, Steganography and steganalysis through these ages, p.131

. Cryptography and . .. Steganography, , p.133

. .. , The prisoner's problem (steganography/steganalysis), p.137

. .. Summary,

, Color Channel Correlation and Geometric Steganalysis

. , This chapter describes our steganalysis method for color images by extracting features using color channel correlation and geometric mirror transformations. Contents 9

.. .. Experimental-results,

. .. Summary, 162 contains the experimental results of our proposed method. We illustrate these results in Table 9.2. S-UNIWARD, WOW and Synch-HILL methods were tested with different relative payloads {0

, The Color Rich Model method [GFC14] is less efficient because it achieved respectively 86.14%, 85.27% and 85.25% detection. Also, the CFA-aware features method [GF15] is less efficient because it achieved respectively 87.61%, 87.04% and 87.42% detection rates. Close to the CFA-aware features method

, Additionally, as shown in Table 9, vol.2

S. and S. , For the same payloads range, the Color Rich Model method [GFC14] is less efficient because it achieved respectively 86.14%, 85.27% and 85.25% detection rates on the same test samples. Also, as shown in Table 9.2, our proposed second method, that uses the sine and cosine of the gradients angle, achieved higher performance than CFA-aware features steganalysis method [GF15]; by registering 88.76%, 87.93% and 88.07% detection rates for S-UNIWARD, WOW and synch-HILL respectively with the payload 0.5 bpc. The CFA-aware features steganalysis method, by registering 87.54%, 86.63% and 86.77% detection rates for

, WOW and (c) synch-HILL steganography methods, illustrate the comparison between the proposed second method and the compared methods. As a result, the average testing error of the proposed second method is less than the first proposition, the Color Rich Model and CFA-aware features method, Moreover, curves in Fig.9.6 (a) S-UNIWARD, (b)

, In this case, the detection rate becomes higher than the same payload distributed equally between the three color channels. Table 9.3 illustrates the comparison of detection rates between the S-UNIWARD, WOW and synch-HILL methods with payloads 0.2 bpc and 0.4 bpc embedded in one channel only and in the three channels separately. Fig. 9.7 (a), (b) and detect the synchronize inter-channel than Color Rich Model method, Another experiment involved embedding the entire payload in only one channel of the color image, i.e. with payload 0.2 bpc and 0.4 bpc in the green channel only

. , Steganalysis Based on Steerable Gaussian Filter This chapter description the proposed method digital image steganalysis based on steerable Gaussian filter. Contents 10.1 Introduction

.. .. Experimental-results, 170 10.3.1 Performance of our proposed method

. .. Summary,

. , Ce chapitre souligne brièvement la motivation et les objectifs de cette thèse. Contents 12.1 Introduction

W. Abdul, P. Carré, and P. Gaborit, Human visual system-based color image steganography using the contourlet transform, Media Forensics and Security, vol.12, 2010.

M. Hasan-abdulrahman, P. Chaumont, B. Montesinos, and . Magnier, Color image steganalysis using correlations between rgb channels, Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES), 4th Int. Workshop on Cyber Crime (IWCC), pp.448-454, 2015.

M. Hasan-abdulrahman, P. Chaumont, B. Montesinos, and . Magnier, Color image steganalysis based on steerable gaussian filters bank, Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security (IHMMSEC), pp.109-114, 2016.

M. Hasan-abdulrahman, P. Chaumont, B. Montesinos, and . Magnier, Color images steganalysis using rgb channel geometric transformation measures, Wiley Journal on Security and Communication Networks, p.12, 2016.

D. Alleysson, 30 ans de démosaïçage-30 years of demosaicing. Traitement du signal-Signal processing, vol.21, pp.561-581, 2004.

P. Arbelaez, M. Maire, C. Fowlkes, and J. Malik, From contours to regions : An empirical evaluation, Computer Vision and Pattern Recognition, pp.2294-2301, 2009.

P. Arbelaez, M. Maire, C. Fowlkes, and J. Malik, Contour detection and hierarchical image segmentation, IEEE TPAMI, vol.33, issue.5, pp.898-916, 2011.

H. Abdulrahman, B. Magnier, and P. Montesinos, From contours to ground truth : How to evaluate edge detectors by filtering, the 25th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision (WSCG), p.29
URL : https://hal.archives-ouvertes.fr/hal-01940337

, Journal of WSCG, vol.25, issue.1-2, pp.133-142, 2017.

H. Abdulrahman, B. Magnier, and P. Montesinos, A new objective supervised edge detection assessment using hysteresis thresholds, First International Workshop on Brain-Inspired Computer Vision (WBICV2017), vol.10590, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01940328

H. Abdulrahman, B. Magnier, and P. Montesinos, Oriented half kernels for corner detection, Proceedings of the 25th European Signal Processing Conference (EUSIPCO2017), pp.808-812, 2017.

