Patrick Bas

According to our database1, Patrick Bas authored at least 78 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Natural Steganography in JPEG Domain With a Linear Development Pipeline.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Effects and solutions of Cover-Source Mismatch in image steganalysis.
Signal Process. Image Commun., 2020

Natural Steganography in JPEG Domain with a Linear Development Pipeline.
CoRR, 2020

Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

What if Adversarial Samples were Digital Images?
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

JPEG Steganography with Side Information from the Processing Pipeline.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019

Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Exploiting Adversarial Embeddings for Better Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Steganalysis into the Wild: How to Define a Source?
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Natural Steganography in JPEG Compressed Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Facing the Cover-Source Mismatch on JPHide using Training-Set Design.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

2017
An embedding mechanism for natural steganography after down-sampling.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
Natural Steganography: cover-source switching for better steganography.
CoRR, 2016

Steganography via cover-source switching.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Rare event probability estimation using information projection.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Rethinking Optimal Embedding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2014
Optimal Transport for Secure Spread-Spectrum Watermarking of Still Images.
IEEE Trans. Image Process., 2014

Document authentication using graphical codes: reliable performance analysis and channel optimization.
EURASIP J. Inf. Secur., 2014

Image model and printed document authentication: A theoretical analysis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Authentication using graphical codes: Optimisation of the print and scan channels.
Proceedings of the 22nd European Signal Processing Conference, 2014

2013
Impacts of Watermarking Security on Tardos-Based Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2013

A New Measure of Watermarking Security: The Effective Key Length.
IEEE Trans. Inf. Forensics Secur., 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Document authentication using graphical codes: impacts of the channel model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
The Effective Key Length of Watermarking Schemes
CoRR, 2012

A New Measure of Watermarking Security Applied on QIM.
Proceedings of the Information Hiding - 14th International Conference, 2012

Practical key length of watermarking systems.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Key length estimation of zero-bit watermarking schemes.
Proceedings of the 20th European Signal Processing Conference, 2012

Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference.
Proceedings of the Communications and Multimedia Security, 2012

Are 128 Bits Long Keys Possible in Watermarking?
Proceedings of the Communications and Multimedia Security, 2012

2011
TROP-ELM: A double-regularized ELM using LARS and Tikhonov regularization.
Neurocomputing, 2011

"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Proceedings of the Information Hiding - 13th International Conference, 2011

Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching.
Proceedings of the Information Hiding - 13th International Conference, 2011

Informed secure watermarking using optimal transport.
Proceedings of the IEEE International Conference on Acoustics, 2011

2010
OP-ELM: optimally pruned extreme learning machine.
IEEE Trans. Neural Networks, 2010

Steganalysis by subtractive pixel adjacency matrix.
IEEE Trans. Inf. Forensics Secur., 2010

Security and robustness constraints for spread-spectrum Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Considering security and robustness constraints for watermark-based Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010

Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

Ensemble Modeling with a Constrained Linear System of Leave-One-Out Outputs.
Proceedings of the ESANN 2010, 2010

2009
Reliable Steganalysis Using a Minimum Set of Samples and Features.
EURASIP J. Inf. Secur., 2009

Comparison of secure spread-spectrum modulations applied to still image watermarking.
Ann. des Télécommunications, 2009

Optimization of natural watermarking using transportation theory.
Proceedings of the Multimedia and Security Workshop, 2009

Two key estimation techniques for the broken arrows watermarking scheme.
Proceedings of the Multimedia and Security Workshop, 2009

On security threats for robust perceptual hashing.
Proceedings of the Media Forensics and Security I, 2009

2008
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2008

Broken Arrows.
EURASIP J. Inf. Secur., 2008

Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.
Proceedings of the Information Hiding, 10th International Workshop, 2008

A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Proceedings of the ESANN 2008, 2008

2007
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Advantages of Using Feature Selection Techniques on Steganalysis Schemes.
Proceedings of the Computational and Ambient Intelligence, 2007

Practical Security Analysis of Dirty Paper Trellis Watermarking.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
A Feature Selection Methodology for Steganalysis.
Proceedings of the Multimedia Content Representation, 2006

Achieving subspace or key security for WOA using natural or circular watermarking.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Natural Watermarking: A Secure Spread Spectrum Technique for WOA.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Airborne remote sensing of vineyards for the detection of dead vine trees.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

2004
An informed synchronization scheme for audio data hiding.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Improving LSB steganalysis using marginal and joint probabilistic distributions.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Enhanced audio data hiding synchronization using non linear filters.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
Color image watermarking using quaternion Fourier transform.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Geometrically invariant watermarking using feature points.
IEEE Trans. Image Process., 2002

Image watermarking: an evolution to content based approaches.
Pattern Recognit., 2002

Scrambling-based watermarking for MPEG-4 video.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness.
Proceedings of the 2001 International Conference on Image Processing, 2001

A new video-object watermarking scheme robust to object manipulation.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
Robust watermarking based on the warping of predefined triangular patterns.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

1999
Geometrical and frequential watermarking scheme using similarities.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

1998
Using the Fractal Code to Watermark Images.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

Self-similarity based image watermarking.
Proceedings of the 9th European Signal Processing Conference, 1998


  Loading...