Steganalysis by subtractive pixel adjacency matrix T Pevny, P Bas, J Fridrich IEEE Transactions on information Forensics and Security 5 (2), 215-224, 2010 | 1160 | 2010 |
” Break our steganographic system”: the ins and outs of organizing BOSS P Bas, T Filler, T Pevný International workshop on information hiding, 59-70, 2011 | 970 | 2011 |
Using high-dimensional image models to perform highly undetectable steganography T Pevný, T Filler, P Bas International Workshop on Information Hiding, 161-177, 2010 | 853 | 2010 |
Merging Markov and DCT features for multi-class JPEG steganalysis T Pevny, J Fridrich Security, steganography, and watermarking of multimedia contents IX 6505, 28-40, 2007 | 648 | 2007 |
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities J Fridrich, T Pevný, J Kodovský Proceedings of the 9th workshop on Multimedia & security, 3-14, 2007 | 482 | 2007 |
Detection of double-compression in JPEG images for applications in steganography T Pevny, J Fridrich IEEE Transactions on information forensics and security 3 (2), 247-258, 2008 | 320 | 2008 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 278 | 2013 |
Illegitimate typosquatting detection with internet protocol information M Grill, J Kohout, M Kopp, T Pevny US Patent 10,491,614, 2019 | 205 | 2019 |
Loda: Lightweight on-line detector of anomalies T Pevný Machine Learning 102 (2), 275-304, 2016 | 186 | 2016 |
From blind to quantitative steganalysis T Pevny, J Fridrich, AD Ker IEEE Transactions on Information Forensics and Security 7 (2), 445-454, 2011 | 132 | 2011 |
The square root law of steganographic capacity AD Ker, T Pevný, J Kodovský, J Fridrich Proceedings of the 10th ACM workshop on Multimedia and security, 107-116, 2008 | 119 | 2008 |
Modern steganalysis can detect YASS J Kodovský, T Pevný, J Fridrich Media Forensics and Security II 7541, 754102, 2010 | 118 | 2010 |
Multiclass detector of current steganographic methods for JPEG format T Pevny, J Fridrich IEEE Transactions on Information Forensics and Security 3 (4), 635-650, 2008 | 101 | 2008 |
Benchmarking for steganography T Pevný, J Fridrich international workshop on information hiding, 251-267, 2008 | 89 | 2008 |
Towards multi-class blind steganalyzer for JPEG images T Pevný, J Fridrich International Workshop on Digital Watermarking, 39-53, 2005 | 89 | 2005 |
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? R Cogranne, V Sedighi, J Fridrich, T Pevný 2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015 | 82 | 2015 |
Multi-class blind steganalysis for JPEG images T Pevný, J Fridrich Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006 | 73 | 2006 |
Classification with costly features using deep reinforcement learning J Janisch, T Pevný, V Lisý Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 3959-3966, 2019 | 71 | 2019 |
The steganographer is the outlier: Realistic large-scale steganalysis AD Ker, T Pevný IEEE Transactions on information forensics and security 9 (9), 1424-1435, 2014 | 71 | 2014 |
Multiple instance learning for malware classification J Stiborek, T Pevný, M Rehák Expert Systems with Applications 93, 346-357, 2018 | 61 | 2018 |