B. Hasan-abdulrahman, P. Magnier, and . Montesinos, A new normalized supervised edge detection evaluation, IbPRIA 2017, 8th Iberian International Conference on Pattern Recognition and Image Analysis, pp.203-213, 2017.

T. Aach, C. Mota, I. Stuke, M. Muhlich, and E. Barth, Analysis of superimposed oriented patterns, IEEE TIP, vol.15, issue.12, pp.3690-3700, 2006.

G. Abboud, J. Marean, and R. Yampolskiy, Steganography and visual cryptography in computer forensics, Systematic Approaches to Digital Forensic Engineering (SADFE), pp.25-32, 2010.

C. Oluwakemi, . S-adewole-kayode, and . Ayotunde, Efficient data hiding system using cryptography and steganography, International Journal of Applied Information Systems (IJAIS), pp.2249-0868, 2012.

I. E. Abdou and W. K. Pratt, Quantitative design and evaluation of enhancement/thresholding edge detectors, Proc. of the IEEE, vol.67, pp.753-763, 1979.

J. Ross, . Anderson, A. P. Fabien, and . Petitcolas, On the limits of steganography, IEEE Journal of Selected Areas in Communications, Special Issue on Copyright and Privacy Protection, vol.16, issue.4, pp.474-481, 1998.

D. Alleysson, S. Süsstrunk, and J. Hérault, Linear demosaicing inspired by the human visual system, IEEE Transactions on Image Processing, vol.14, issue.4, pp.439-449, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00204920

A. Andreopoulos and . John-k-tsotsos, 50 years of object recognition : Directions forward, Computer Vision and Image Understanding, vol.117, issue.8, pp.827-891, 2013.

A. J. Baddeley, Robust Computer Vision : Quality of Vision Algorithms, pp.59-78, 1992.

E. Bryce and . Bayer, patent 3,971,065, TO Eastman Kodak company, Patent and Trademark Office, 1976.

E. Brusseau, C. L. De-korte, F. Mastik, J. Schaar, and A. Van-der-steen, Fully automatic luminal contour segmentation in intracoronary ultrasound imaging-a statistical approach, IEEE transactions on medical imaging, vol.23, issue.5, pp.554-566, 2004.
URL : https://hal.archives-ouvertes.fr/hal-01976655

H. Berghel, Watermarking cyberspace, Communications of the ACM, vol.40, issue.11, pp.19-24, 1997.

H. Bay, A. Ess, T. Tuytelaars, and L. Van-gool, Computer vision and image understanding, vol.110, pp.346-359, 2008.

A. G. Boaventura and A. Gonzaga, Method to evaluate the performance of edge detector, 2009.

K. Bowyer, C. Kranenburg, and S. Dougherty, Edge detector evaluation using empirical roc curves, CVIU, pp.77-103, 2001.

S. Jack-t-brassil, N. Low, and . Maxemchuk, Copyright protection for the electronic distribution of text documents, Proceedings of the IEEE, vol.87, issue.7, pp.1181-1196, 1999.

J. Brassil, S. Low, L. Maxemchuk, and . Ógorman, Hiding information in document images, Proceedings of the Conference on Information Sciences and Systems (CISS), pp.482-489, 1995.

S. Belongie and J. Malik, Finding boundaries in natural images : A new method using point descriptors and area completion, Computer Vision-ECCV'98, pp.751-766, 1998.

E. Biham and A. Shamir, Differential cryptanalysis of the data encryption standard, Softcover reprint of the original 1st, 1993.

T. Brox, J. Weickert, B. Burgeth, and P. Mrázek, Nonlinear structure tensors. IVC, vol.24, issue.1, pp.41-55, 2006.

C. Cachin, An information-theoretic model for steganography, Information Hiding, 2nd International Workshop, vol.1525, pp.306-318, 1998.

J. Canny, A computational approach to edge detection, IEEE TPAMI, issue.6, pp.679-698, 1986.

J. Canny, A computational approach to edge detection. IEEE Transactions on pattern analysis and machine intelligence, pp.679-698, 1986.

C. Chan and L. Cheng, Hiding data in images by simple lsb substitution, Pattern recognition, vol.37, issue.3, pp.469-474, 2004.

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, Digital image steganography : Survey and analysis of current methods, Signal processing, vol.90, issue.3, pp.727-752, 2010.

R. Caldelli, F. Filippini, and R. Becarelli, Reversible watermarking techniques : an overview and a classification, EURASIP Journal on Information Security, issue.2, 2010.

