Steganalysis by subtractive pixel adjacency matrix T Pevný, P Bas, J Fridrich Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009 | 1229 | 2009 |
” Break our steganographic system”: the ins and outs of organizing BOSS P Bas, T Filler, T Pevný Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011 | 1091 | 2011 |
Using high-dimensional image models to perform highly undetectable steganography T Pevný, T Filler, P Bas Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010 | 939 | 2010 |
Merging Markov and DCT features for multi-class JPEG steganalysis T Pevny, J Fridrich Security, steganography, and watermarking of multimedia contents IX 6505, 28-40, 2007 | 667 | 2007 |
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities J Fridrich, T Pevný, J Kodovský Proceedings of the 9th workshop on Multimedia & security, 3-14, 2007 | 495 | 2007 |
Detection of double-compression in JPEG images for applications in steganography T Pevny, J Fridrich IEEE Transactions on information forensics and security 3 (2), 247-258, 2008 | 328 | 2008 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 292 | 2013 |
Illegitimate typosquatting detection with internet protocol information M Grill, J Kohout, M Kopp, T Pevny US Patent 10,491,614, 2019 | 254 | 2019 |
Loda: Lightweight on-line detector of anomalies T Pevný Machine Learning 102, 275-304, 2016 | 252 | 2016 |
From blind to quantitative steganalysis T Pevny, J Fridrich, AD Ker IEEE Transactions on Information Forensics and Security 7 (2), 445-454, 2011 | 134 | 2011 |
The square root law of steganographic capacity AD Ker, T Pevný, J Kodovský, J Fridrich Proceedings of the 10th ACM workshop on Multimedia and security, 107-116, 2008 | 126 | 2008 |
Modern steganalysis can detect YASS J Kodovský, T Pevný, J Fridrich Media Forensics and Security II 7541, 9-19, 2010 | 122 | 2010 |
Multiclass detector of current steganographic methods for JPEG format T Pevny, J Fridrich IEEE Transactions on Information Forensics and Security 3 (4), 635-650, 2008 | 105 | 2008 |
Benchmarking for steganography T Pevný, J Fridrich Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008 | 94 | 2008 |
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? R Cogranne, V Sedighi, J Fridrich, T Pevný 2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015 | 89 | 2015 |
Towards multi-class blind steganalyzer for JPEG images T Pevný, J Fridrich Digital Watermarking: 4th International Workshop, IWDW 2005, Siena, Italy …, 2005 | 89 | 2005 |
Classification with costly features using deep reinforcement learning J Janisch, T Pevný, V Lisý Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 3959-3966, 2019 | 85 | 2019 |
The steganographer is the outlier: Realistic large-scale steganalysis AD Ker, T Pevný IEEE Transactions on information forensics and security 9 (9), 1424-1435, 2014 | 79 | 2014 |
Multiple instance learning for malware classification J Stiborek, T Pevný, M Rehák Expert Systems with Applications 93, 346-357, 2018 | 71 | 2018 |
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing M Grill, T Pevný, M Rehak Journal of Computer and System Sciences 83 (1), 43-57, 2017 | 66 | 2017 |