Patrick Bas
Orcid: 0000-0003-0873-5872
According to our database1,
Patrick Bas
authored at least 111 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the 32nd European Signal Processing Conference, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the 30th European Signal Processing Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the 29th European Signal Processing Conference, 2021
2020
Signal Process. Image Commun., 2020
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the Working Notes Proceedings of the MediaEval 2020 Workshop, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
An Empirical Study of Steganography and Steganalysis of Color Images in the JPEG Domain.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Physical object authentication: Detection-theoretic comparison of natural and artificial randomness.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
2014
IEEE Trans. Image Process., 2014
Document authentication using graphical codes: reliable performance analysis and channel optimization.
EURASIP J. Inf. Secur., 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 22nd European Signal Processing Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the 20th European Signal Processing Conference, 2012
Document Authentication Using 2D Codes: Maximizing the Decoding Performance Using Statistical Inference.
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Neurocomputing, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution Matching.
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Considering security and robustness constraints for watermark-based Tardos fingerprinting.
Proceedings of the 2010 IEEE International Workshop on Multimedia Signal Processing, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
Proceedings of the 18th European Symposium on Artificial Neural Networks, 2010
2009
EURASIP J. Inf. Secur., 2009
Comparison of secure spread-spectrum modulations applied to still image watermarking.
Ann. des Télécommunications, 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Media Forensics and Security I, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes.
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the 16th European Symposium on Artificial Neural Networks, 2008
2007
Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking.
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Computational and Ambient Intelligence, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
2005
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
A Quantization Watermarking Technique Robust to Linear and Non-linear Valumetric Distortions Using a Fractal Set of Floating Quantizers.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004
2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2002
IEEE Trans. Image Process., 2002
Pattern Recognit., 2002
Proceedings of the 11th European Signal Processing Conference, 2002
2001
A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness.
Proceedings of the 2001 International Conference on Image Processing, 2001
Proceedings of the 2001 International Conference on Image Processing, 2001
2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
1998
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998
Proceedings of the 9th European Signal Processing Conference, 1998