P. Bas, T. Filler, and T. Pevn´ypevn´y, ???Break Our Steganographic System???: The Ins and Outs of Organizing BOSS, pp.59-70, 2011.
DOI : 10.1007/978-3-642-16435-4_13

J. Couchot, R. Couturier, and C. Guyeux, STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost, annals of telecommunications - annales des t??l??communications, vol.13, issue.5, pp.441-449, 2015.
DOI : 10.1007/3-540-45496-9_21

URL : https://hal.archives-ouvertes.fr/hal-01303419

T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. J. Fridrich, Selectionchannel-aware rich model for steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, pp.48-53, 2014.
DOI : 10.1109/wifs.2014.7084302

J. Fridrich and J. Kodovsk, Multivariate gaussian model for designing additive distortion for steganography, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2949-2953, 2013.
DOI : 10.1109/ICASSP.2013.6638198

URL : http://www.ws.binghamton.edu/fridrich/Research/MG.pdf

J. J. Fridrich and J. Kodovsk´ykodovsk´y, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1687-417, 2014.
DOI : 10.1007/978-3-642-55760-6

URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-417X-2014-1?site=jis-eurasipjournals.springeropen.com

V. Holub and J. J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

URL : http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf

V. Holub and J. J. Fridrich, Random Projections of Residuals for Digital Image Steganalysis, IEEE Transactions on Information Forensics and Security, vol.8, issue.12, 1996.
DOI : 10.1109/TIFS.2013.2286682

V. Holub and J. J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015.
DOI : 10.1109/TIFS.2014.2364918

S. Ioffe and C. Szegedy, Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502, p.3167, 2015.

J. Kodovsk´ykodovsk´y, J. J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet classification with deep convolutional neural networks, Communications of the ACM, vol.60, issue.6, pp.1097-1105, 2012.
DOI : 10.1162/neco.2009.10-08-881

URL : http://dl.acm.org/ft_gateway.cfm?id=3065386&type=pdf

Y. Lecun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol.9, issue.7553, pp.436-444, 2015.
DOI : 10.1007/s10994-013-5335-x

B. Li, M. Wang, J. Huang, and X. Li, A new cost function for spatial image steganography, 2014 IEEE International Conference on Image Processing (ICIP), pp.4206-4210, 2014.
DOI : 10.1109/ICIP.2014.7025854

T. Pevn´ypevn´y, T. Filler, P. Bas, R. Böhme, P. W. Fong et al., Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, Information Hiding -12th International Conference, pp.161-177978, 2010.
DOI : 10.1049/el:20070248

L. Pibre, P. Jérôme, D. Ienco, and M. Chaumont, Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch, Media Watermarking, Security, and Forensics, EI: Electronic Imaging, 2016.
DOI : 10.2352/ISSN.2470-1173.2016.8.MWSF-078

URL : https://hal.archives-ouvertes.fr/lirmm-01227950

Y. Qian, J. Dong, W. Wang, and T. Tan, Deep learning for steganalysis via convolutional neural networks, In: IS&T/SPIE Electronic Imaging. pp. 94090J?94090J. International Society for Optics and Photonics, 2015.
DOI : 10.1117/12.2083479

J. Schmidhuber, Deep learning in neural networks: An overview, Neural Networks, vol.61, pp.85-117, 2015.
DOI : 10.1016/j.neunet.2014.09.003

URL : http://arxiv.org/pdf/1404.7828

V. Sedighi, R. Cogranne, and J. Fridrich, Content-Adaptive Steganography by Minimizing Statistical Detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
DOI : 10.1109/TIFS.2015.2486744

S. Tan and B. Li, Stacked convolutional auto-encoders for steganalysis of digital images, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp.1-4, 2014.
DOI : 10.1109/APSIPA.2014.7041565

G. Xu, H. Z. Wu, and Y. Q. Shi, Ensemble of CNNs for Steganalysis, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec '16, 2016.
DOI : 10.1186/1687-417X-2014-1

G. Xu, H. Z. Wu, and Y. Q. Shi, Structural Design of Convolutional Neural Networks for Steganalysis, IEEE Signal Processing Letters, vol.23, issue.5, pp.708-712, 2016.
DOI : 10.1109/LSP.2016.2548421

J. Zeng, S. Tan, B. Li, and J. Huang, Large-scale JPEG steganalysis using hybrid deep-learning framework. ArXiv e-prints, 2016.