What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Patrick Bas
Google Scholar
41
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ih
Effect of Acquisition Noise Outliers on Steganalysis.
Edgar Kaziakhmedov
Jessica J. Fridrich
Patrick Bas
2024
journals/tifs
Finding Incompatible Blocks for Reliable JPEG Steganalysis.
Etienne Levecque
Jan Butora
Patrick Bas
2024
journals/tifs
Size-Independent Reliable CNN for RJCA Steganalysis.
Jan Butora
Patrick Bas
2024
conf/ih
Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch.
Antoine Mallet
Patrick Bas
Rémi Cogranne
2024
conf/ih
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis.
Antoine Mallet
Rémi Cogranne
Patrick Bas
2024
conf/ih
The Adobe Hidden Feature and its Impact on Sensor Attribution.
Jan Butora
Patrick Bas
2023
journals/tifs
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images.
Jan Butora
Patrick Bas
2023
conf/ih
Compatibility and Timing Attacks for JPEG Steganalysis.
Etienne Levecque
Patrick Bas
Jan Butora
2023
conf/ih
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Jan Butora
Patrick Bas
Rémi Cogranne
2022
journals/tifs
Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability.
Quentin Giboulot
Patrick Bas
Rémi Cogranne
2022
journals/tifs
Backpack: A Backpropagable Adversarial Embedding Scheme.
Solène Bernard
Patrick Bas
John Klein
Tomás Pevný
2022
journals/tifs
Generating Adversarial Images in Quantized Domains.
Benoît Bonnet
Teddy Furon
Patrick Bas
2022
journals/tifs
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
Rémi Cogranne
Quentin Giboulot
Patrick Bas
2022
conf/ih
Fighting the Reverse JPEG Compatibility Attack: Pick your Side.
Jan Butora
Patrick Bas
2021
journals/tifs
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
Quentin Giboulot
Rémi Cogranne
Patrick Bas
2021
journals/tifs
Natural Steganography in JPEG Domain With a Linear Development Pipeline.
Théo Taburet
Patrick Bas
Wadih Sawaya
Jessica J. Fridrich
2021
journals/tifs
Explicit Optimization of min max Steganographic Game.
Solène Bernard
Patrick Bas
John Klein
Tomás Pevný
2021
conf/ih
Optimizing Additive Approximations of Non-additive Distortion Functions.
Solène Bernard
Patrick Bas
Tomás Pevný
John Klein
2020
conf/ih
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis.
Mehdi Yedroudj
Marc Chaumont
Frédéric Comby
Ahmed Oulad Amara
Patrick Bas
2020
conf/ih
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Rémi Cogranne
Quentin Giboulot
Patrick Bas
2020
conf/ih
What if Adversarial Samples were Digital Images?
Benoît Bonnet
Teddy Furon
Patrick Bas
2020
conf/ih
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Théo Taburet
Patrick Bas
Wadih Sawaya
Rémi Cogranne
2019
conf/ih
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Théo Taburet
Patrick Bas
Jessica J. Fridrich
Wadih Sawaya
2019
conf/ih
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis.
Rémi Cogranne
Quentin Giboulot
Patrick Bas
2019
conf/ih
Exploiting Adversarial Embeddings for Better Steganography.
Solène Bernard
Tomás Pevný
Patrick Bas
John Klein
2018
conf/ih
Facing the Cover-Source Mismatch on JPHide using Training-Set Design.
Dirk Borghys
Patrick Bas
Helena Bruyninckx
2016
conf/ih
Rethinking Optimal Embedding.
Andrew D. Ker
Tomás Pevný
Patrick Bas
2013
journals/tifs
A New Measure of Watermarking Security: The Effective Key Length.
Patrick Bas
Teddy Furon
2013
journals/tifs
Impacts of Watermarking Security on Tardos-Based Fingerprinting.
Benjamin Mathon
Patrick Bas
François Cayre
Benoît Macq
2013
conf/ih
Document authentication using graphical codes: impacts of the channel model.
Anh Thu Phan Ho
Bao An Mai Hoang
Wadih Sawaya
Patrick Bas
2013
conf/ih
Moving steganography and steganalysis from the laboratory into the real world.
Andrew D. Ker
Patrick Bas
Rainer Böhme
Rémi Cogranne
Scott Craver
Tomás Filler
Jessica J. Fridrich
Tomás Pevný
2012
conf/ih
A New Measure of Watermarking Security Applied on QIM.
Teddy Furon
Patrick Bas
2011
conf/ih
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching.
Patrick Bas
2011
conf/ih
"Break Our Steganographic System": The Ins and Outs of Organizing BOSS.
Patrick Bas
Tomás Filler
Tomás Pevný
2010
journals/tifs
Steganalysis by subtractive pixel adjacency matrix.
Tomás Pevný
Patrick Bas
Jessica J. Fridrich
2010
conf/ih
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.
Tomás Pevný
Tomás Filler
Patrick Bas
2008
journals/tifs
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding.
François Cayre
Patrick Bas
2008
conf/ih
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding.
Benjamin Mathon
Patrick Bas
François Cayre
Fernando Pérez-González
2007
conf/ih
Practical Security Analysis of Dirty Paper Trellis Watermarking.
Patrick Bas
Gwenaël J. Doërr
2006
conf/ih
Natural Watermarking: A Secure Spread Spectrum Technique for WOA.
Patrick Bas
François Cayre
2005
conf/ih
A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
Patrick Bas
Coauthors
Ahmed Oulad Amara
(1)
Andrew D. Ker
(2)
Anh Thu Phan Ho
(1)
Antoine Mallet
(2)
Bao An Mai Hoang
(1)
Benjamin Mathon
(2)
Benoît Bonnet
(2)
Benoît Macq
(1)
Dirk Borghys
(1)
Edgar Kaziakhmedov
(1)
Etienne Levecque
(2)
Fernando Pérez-González
(1)
François Cayre
(4)
Frédéric Comby
(1)
Gwenaël J. Doërr
(1)
Helena Bruyninckx
(1)
Jan Butora
(7)
Jessica J. Fridrich
(5)
John Klein
(4)
Marc Chaumont
(1)
Mehdi Yedroudj
(1)
Patrick Bas
(41)
Quentin Giboulot
(5)
Rainer Böhme
(1)
Rémi Cogranne
(10)
Scott Craver
(1)
Solène Bernard
(4)
Teddy Furon
(4)
Théo Taburet
(3)
Tomás Filler
(3)
Tomás Pevný
(9)
Wadih Sawaya
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to