S. Chabrier, H. Laurent, C. Rosenberger, and B. Emile, Comparative study of contour detection evaluation criteria based on dissimilarity measures, EURASIP J. on Image and Video Processing, issue.2, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00255983

I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography, The Morgan Kaufmann Series in Multimedia Information and Systems, Printed in the United States of America, 2007.

S. Craver, On public-key steganography in the presence of an active warden, International Workshop on Information Hiding, pp.355-368, 1998.

T. Denemark and J. Fridrich, Improving steganographic security by synchronizing the selection channel, Proc. of the 3rd ACM Workshop on Inf. Hiding and Multimedia Security (IH&MMSec), pp.5-14, 2015.

R. Deriche and G. Giraudon, A computational approach for corner and vertex detection, IJCV, vol.10, issue.2, pp.101-124, 1993.

. Thomas-g-dietterich, Ensemble methods in machine learning, International workshop on multiple classifier systems, pp.1-15, 2000.

M. Dubuisson and . Jain, A modified hausdorff distance for object matching, IEEE ICPR, vol.1, pp.566-568, 1994.
DOI : 10.1109/icpr.1994.576361

URL : http://www.cse.msu.edu/prip/Files/DubuissonJain.pdf

G. Dougherty, Digital image processing for medical applications, 2009.

N. Dalal and B. Triggs, Histograms of oriented gradients for human detection, Computer Vision and Pattern Recognition, vol.1, pp.886-893, 2005.
DOI : 10.1109/cvpr.2005.177

URL : https://hal.archives-ouvertes.fr/inria-00548512

S. and D. Zenzo, A note on the gradient of a multi-image, CVGIP, vol.33, issue.1, pp.116-125, 1986.

A. E. Gamal, A. Boyd, H. Fowler, X. Min, and . Liu, Modeling and estimation of fpn components in cmos image sensors, Proceedings of SPIE, Solid State Sensor Arrays : Development and Applications II, vol.3301, pp.168-177, 1998.

J. Ettinger, Steganalysis and game equilibria, Information Hiding, 2nd International Workshop, vol.1525, pp.319-328, 1998.
DOI : 10.1007/3-540-49380-8_22

URL : http://nis-www.lanl.gov/~ettinger/stegogame.ps

W. T. Freeman and E. H. Adelson, The design and use of steerable filters, IEEE TPAMI, vol.13, issue.9, pp.891-906, 1991.
DOI : 10.1109/34.93808

URL : http://www.isi.uu.nl/Meetings/../TGV/steerable.pdf

M. Steven, D. De-jong-freek, and . Van-der-meer, Imaging Spectrometry Remote Sensing and Digital Image Processing, 2002.

G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, Eliminating steganography in internet traffic with active wardens, Information Hiding, 5th International Workshop, vol.2578, pp.18-35, 2003.
DOI : 10.1007/3-540-36415-3_2

URL : http://woozle.org/~mfisk/papers/ih02.pdf

N. L. Fernández-garcía, A. Carmona-poyato, R. Medina-carnicer, and F. J. Madrid-cuevas, Automatic generation of consensus ground truth for the comparison of edge detection techniques, IVC, vol.26, issue.4, pp.496-511, 2008.

N. L. Fernández-garc?a, R. Medina-carnicer, A. Carmona-poyato, F. J. Madrid-cuevas, and M. Prieto-villegas, Characterization of empirical discrepancy evaluation measures, Patt. Rec. Lett, vol.25, issue.1, pp.35-47, 2004.

. Guillermo-a-francia, T. Iii, and . Gomez, Steganography obliterator : an attack on the least significant bits, Proceedings 3rd annual conference on Information security curriculum development, pp.22-23, 2006.

T. Filler, J. Judas, and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.920-935, 2011.
DOI : 10.1109/tifs.2011.2134094

URL : http://dde.binghamton.edu/filler/pdf/Fill10tifs-stc.pdf

J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/tifs.2012.2190402

URL : http://dde.binghamton.edu/kodovsky/pdf/TIFS2012-SRM.pdf

J. Jessica, J. Fridrich, and . Kodovsk, Kodovsk`y. Multivariate gaussian model for designing additive distortion for steganography, Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp.2949-2953, 2013.

J. Fridrich and M. Long, Steganalysis of lsb encoding in color images, IEEE International Conference on Multimedia and Expo (ICME), vol.3, pp.1279-1282, 2000.
DOI : 10.1109/icme.2000.871000

J. Fridrich and . Long, Steganalysis of lsb encoding in color images, IEEE Int. Conf. on Multimedia and Expo (ICME), vol.3, pp.1279-1282, 2000.
DOI : 10.1109/icme.2000.871000

W. Förstner, A feature based correspondence algorithm for image matching. International Archives of Photogrammetry and Remote Sensing, vol.26, pp.150-166, 1986.

