Patrick Bas

Orcid: 0000-0003-0873-5872

According to our database1, Patrick Bas authored at least 103 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Finding Incompatibles Blocks for Reliable JPEG Steganalysis.
CoRR, 2024

The Adobe Hidden Feature and its Impact on Sensor Attribution.
CoRR, 2024

2023
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images.
IEEE Trans. Inf. Forensics Secur., 2023

Leveraging Data Geometry to Mitigate CSM in Steganalysis.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Compatibility and Timing Attacks for JPEG Steganalysis.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
IEEE Trans. Inf. Forensics Secur., 2022

Generating Adversarial Images in Quantized Domains.
IEEE Trans. Inf. Forensics Secur., 2022

Backpack: A Backpropagable Adversarial Embedding Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

Errorless Robust JPEG Steganography using Outputs of JPEG Coders.
CoRR, 2022

Toward Reliable JPEG Steganalysis (at QF100).
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Using Set Covering to Generate Databases for Holistic Steganalysis.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Fighting the Reverse JPEG Compatibility Attack: Pick your Side.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Impact of Downscaling on Adversarial Images.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

The Cover Source Mismatch Problem in Deep-Learning Steganalysis.
Proceedings of the 30th European Signal Processing Conference, 2022

2021
Natural Steganography in JPEG Domain With a Linear Development Pipeline.
IEEE Trans. Inf. Forensics Secur., 2021

Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
IEEE Trans. Inf. Forensics Secur., 2021

Explicit Optimization of min max Steganographic Game.
IEEE Trans. Inf. Forensics Secur., 2021

Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Optimizing Additive Approximations of Non-additive Distortion Functions.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Combining Forensics and Privacy Requirements for Digital Images.
Proceedings of the 29th European Signal Processing Conference, 2021

2020
Effects and solutions of Cover-Source Mismatch in image steganalysis.
Signal Process. Image Commun., 2020

Adversarial Images through Stega Glasses.
CoRR, 2020

Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Fooling an Automatic Image Quality Estimator.
Proceedings of the Working Notes Proceedings of the MediaEval 2020 Workshop, 2020

Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

What if Adversarial Samples were Digital Images?
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Forensics Through Stega Glasses: The Case of Adversarial Images.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

JPEG Steganography with Side Information from the Processing Pipeline.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019

Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Exploiting Adversarial Embeddings for Better Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Steganalysis into the Wild: How to Define a Source?
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Natural Steganography in JPEG Compressed Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Facing the Cover-Source Mismatch on JPHide using Training-Set Design.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
An embedding mechanism for natural steganography after down-sampling.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
Natural Steganography: cover-source switching for better steganography.
CoRR, 2016

Steganography via cover-source switching.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Rare event probability estimation using information projection.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Rethinking Optimal Embedding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2014
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images.
IEEE Trans. Image Process., 2014

Document authentication using graphical codes: reliable performance analysis and channel optimization.
EURASIP J. Inf. Secur., 2014

Image model and printed document authentication: A theoretical analysis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Authentication using graphical codes: Optimisation of the print and scan channels.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Impacts of Watermarking Security on Tardos-Based Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2013

A New Measure of Watermarking Security: The Effective Key Length.
IEEE Trans. Inf. Forensics Secur., 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Document authentication using graphical codes: impacts of the channel model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
The Effective Key Length of Watermarking Schemes
CoRR, 2012

A New Measure of Watermarking Security Applied on QIM.
Proceedings of the Information Hiding - 14th International Conference, 2012

Practical key length of watermarking systems.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Key length estimation of zero-bit watermarking schemes.
Proceedings of the 20th European Signal Processing Conference, 2012

Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference.
Proceedings of the Communications and Multimedia Security, 2012

Are 128 Bits Long Keys Possible in Watermarking?
Proceedings of the Communications and Multimedia Security, 2012

2011
TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization.
Neurocomputing, 2011

"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Proceedings of the Information Hiding - 13th International Conference, 2011

Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching.
Proceedings of the Information Hiding - 13th International Conference, 2011

Informed secure watermarking using optimal transport.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
OP-ELM: optimally pruned extreme learning machine.
IEEE Trans. Neural Networks, 2010

Steganalysis by subtractive pixel adjacency matrix.
IEEE Trans. Inf. Forensics Secur., 2010

Security and robustness constraints for spread-spectrum Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Considering security and robustness constraints for watermark-based Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

Ensemble Modeling with a Constrained Linear System of Leave-One-Out Outputs.
Proceedings of the 18th European Symposium on Artificial Neural Networks, 2010

2009
Reliable Steganalysis Using a Minimum Set of Samples and Features.
EURASIP J. Inf. Secur., 2009

Comparison of secure spread-spectrum modulations applied to still image watermarking.
Ann. des Télécommunications, 2009

Optimization of natural watermarking using transportation theory.
Proceedings of the Multimedia and Security Workshop, 2009

Two key estimation techniques for the broken arrows watermarking scheme.
Proceedings of the Multimedia and Security Workshop, 2009

On security threats for robust perceptual hashing.
Proceedings of the Media Forensics and Security I, 2009

2008
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2008

Broken Arrows.
EURASIP J. Inf. Secur., 2008

Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.
Proceedings of the Information Hiding, 10th International Workshop, 2008

A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Proceedings of the 16th European Symposium on Artificial Neural Networks, 2008

2007
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Advantages of Using Feature Selection Techniques on Steganalysis Schemes.
Proceedings of the Computational and Ambient Intelligence, 2007

Practical Security Analysis of Dirty Paper Trellis Watermarking.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
A Feature Selection Methodology for Steganalysis.
Proceedings of the Multimedia Content Representation, 2006

Achieving subspace or key security for WOA using natural or circular watermarking.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Natural Watermarking: A Secure Spread Spectrum Technique for WOA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Airborne remote sensing of vineyards for the detection of dead vine trees.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
An informed synchronization scheme for audio data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Improving LSB steganalysis using marginal and joint probabilistic distributions.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Enhanced audio data hiding synchronization using non linear filters.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
Color image watermarking using quaternion Fourier transform.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Geometrically invariant watermarking using feature points.
IEEE Trans. Image Process., 2002

Image watermarking: an evolution to content based approaches.
Pattern Recognit., 2002

Scrambling-based watermarking for MPEG-4 video.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness.
Proceedings of the 2001 International Conference on Image Processing, 2001

A new video-object watermarking scheme robust to object manipulation.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Robust watermarking based on the warping of predefined triangular patterns.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

1999
Geometrical and frequential watermarking scheme using similarities.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

1998
Using the Fractal Code to Watermark Images.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Self-similarity based image watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...