Seguir
Patrick Bas
Patrick Bas
CNRS CRIStAL
Dirección de correo verificada de centralelille.fr - Página principal
Título
Citado por
Citado por
Año
Steganalysis by subtractive pixel adjacency matrix
T Pevný, P Bas, J Fridrich
Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009
13492009
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
13062011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
10882010
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
8972009
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7652002
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3262013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2652011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
2182003
BOWS-2
P Bas, T Furon
1442007
The ALASKA steganalysis challenge: A first step towards steganalysis
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
1412019
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
1092008
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
972017
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
922000
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
851998
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
842008
ALASKA# 2: Challenging academic research on steganalysis with realistic images
R Cogranne, Q Giboulot, P Bas
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
772020
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
742008
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
742002
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
642010
Steganography by minimizing statistical detectability: The cases of JPEG and color images
R Cogranne, Q Giboulot, P Bas
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
612020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20