Jan Butora

Orcid: 0000-0002-2540-1420

According to our database1, Jan Butora authored at least 26 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Finding Incompatible Blocks for Reliable JPEG Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2024

Size-Independent Reliable CNN for RJCA Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2024

Errorless Robust JPEG Steganography Using Outputs of JPEG Coders.
IEEE Trans. Dependable Secur. Comput., 2024

Dual JPEG Compatibility: a Reliable and Explainable Tool for Image Forensics.
CoRR, 2024

Finding Incompatibles Blocks for Reliable JPEG Steganalysis.
CoRR, 2024

The Adobe Hidden Feature and its Impact on Sensor Attribution.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Detection of the Adobe Pattern.
Proceedings of the 32nd European Signal Processing Conference, 2024

2023
Side-Informed Steganography for JPEG Images by Modeling Decompressed Images.
IEEE Trans. Inf. Forensics Secur., 2023

Compatibility and Timing Attacks for JPEG Steganalysis.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
Toward Reliable JPEG Steganalysis (at QF100).
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Fighting the Reverse JPEG Compatibility Attack: Pick your Side.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2021
Statistical models for image steganograhy: Explaining and replacing heuristics. (Modèles statistiques pour la stéganographie d'images / Modèles statistiques pour la stéganographie d'images: Expliquer et remplacer les heuristiques).
PhD thesis, 2021

CNN Steganalyzers Leverage Local Embedding Artifacts.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Improving EfficientNet for JPEG Steganalysis.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

How to Pretrain for Steganalysis.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Revisiting Perturbed Quantization.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Extending the Reverse JPEG Compatibility Attack to Double Compressed Images.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Reverse JPEG Compatibility Attack.
IEEE Trans. Inf. Forensics Secur., 2020

ImageNet Pre-trained CNNs for JPEG Steganalysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

Minimum Perturbation Cost Modulation for Side-Informed Steganography.
Proceedings of the Media Watermarking, 2020

Turning Cost-Based Steganography into Model-Based.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Detection of Diversified Stego Sources with CNNs.
Proceedings of the Media Watermarking, 2019

Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Effect of JPEG Quality on Steganographic Security.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019


  Loading...