J. Fridrich, Steganography in digital media : principles, algorithms, and applications. Printed in the United Kingdom, 2009.

T. Gloe and R. Böhme, The dresden image database for benchmarking digital image forensics, ACM, pp.1584-1590, 2010.

R. Girshick, J. Donahue, T. Darrell, and J. Malik, Rich feature hierarchies for accurate object detection and semantic segmentation, Proceedings of the IEEE conference on computer vision and pattern recognition, pp.580-587, 2014.

M. Goljan and J. Fridrich, CFA-aware features for steganalysis of color images, Proc. IS&T/SPIE Electronic Imaging, Int. Society for Optics and Photonics (SPIE), vol.94090, 2015.

M. Goljan, J. Fridrich, and R. Cogranne, Rich model for steganalysis of color images, IEEE Workshop on Information Forensic and Security, 2014.

T. Gevers, A. Gijsenij, J. Van-de-weijer, and J. Geusebroek, Color in computer vision : fundamentals and applications, vol.23, p.9780470890844, 2012.

V. Gouet, P. Montesinos, and D. Pelé, A fast matching method for color uncalibrated images using differential invariants, BMVC, pp.1-10, 1998.
URL : https://hal.archives-ouvertes.fr/hal-02338349

C. Grigorescu, N. Petkov, and M. Westenberg, Contour detection based on nonclassical receptive field inhibition, IEEE TIP, vol.12, issue.7, pp.729-739, 2003.

J. M. Geusebroek, A. Smeulders, and J. Van-de-weijer, Fast anisotropic gauss filtering, pp.99-112, 2002.

C. Rafael, P. Gonzalez, and . Wintz, Digital image processing, pp.0-201, 2002.

. Robert-m-haralick, Digital step edges from zero crossing of second directional derivatives, IEEE Transactions on Pattern Analysis and Machine Intelligence, issue.1, pp.58-68, 1984.

J. Hiney, T. Dakve, K. Szczypiorski, and K. Gaj, Using facebook for image steganography, Availability, Reliability and Security (ARES), 2015 10th International Conference on, pp.442-447, 2015.

, Herodotus. The Histories. Pantheon Books, 1996.

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.

V. Holub and J. Fridrich, Designing steganographic distortion using directional filters, Proc. IEEE Int. Workshop on Inf. Forensics and Security (WIFS), pp.234-239, 2012.

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP J. Information Security, pp.1-13, 2014.

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, Special Issue on Revised Selected Bibliographie Papers of the 1st ACM IH&MMS Workshop, vol.2014, issue.1, pp.1-13

C. Hosmer and C. Hyde, Discovering covert digital evidence, 2003.

D. Hilbert, Theory of algebraic invariants, 1993.

J. Nicholas, J. Hopper, L. Langford, and . Von-ahn, Provably secure steganography, Annual International Cryptology Conference, pp.77-92, 2002.

C. Gerald and . Holst, Ccd arrays, cameras, and displays, 1998.

J. J. Harmsen and W. A. Pearlman, Steganalysis of additive-noise modelable information hiding, International Society for Optics and Photonics, pp.131-142, 2003.

D. P. Huttenlocher and W. J. Rucklidge, A multi-resolution technique for comparing images using the hausdorff distance, IEEE CVPR, pp.705-706, 1993.

C. Harris and M. Stephens, A combined corner and edge detector, Alvey Vision Conference, vol.15, 1988.

M. D. Heath, S. Sarkar, T. Sanocki, and K. W. Bowyer, A robust visual method for assessing the relative performance of edge-detection algorithms, IEEE TPAMI, vol.19, issue.12, pp.1338-1359, 1997.

C. Huang and J. Wu, Attacking visible watermarking schemes, IEEE Transactions on Multimedia, vol.6, pp.16-30, 2004.

X. Hou, A. Yuille, and C. Koch, Boundary detection benchmarking : Beyond f-measures, IEEE CVPR, pp.2123-2130, 2013.

T. Heli and . Hytti, Characterization of digital image noise properties based on raw data, Proceedings of SPIE-IS&T Electronic Imaging, vol.6059, pp.1-12, 2006.

. James-r-janesick, Scientific charge-coupled devices, The International Society for Optical Engineering, vol.83, 2001.

M. Jacob and M. Unser, Design of steerable filters for feature detection using canny-like criteria, IEEE TPAMI, vol.26, issue.8, pp.1007-1019, 2004.

