Patrick Bas
Patrick Bas
CNRS CRIStAL
Verified email at centralelille.fr - Homepage
Title
Cited by
Cited by
Year
Steganalysis by subtractive pixel adjacency matrix
T Pevny, P Bas, J Fridrich
IEEE Transactions on information Forensics and Security 5 (2), 215-224, 2010
9482010
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
7492009
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7102002
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
6832011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
International Workshop on Information Hiding, 161-177, 2010
6532010
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
2582005
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2372013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2152011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
1602003
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
922008
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
831998
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
822000
BOWS-2
P Bas, T Furon
782007
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
762008
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
662008
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
662002
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
542010
A new video-object watermarking scheme robust to object manipulation
P Bas, B Macq
Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001
512001
A feature selection methodology for steganalysis
Y Miche, B Roue, A Lendasse, P Bas
International Workshop on Multimedia Content Representation, Classification …, 2006
502006
Méthodes de tatouage d'images fondées sur le contenu
P Bas
492000
The system can't perform the operation now. Try again later.
Articles 1–20