1 code implementation • 6 Oct 2023 • Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný
By exploring a grid of processing pipelines fostering CSM, we discovered a geometrical metric based on the chordal distance between subspaces spanned by DCTr features, that exhibits high correlation with operational regret while being not affected by the cover-stego balance.
1 code implementation • 7 Nov 2022 • Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný
Within an operational framework, covers used by a steganographer are likely to come from different sensors and different processing pipelines than the ones used by researchers for training their steganalysis models.
1 code implementation • WIFS : IEEE International Workshop on Information Forensics and Security 2021 • Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas
Domain adaptation is a major issue for doing practical forensics.