5), 1980-1993, 2014
952014
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory
R Cogranne, J Fridrich
IEEE Transactions on Information Forensics and Security 10 (12), 2627 - 2642, 2015
762015
ALASKA# 2: Challenging academic research on steganalysis with realistic images
R Cogranne, Q Giboulot, P Bas
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
742020
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection
R Cogranne, F Retraint
Information Forensics and Security, IEEE Transactions on 8 (3), 464-476, 2013
742013
Camera model identification based on the generalized noise model in natural images
TH Thai, F Retraint, R Cogranne
Digital Signal Processing 48, 285-297, 2016
672016
A cover image model for reliable steganalysis
R Cogranne, C Zitzmann, L Fillatre, F Retraint, I Nikiforov, P Cornu
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
652011
Steganography by minimizing statistical detectability: The cases of JPEG and color images
R Cogranne, Q Giboulot, P Bas
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
602020
Statistical detection of defects in radiographic images using an adaptive parametric model
R Cogranne, F Retraint
Signal Processing 96, 173-189, 2014
522014
Content poisoning in named data networking: Comprehensive characterization of real deployment
T Nguyen, X Marchal, G Doyen, T Cholez, R Cogranne
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
482017
Statistical decision methods in hidden information detection
C Zitzmann, R Cogranne, F Retraint, I Nikiforov, L Fillatre, P Cornu
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
472011
Detection of Interest Flooding Attacks in Named Data Networking using Hypothesis Testing
NT Nguyen, R Cogranne, G Doyen, F Retraint
Information Forensics and Security (WIFS), 2015 IEEE International Workshop, 1-6, 2015
452015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20