Quentin Giboulot

Orcid: 0000-0002-0277-5999

According to our database1, Quentin Giboulot authored at least 15 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Non-Zero-Sum Game of Steganography in Heterogeneous Environments.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Statistical Steganography based on a Sensor Noise Model using the Processing Pipeline. (Stéganographie statistique fondée sur un modèle de bruit utilisant la chaine de développement d'image).
PhD thesis, 2022

Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
IEEE Trans. Inf. Forensics Secur., 2022

The Cover Source Mismatch Problem in Deep-Learning Steganalysis.
Proceedings of the 30th European Signal Processing Conference, 2022

2021
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Effects and solutions of Cover-Source Mismatch in image steganalysis.
Signal Process. Image Commun., 2020

Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

JPEG Steganography with Side Information from the Processing Pipeline.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Payload Scaling for Adaptive Steganography: An Empirical Study.
IEEE Signal Process. Lett., 2019

Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Steganalysis into the Wild: How to Define a Source?
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018


  Loading...