Rémi Cogranne

Orcid: 0000-0002-4205-4694

According to our database1, Rémi Cogranne authored at least 81 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S.
J. Netw. Syst. Manag., 2023

Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability.
IEEE Trans. Inf. Forensics Secur., 2022

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
IEEE Trans. Inf. Forensics Secur., 2022

The Cover Source Mismatch Problem in Deep-Learning Steganalysis.
Proceedings of the 30th European Signal Processing Conference, 2022

UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
IEEE Trans. Inf. Forensics Secur., 2021

A Fully Automatic and Efficient Methodology for Peptide Activity Identification Using Their 3D Conformations.
IEEE Access, 2021

Assessing the Threats Targeting Low Latency Traffic: the Case of L4S.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Effects and solutions of Cover-Source Mismatch in image steganalysis.
Signal Process. Image Commun., 2020

Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Ontology-Based Approach for Designing User Interfaces: Application for Rescue Actors.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020

JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

JPEG Steganography with Side Information from the Processing Pipeline.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Selection-Channel-Aware Reverse JPEG Compatibility for Highly Reliable Steganalysis of JPEG Images.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019

A new Edge Detector Based on Parametric Surface Model: Regression Surface Descriptor.
CoRR, 2019

Estimation of Primary Quantization Steps in Double-Compressed JPEG Images Using a Statistical Model of Discrete Cosine Transform.
IEEE Access, 2019

Modelling Interactions in Rescue Operations.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Are we there yet?
Proceedings of the Media Watermarking, 2019

Situation Representation and Awareness for Rescue Operations.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments.
IEEE Trans. Netw. Serv. Manag., 2018

Statistical decision methods in the presence of linear nuisance parameters and despite imaging system heteroscedastic noise: Application to wheel surface inspection.
Signal Process., 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Secur. Commun. Networks, 2018

A Security Monitoring Plane for Named Data Networking Deployment.
IEEE Commun. Mag., 2018

Non-Stationary Process Monitoring for Change-Point Detection With Known Accuracy: Application to Wheels Coating Inspection.
IEEE Access, 2018

Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Steganalysis into the Wild: How to Define a Source?
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Data Interpretation Support in Rescue Operations: Application for French Firefighters.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
JPEG Quantization Step Estimation and Its Applications to Digital Image Forensics.
IEEE Trans. Inf. Forensics Secur., 2017

Individual camera device identification from JPEG images.
Signal Process. Image Commun., 2017

Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

A decentralized approach for adaptive workload estimation in virtualized environments.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Practical strategies for content-adaptive batch steganography and pooled steganalysis.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Wheels coating process monitoring in the presence of nuisance parameters using sequential change-point detection method.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Content-Adaptive Steganography by Minimizing Statistical Detectability.
IEEE Trans. Inf. Forensics Secur., 2016

Camera model identification based on the generalized noise model in natural images.
Digit. Signal Process., 2016

Toss that BOSSbase, Alice!
Proceedings of the Media Watermarking, 2016

Fully automatic detection of anomalies on wheels surface using an adaptive accurate model and hypothesis testing theory.
Proceedings of the 24th European Signal Processing Conference, 2016

On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory.
IEEE Trans. Inf. Forensics Secur., 2015

Generalized signal-dependent noise model and parameter estimation for natural images.
Signal Process., 2015

Steganalysis of JSteg algorithm using hypothesis testing theory.
EURASIP J. Inf. Secur., 2015

Camera model identification based on DCT coefficient statistics.
Digit. Signal Process., 2015

Detection of interest flooding attacks in Named Data Networking using hypothesis testing.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

A sequential method for online steganalysis.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model.
Proceedings of the Media Watermarking, 2015

An optimal statistical test for robust detection against interest flooding attacks in CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Source camera device identification based on raw images.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm.
IEEE Trans. Image Process., 2014

Camera Model Identification Based on the Heteroscedastic Noise Model.
IEEE Trans. Image Process., 2014

Statistical detection of data hidden in least significant bits of clipped images.
Signal Process., 2014

A local adaptive model of natural images for almost optimal detection of hidden data.
Signal Process., 2014

Statistical detection of defects in radiographic images using an adaptive parametric model.
Signal Process., 2014

Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results.
Digit. Signal Process., 2014

Rich model for Steganalysis of color images.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Selection-channel-aware rich model for Steganalysis of digital images.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Theoretical model of the FLD ensemble classifier based on hypothesis testing theory.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Optimal detector for camera model identification based on an accurate model of DCT coefficients.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014

Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Statistical detection of Jsteg steganography using hypothesis testing theory.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
An Asymptotically Uniformly Most Powerful Test for LSB Matching Detection.
IEEE Trans. Inf. Forensics Secur., 2013

Application of hypothesis testing theory for optimal detection of LSB matching data hiding.
Signal Process., 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients.
Proceedings of the IEEE International Conference on Image Processing, 2013

Asymptotically optimal detection of LSB matching data hiding.
Proceedings of the IEEE International Conference on Image Processing, 2013

A new tomography model for almost optimal detection of anomalies.
Proceedings of the IEEE International Conference on Image Processing, 2013

Image authentication by statistical analysis.
Proceedings of the 21st European Signal Processing Conference, 2013

2012
Détection statistique d'informations cachées dans une image naturelle à partir d'un modèle physique. (Statistical detection of information hidden in a natural image using a physical model).
PhD thesis, 2012

Statistical detection of LSB matching in the presence of nuisance parameters.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012

Statistical Detection of LSB Matching Using Hypothesis Testing Theory.
Proceedings of the Information Hiding - 14th International Conference, 2012

Hidden information detection based on quantized Laplacian distribution.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Camera model identification Based on hypothesis testing theory.
Proceedings of the 20th European Signal Processing Conference, 2012

Statistical detection of information hiding based on adjacent pixels difference.
Proceedings of the 20th European Signal Processing Conference, 2012

2011
Statistical decision by using quantized observations.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Statistical Decision Methods in Hidden Information Detection.
Proceedings of the Information Hiding - 13th International Conference, 2011

A Cover Image Model For Reliable Steganalysis.
Proceedings of the Information Hiding - 13th International Conference, 2011


  Loading...