M. Jacob and M. Unser, Design of steerable filters for feature detection using canny-like criteria, IEEE TPAMI, vol.26, issue.8, pp.1007-1019, 2004.

D. Kahn, The history of steganography, Proceedings of First International Workshop on Information Hiding, vol.1174, pp.1-5, 1996.

M. Kirchner and R. Bohme, Steganalysis in technicolor boosting ws detection of stego images from cfa-interpolated covers, IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3982-3986, 2014.

P. Andrew-d-ker, R. Bas, R. Böhme, S. Cogranne, T. Craver et al., Moving steganography and steganalysis from the laboratory into the real world, Proccessding 1st ACM workshop on Information hiding and multimedia security (IH&MMSec), pp.45-58, 2013.

S. Kouider, M. Chaumont, and W. Puech, Adaptive steganography by oracle (aso), IEEE International Conference on Multimedia and Expo (ICME), pp.1-6, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-00838993

T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, Video watermarking system for broadcast monitoring, International Society for Optics and Photonics, pp.103-112, 1999.

Y. Kim, Z. Duric, and D. Richards, Modified matrix encoding technique for minimal distortion steganography, International Workshop on Information Hiding, pp.314-327, 2006.

J. Kelley, Terror groups hide behind web encryption, USA Today News. An, 2001.

. Andrew-d-ker, Improved detection of lsb steganography in grayscale images, International workshop on information hiding, pp.97-115

. Springer, , 2004.

. Andrew-d-ker, Steganalysis of lsb matching in grayscale images, IEEE signal processing letters, vol.12, issue.6, pp.441-444, 2005.

J. Kodovsky, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.

J. Kodovsk, `. Kodovsk`y, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Trans. on Inf. Forensics and Security, vol.7, issue.2, pp.432-444, 2012.

Z. Zahra, M. Kermani, and . Jamzad, A robust steganography algorithm based on texture similarity using gabor filter, Proceedings IEEE, The Fifth International Symposium on Signal Processing and Information Technology, pp.578-582, 2005.

A. Kerbiche, E. Saoussen-ben-jabra, V. Zagrouba, and . Charvillat, Video watermarking based on interactive detection of feature regions, International Conferences on Advances in MultimediaMMEDIA 2014, p.77, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01144995

J. Katz and Y. Lindell, Introduction to modern cryptography, 2014.

K. Gina, Veiled messages of terror may lurk in cyberspace, New York Times News. An, 2001.

U. Köthe, Edge and junction detection with an improved structure tensor, Joint Patt. Rec. Symp, pp.25-32, 2003.

L. Kitchen and A. Rosenfeld, Gray-level corner detection, 1980.

S. Krig, Computer vision metrics : Survey, taxonomy, and analysis, 2014.

M. Kharrazi, T. Husrev, N. Sencar, and . Memon, Cover selection for steganographic embedding, Proceedings of International Conference on Image Processing (ICIP), pp.117-120, 2006.

I. Laptev, On space-time interest points, International journal of computer vision, vol.64, issue.2-3, pp.107-123, 2005.

F. Li, J. Barabas, A. Mohan, and R. Raskar, Analysis on errors due to photon noise and quantization process with multiple images, 44th Annual Conference on Information Sciences and Systems (CISS), pp.1-6, 2010.

C. T. Leondes, Medical imaging systems technology. a 5-volume set / :Methods in cardiovascular and brain systems, 2005.

J. Lukas, J. Fridrich, and M. Goljan, Determining digital image origin using sensor imperfections, Proceedings of SPIE : Image and Video Communications and Processing, vol.5685, pp.249-260, 2005.
DOI : 10.1117/12.587105

URL : http://www.ws.binghamton.edu/fridrich/research/ei5685-29_forensic.pdf

J. Lukas, J. Fridrich, and M. Goljan, Digital camera identification from sensor pattern noise, IEEE Transactions on Information Forensics and Security, vol.1, issue.2, pp.205-214, 2006.

Z. Liu and A. Inoue, Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences. Circuits and Systems for Video Technology, IEEE Transactions on, vol.13, issue.8, pp.801-812, 2003.

T. Lindeberg, Feature detection with automatic scale selection, International journal of computer vision, vol.30, issue.2, pp.79-116, 1998.

L. Liu, R. Li, and Q. Gao, A robust video watermarking scheme based on dct, Proceedings of International Conference onMachine Learning and Cybernetics, vol.8, pp.5176-5180, 2005.

. Dimitri-a-lisin, A. Marwan, M. B. Mattar, E. G. Blaschko, M. Learned-miller et al., Combining local and global image features for object class recognition, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPR), pp.47-47, 2005.

