Rémi Cogranne
Orcid: 0000-0002-4205-4694
According to our database1,
Rémi Cogranne
authored at least 85 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on lm2s.utt.fr
On csauthors.net:
Bibliography
2024
EURASIP J. Inf. Secur., December, 2024
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S.
J. Netw. Syst. Manag., 2023
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector.
IEEE Trans. Inf. Forensics Secur., 2022
Proceedings of the 30th European Signal Processing Conference, 2022
UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off.
IEEE Trans. Inf. Forensics Secur., 2021
A Fully Automatic and Efficient Methodology for Peptide Activity Identification Using Their 3D Conformations.
IEEE Access, 2021
Proceedings of the 17th International Conference on Network and Service Management, 2021
2020
Signal Process. Image Commun., 2020
Synchronization Minimizing Statistical Detectability for Side-Informed JPEG Steganography.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Ontology-Based Approach for Designing User Interfaces: Application for Rescue Actors.
Proceedings of the 17th International Conference on Information Systems for Crisis Response and Management, 2020
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Selection-Channel-Aware Reverse JPEG Compatibility for Highly Reliable Steganalysis of JPEG Images.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2019
A new Edge Detector Based on Parametric Surface Model: Regression Surface Descriptor.
CoRR, 2019
Estimation of Primary Quantization Steps in Double-Compressed JPEG Images Using a Statistical Model of Discrete Cosine Transform.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments.
IEEE Trans. Netw. Serv. Manag., 2018
Statistical decision methods in the presence of linear nuisance parameters and despite imaging system heteroscedastic noise: Application to wheel surface inspection.
Signal Process., 2018
Secur. Commun. Networks, 2018
IEEE Commun. Mag., 2018
Non-Stationary Process Monitoring for Change-Point Detection With Known Accuracy: Application to Wheels Coating Inspection.
IEEE Access, 2018
Towards a security monitoring plane for named data networking and its application against content poisoning attack.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Data Interpretation Support in Rescue Operations: Application for French Firefighters.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Signal Process. Image Commun., 2017
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
A decentralized approach for adaptive workload estimation in virtualized environments.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Practical strategies for content-adaptive batch steganography and pooled steganalysis.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Wheels coating process monitoring in the presence of nuisance parameters using sequential change-point detection method.
Proceedings of the 25th European Signal Processing Conference, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Digit. Signal Process., 2016
Fully automatic detection of anomalies on wheels surface using an adaptive accurate model and hypothesis testing theory.
Proceedings of the 24th European Signal Processing Conference, 2016
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016
2015
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory.
IEEE Trans. Inf. Forensics Secur., 2015
Generalized signal-dependent noise model and parameter estimation for natural images.
Signal Process., 2015
EURASIP J. Inf. Secur., 2015
Digit. Signal Process., 2015
Detection of interest flooding attacks in Named Data Networking using hypothesis testing.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model.
Proceedings of the Media Watermarking, 2015
An optimal statistical test for robust detection against interest flooding attacks in CCN.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015
2014
Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm.
IEEE Trans. Image Process., 2014
IEEE Trans. Image Process., 2014
Signal Process., 2014
A local adaptive model of natural images for almost optimal detection of hidden data.
Signal Process., 2014
Statistical detection of defects in radiographic images using an adaptive parametric model.
Signal Process., 2014
Hidden information detection using decision theory and quantized samples: Methodology, difficulties and results.
Digit. Signal Process., 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Optimal detector for camera model identification based on an accurate model of DCT coefficients.
Proceedings of the IEEE 16th International Workshop on Multimedia Signal Processing, 2014
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Application of hypothesis testing theory for optimal detection of LSB matching data hiding.
Signal Process., 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Steganalysis of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients.
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the 21st European Signal Processing Conference, 2013
2012
Détection statistique d'informations cachées dans une image naturelle à partir d'un modèle physique. (Statistical detection of information hidden in a natural image using a physical model).
PhD thesis, 2012
Proceedings of the IEEE Statistical Signal Processing Workshop, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the 20th European Signal Processing Conference, 2012
Proceedings of the 20th European Signal Processing Conference, 2012
2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011