Follow
Patrick Bas
Patrick Bas
CNRS CRIStAL
Verified email at centralelille.fr - Homepage
Title
Cited by
Cited by
Year
Steganalysis by subtractive pixel adjacency matrix
T Pevný, P Bas, J Fridrich
Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009
13562009
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
13172011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
11002010
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
8982009
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7682002
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
3282013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2652011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
2192003
BOWS-2
P Bas, T Furon
1452007
The ALASKA steganalysis challenge: A first step towards steganalysis
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
1422019
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
1092008
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
982017
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
922000
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
851998
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
842008
ALASKA# 2: Challenging academic research on steganalysis with realistic images
R Cogranne, Q Giboulot, P Bas
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
802020
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
742008
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
742002
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
642010
Steganography by minimizing statistical detectability: The cases of JPEG and color images
R Cogranne, Q Giboulot, P Bas
Proceedings of the 2020 ACM workshop on information hiding and multimedia …, 2020
622020
The system can't perform the operation now. Try again later.
Articles 1–20