C. Lopez-molina, B. D. Baets, and H. Bustince, Quantitative error measures for edge detection, Patt. Rec, vol.46, issue.4, pp.1125-1139, 2013.

C. Lopez-molina, B. D. Baets, and H. Bustince, Twofold consensus for boundary detection ground truth. Knowledge-Based Syst, vol.98, pp.162-171, 2016.

L. Olivier-losson, Y. Macaire, and . Yang, Comparison of color demosaicing methods, Preprint submitted to Advances in Imaging and Electron Physics, vol.162, pp.173-265, 2010.

. David-g-lowe-;-qingzhong, . Liu, H. Andrew, B. Sung, M. Ribeiro et al., Image complexity and feature mining for steganalysis of least significant bit matching steganography, International journal of computer vision, vol.60, issue.2, pp.21-36, 2004.

B. Li, M. Wang, J. Huang, and X. Li, A new cost function for spatial image steganography, Proc. IEEE, Int. Conf. Image Processing (ICIP), pp.4206-4210, 2014.

B. Magnier, A. Aberkane, P. Borianne, P. Montesinos, and C. Jourdan, Multi-scale crest line extraction based on half gaussian kernels, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5105-5109, 2014.
URL : https://hal.archives-ouvertes.fr/hal-02115892

B. Magnier, H. Abdulrahman, and P. Montesinos, Détection de coins par combinaison de filtres asyétriques orientés, Proceedings of the 25th edition GRETSI 2017, pp.5-8, 2017.

Y. Miche, P. Bas, A. Lendasse, C. Jutten, and O. Simula, Reliable steganalysis using a minimum set of samples and features, EURASIP J. on Inf. Security, issue.13, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00437868

M. Mühlich, T. Dahmen, and T. Aach, Doubly-rotated matched filtering, EUSIPCO, pp.2169-2173, 2007.

F. Michelet, J. Costa, O. Lavialle, Y. Berthoumieu, P. Baylou et al., Estimating local multiple orientations, Signal Proc, vol.87, issue.7, pp.1655-1669, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00166478

D. R. Martin, C. C. Fowlkes, and J. Malik, Learning to detect natural image boundaries using local brightness, color, and texture cues, IEEE TPAMI, vol.26, issue.5, pp.530-549, 2004.

D. Martin, C. Fowlkes, D. Tal, and J. Malik, A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics, IEEE ICCV, vol.2, pp.416-423, 2001.

S. Robert-a-maschal, J. Young, K. Reynolds, J. Krapels, T. Fanning et al., Review of bayer pattern color filter array (cfa) demosaicing with new quality assessment algorithms, pp.20783-1197, 2010.

B. Magnier, A. Le, and A. Zogo, A quantitative error measure for the evaluation of roof edge detectors, IEEE IST, pp.429-434, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01940350

S. Bangalore, W. Manjunath, and . Ma, Texture features for browsing and retrieval of image data, IEEE Transactions, vol.18, issue.8, pp.837-842, 1996.

P. Montesinos and B. Magnier, A new perceptual edge detector in color images, Advanced Concepts for Intelligent Vision Systems-12th International Conference, ACIVS 2010, vol.6474, pp.209-220, 2010.
URL : https://hal.archives-ouvertes.fr/hal-00807734

B. Magnier and P. Montesinos, Oriented half gaussian kernels and anisotropic diffusion, VISAPP, vol.1, pp.73-81, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01940388

B. Magnier and P. Montesinos, Oriented half gaussian kernels and anisotropic diffusion, Proceedings of the 9th International Conference on Computer Vision Theory and Applications VISAPP 2014, vol.1, pp.73-81, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01940388

B. Magnier, P. Montesinos, and D. Diep, Fast Anisotropic Edge Detection Using Gamma Correction in Color Images, IEEE ISPA, pp.212-217, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00807802

B. Magnier, P. Montesinos, and D. Diep, Texture removal by pixel classification using a rotating filter, Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.1097-1100, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00807785

B. Magnier, P. Montesinos, and D. Diep, Texture removal in color images by anisotropic diffusion, Proceedings of the Sixth International Conference on Computer Vision Theory and Applications VISAPP 2011, pp.40-50, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00807965

B. Magnier, P. Montesinos, and D. Diep, A tool for brain magnetic resonance image segmentation, Proceedings of the International Conference on Computer Vision Theory and Applications VISAPP 2013, vol.2, pp.75-79, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00807999

J. M. Mooney, Effect of spatial noise on the minimum resolvable temperature of a staring sensor, Applied optics, vol.30, issue.23, pp.3324-3332, 1991.

M. Mitrea and F. Prêteux, From watermarking to in-band enrichment : Theoretical and applicative trends, Advanced Techniques in Multimedia Watermarking : Image, Video and Audio Applications : Image, Video and Audio Applications, p.111, 2010.

