Solène Bernard
YOU?
Author Swipe
View article: Backpack: A Backpropagable Adversarial Embedding Scheme
Backpack: A Backpropagable Adversarial Embedding Scheme Open
A min max protocol offers a general method to automatically optimize steganographic algorithm against a wide class of steganalytic detectors. The quality of the resulting steganograhic algorithm depends on the ability to find an “adversari…
View article: Backpack:a Backpropagable Adversarial Embedding Scheme
Backpack:a Backpropagable Adversarial Embedding Scheme Open
A min max protocol offers a general method to automatically optimize steganographic algorithm against a wide class of steganalytic detectors. The quality of the resulting steganograhic algorithm depends on the ability to find an "adversari…
View article: Digital images steganography using adversarial embedding
Digital images steganography using adversarial embedding Open
La stéganographie est une technique qu’Alice peut utiliser pour envoyer secrètement un message à Bob.Cela consiste à dissimuler discrètement un message au sein d’un contenu public sans éveiller les soupçons du stéganalyste Eve, qui observe…
View article: Adversarial Embedding in the JPEG Domain Induces Correlations Between DCT Coefficients to Remove Blocking Artifacts Generated by Additive Embedding
Adversarial Embedding in the JPEG Domain Induces Correlations Between DCT Coefficients to Remove Blocking Artifacts Generated by Additive Embedding Open
This short note presents an analysis of the principle of adversarial embedding (a.k.a. adv-emb) in steganography as presented in [4]. By analyzing the covariance matrix of the stego signal of quantized JPEG coefficients (i.e. the signal ad…
View article: Explicit Optimization of min max Steganographic Game
Explicit Optimization of min max Steganographic Game Open
International audience
View article: Exploiting Adversarial Embeddings for Better Steganography
Exploiting Adversarial Embeddings for Better Steganography Open
International audience