Follow
Patrick Bas
Patrick Bas
CNRS CRIStAL
Verified email at centralelille.fr - Homepage
Title
Cited by
Cited by
Year
Steganalysis by subtractive pixel adjacency matrix
T Pevný, P Bas, J Fridrich
Proceedings of the 11th ACM workshop on Multimedia and security, 75-84, 2009
12432009
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
Information Hiding: 13th International Conference, IH 2011, Prague, Czech …, 2011
11102011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
Information Hiding: 12th International Conference, IH 2010, Calgary, AB …, 2010
9552010
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
8592009
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7412002
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2952013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2412011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
2012003
BOWS-2
P Bas, T Furon
1182007
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
1032008
The ALASKA steganalysis challenge: A first step towards steganalysis
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
992019
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
902000
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
891998
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
812008
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
732002
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008 (1), 1-13, 2008
712008
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
592010
Image database of BOWS-2
P Bas, T Furon
Accessed: Jun 20, 2016-2017, 2017
582017
A feature selection methodology for steganalysis
Y Miche, B Roue, A Lendasse, P Bas
Multimedia Content Representation, Classification and Security …, 2006
562006
Méthodes de tatouage d'images fondées sur le contenu
P Bas
Éditeur inconnu, 2000
562000
The system can't perform the operation now. Try again later.
Articles 1–20