R. Moreno, L. Pizarro, B. Burgeth, J. Weickert, M. A. Garcia et al., Adaptation of tensor voting to image structure estimation, New Developments in the Visualization and Processing of Tensor Fields, pp.29-50, 2012.

A. Mosunov, V. Sinha, H. Crawford, J. Aycock, D. M. Nunes-de-castro et al., Assured supraliminal steganography in computer games, Proceeding Information Security Applications, 14th International Workshop, (WISA), vol.8267, pp.245-259, 2013.

B. Magnier, H. Xu, and P. Montesinos, Half gaussian kernels based shock filter for image deblurring and regularization, VISAPP 2013-Proceedings of the International Conference on Computer Vision Theory and Applications, vol.1, pp.21-24
URL : https://hal.archives-ouvertes.fr/hal-00807992

S. Mark, A. S. Nixon, and . Aguado, Feature extraction & image processing for computer vision, 2012.

M. Nakano-miyatake, F. Cedillo-hernandez, . Garcia-ugalde, H. Cedillo-hernandez, and . Perez-meana, Copyright protection of color imaging using robust-encoded watermarking, 2015.

C. Odet, B. Belaroussi, and H. Benoit-cattin, Scalable discrepancy measures for segmentation evaluation, IEEE ICIP, vol.1, pp.785-788, 2002.

A. Mohammadreza, H. Oskoei, and . Hu, A survey on edge detection methods, 2010.

N. Otsu, A threshold selection method from gray-level histograms, Automatica, vol.11, pp.23-27, 1975.

A. J. Pinho and L. B. Almeida, Edge detection filters based on artificial neural networks, In ICIAP, pp.159-164, 1995.

P. Tomá?-pevn`pevn`y, J. Bas, and . Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Trans. on Inf. Forensics and Security ( TIFS), vol.5, issue.2, pp.215-224, 2010.

W. Puech, A. G. Bors, and J. M. Rodrigues, Protection of colour images by selective encryption, Advanced Color Image Processing and Analysis, p.203, 2013.

P. Perona, Steerable-scalable kernels for edge detection and junction analysis, IVC, vol.10, issue.10, pp.663-672, 1992.

T. Tomá?-pevn`pevn`y, P. Filler, and . Bas, Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, 12th International Conference, vol.6387, pp.161-177, 2010.

K. Panetta, C. Gao, S. Agaian, and S. Nercessian, A new referencebased edge map quality measure, IEEE Trans. on Systems Man and Cybernetics : Systems, vol.46, issue.11, pp.1505-1517, 2016.

N. Provos and P. Honeyman, Hide and seek : An introduction to steganography. IEEE security & privacy, vol.99, pp.32-44, 2003.

K. Petrowski, M. Kharrazi, T. Hüsrev, . Sencar, and . Nasir-d-memon, Psteg : steganographic embedding through patching, Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing ICASSP, pp.537-540, 2005.

T. Peli and D. Malah, A study of edge detection algorithms, CGIP, vol.20, issue.1, pp.1-21, 1982.

P. Perona and J. Malik, Detecting and localizing edges composed of steps, peaks and roofs, ICCV, pp.52-57, 1990.

. William-k-pratt, Introduction to digital image processing, 2013.

M. S. Judith and . Prewitt, Object enhancement and extraction. Picture processing and Psychopictorics, vol.10, pp.15-19, 1970.

W. Puech, A. Trémeau, P. Carré, C. Fernandezmaloigne, F. Robert-inacio et al., Protection of color images. Digital Color, pp.227-264, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00743165

P. Puteaux, D. Trinel, and W. Puech, High-capacity data hiding in encrypted images using msb prediction, Image Processing Theory Tools and Applications (IPTA), 2016 6th International Conference on, pp.1-6, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01888475

. Xiaofeng-ren, C. Charless, J. Fowlkes, and . Malik, Figure/ground assignment in natural images, European Conference on Computer Vision, pp.614-627, 2006.

M. Rhodes-ousley, Information security the complete reference, 2013.

P. L. , Rosin. Unimodal thresholding. Patt. Rec, vol.34, issue.11, pp.2083-2096, 2001.

E. Rosten, R. Porter, and T. Drummond, Faster and better : A machine learning approach to corner detection, IEEE TPAMI, vol.32, issue.1, pp.105-119, 2010.

A. Ronald-l-rivest, L. Shamir, and . Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.

A. Rosenfeld and M. Thurston, Edge and curve detection for visual scene analysis, IEEE Trans. on Computers, vol.100, issue.5, pp.562-569, 1971.

