Tomas Pevny
Tomas Pevny
Artificial Intelligence Center, Czech Technical University in Prague
Verified email at fel.cvut.cz - Homepage
Title
Cited by
Cited by
Year
Steganalysis by subtractive pixel adjacency matrix
T Pevny, P Bas, J Fridrich
IEEE Transactions on information Forensics and Security 5 (2), 215-224, 2010
10742010
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
8402011
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
International Workshop on Information Hiding, 161-177, 2010
7642010
Merging Markov and DCT features for multi-class JPEG steganalysis
T Pevny, J Fridrich
Security, Steganography, and Watermarking of Multimedia Contents IX 6505, 650503, 2007
6352007
Estimation of primary quantization matrix in double compressed JPEG images
J Lukáš, J Fridrich
Proc. Digital forensic research workshop, 5-8, 2003
4612003
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
J Fridrich, T Pevný, J Kodovský
Proceedings of the 9th workshop on Multimedia & security, 3-14, 2007
4542007
Detection of double-compression in JPEG images for applications in steganography
T Pevny, J Fridrich
IEEE Transactions on information forensics and security 3 (2), 247-258, 2008
3102008
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2612013
Illegitimate typosquatting detection with internet protocol information
M Grill, J Kohout, M Kopp, T Pevny
US Patent 10,491,614, 2019
1492019
Loda: Lightweight on-line detector of anomalies
T Pevný
Machine Learning 102 (2), 275-304, 2016
1342016
From blind to quantitative steganalysis
T Pevny, J Fridrich, AD Ker
IEEE Transactions on Information Forensics and Security 7 (2), 445-454, 2011
1302011
The square root law of steganographic capacity
AD Ker, T Pevný, J Kodovský, J Fridrich
Proceedings of the 10th ACM workshop on Multimedia and security, 107-116, 2008
1152008
Modern steganalysis can detect YASS
J Kodovský, T Pevný, J Fridrich
Media Forensics and Security II 7541, 754102, 2010
1132010
Multiclass detector of current steganographic methods for JPEG format
T Pevny, J Fridrich
IEEE Transactions on Information Forensics and Security 3 (4), 635-650, 2008
992008
Towards multi-class blind steganalyzer for JPEG images
T Pevný, J Fridrich
International Workshop on Digital Watermarking, 39-53, 2005
892005
Benchmarking for steganography
T Pevný, J Fridrich
international workshop on information hiding, 251-267, 2008
882008
Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?
R Cogranne, V Sedighi, J Fridrich, T Pevný
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
732015
Multi-class blind steganalysis for JPEG images
T Pevný, J Fridrich
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
732006
The steganographer is the outlier: Realistic large-scale steganalysis
AD Ker, T Pevný
IEEE Transactions on information forensics and security 9 (9), 1424-1435, 2014
682014
Classification with costly features using deep reinforcement learning
J Janisch, T Pevný, V Lisý
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 3959-3966, 2019
572019
The system can't perform the operation now. Try again later.
Articles 1–20