Personal information

No personal information available

Activities

Works (7)

Finding Incompatible Blocks for Reliable JPEG Steganalysis

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Etienne Levecque; Jan Butora; Patrick Bas
Source: check_circle
Crossref

Size-Independent Reliable CNN for RJCA Steganalysis

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Jan Butora; Patrick Bas
Source: check_circle
Crossref

Errorless Robust JPEG Steganography Using Outputs of JPEG Coders

IEEE Transactions on Dependable and Secure Computing
2024-07 | Journal article
Contributors: Jan Butora; Pauline Puteaux; Patrick Bas
Source: check_circle
Crossref

The Adobe Hidden Feature and its Impact on Sensor Attribution

2024-06-24 | Conference paper
Contributors: Jan Butora; Patrick Bas
Source: check_circle
Crossref

Side-Informed Steganography for JPEG Images by Modeling Decompressed Images

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Jan Butora; Patrick Bas
Source: check_circle
Crossref

Compatibility and Timing Attacks for JPEG Steganalysis

2023-06-28 | Conference paper
Contributors: Etienne Levecque; Patrick Bas; Jan Butora
Source: check_circle
Crossref

Reverse JPEG Compatibility Attack

IEEE Transactions on Information Forensics and Security
2020 | Journal article
Contributors: Jan Butora; Jessica Fridrich
Source: check_circle
Crossref