S. M. Smith and J. M. Brady, Susan : a new approach to low level image processing, IJCV, vol.23, issue.1, pp.45-78, 1997.

I. Sipiran and B. Bustos, Harris 3d : a robust extension of the harris operator for interest point detection on 3d meshes. The Visual Computer, vol.27, pp.963-976, 2011.

J. Shen and S. Castan, An optimal linear operator for step edge detection, CVGIP, vol.54, issue.2, pp.112-133, 1992.

V. Sedighi, R. Cogranne, and J. Fridrich, Content-adaptive steganography by minimizing statistical detectability, IEEE Transactions on Information Forensics and Security, vol.11, issue.2, pp.221-234, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01906608

Z. Shahid, M. Chaumont, and W. Puech, 264/avc video watermarking for active fingerprinting based on tardos code. Signal, Image and Video Processing, vol.7, pp.679-694, 2013.
URL : https://hal.archives-ouvertes.fr/lirmm-00807061

, Berkeley segmentation data set and benchmarks 500, 2011.

E. P. Simoncelli and H. Farid, Steerable wedge filters for local orientation analysis, IEEE TIP, vol.5, issue.9, pp.1377-1382, 1996.

C. Strasters and J. Gerbrands, Three-dimensional image segmentation using a split, merge and group approach, Patt. Rec. Let, vol.12, issue.5, p.205, 1991.

J. Gustavus and . Simmons, The prisoners : problem and the subliminal channel, Advances in Cryptology, CRYPTO, pp.51-67, 1983.

H. Sajedi and M. Jamzad, Secure steganography based on embedding capacity, International Journal of Information Security, vol.8, issue.6, pp.433-445, 2009.

V. Sachnev, H. Kim, and R. Zhang, Less detectable jpeg steganography method based on heuristic optimization and bch syndrome coding, Proceedings of the 11th ACM workshop on Multimedia and security, pp.131-140, 2009.

Y. Sun and F. Liu, Selecting cover for image steganography by correlation coefficient, Proceedings of Second International Workshop on Education Technology and Computer Science (ETCS), vol.2, pp.159-162, 2010.

X. Song, F. Liu, C. Yang, X. Luo, and Y. Zhang, Steganalysis of adaptive jpeg steganography using 2d gabor filters, Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, pp.15-23, 2015.

W. Ronald, R. M. Schafer, and . Mersereau, Demosaicking : color filter array interpolation, IEEE Signal Processing Magazine, vol.22, issue.1, 2005.

N. P. Smart, Printed in the McGraw-Hill New York, vol.5, 2003.

C. Schmid, R. Mohr, and C. Bauckhage, Evaluation of interest point detectors, International Journal of computer vision, vol.37, issue.2, pp.151-172, 2000.
URL : https://hal.archives-ouvertes.fr/inria-00548302

M. Seyed, B. Seyedzadeh, M. R. Norouzi, S. Mosavi, and . Mirzakuchaki, A novel color image encryption algorithm based on spatial permutation and quantum chaotic map, Nonlinear Dynamics, vol.81, issue.1-2, pp.511-529, 2015.

I. E. Sobel, Camera Models and Machine Perception, 1970.

J. Shi and C. Tomasi, Good features to track, IEEE CVPR, pp.593-600, 1994.

P. Shui and W. Zhang, Corner detection and classification using anisotropic directional derivative representations, IEEE TIP, vol.22, issue.8, pp.3204-3218, 2013.

R. Szeliski, Computer vision : algorithms and applications, Springer Science & Business Media, 2010.

A. Tacticus, How to Survive Under Siege/Aineias the Tactician, Clarendon Ancient History Series, 1990.

P. Thiyagarajan, G. Aghila, and V. P. Venkatesan, Steganalysis using color model conversion, 2012.

S. Trivedi and R. Chandramouli, Secret key estimation in sequential steganography, IEEE Transactions on Signal Processing, vol.53, issue.2, pp.746-757, 2005.

P. Thorsteinson and A. Ganesh, NET Security and Cryptography. 1st ed. Prentice Hall Professional Technical Reference, 2003.

J. Tian, Reversible watermarking by difference expansion, Proceedings of workshop on multimedia and security, pp.19-22, 2002.

. Patrick-s-tibbetts, Terrorist use of the internet and related information technologies, DTIC Document, 2002.

W. Tang, B. Li, W. Luo, and J. Huang, Clustering steganographic modification directions for color components, Signal Processing Letters,IEEE, vol.23, issue.2, pp.197-201, 2016.

L. Von-ahn and N. Hopper, Public-key steganography, International Conference on the Theory and Applications of Cryptographic Techniques, pp.323-341, 2004.

D. Venkatrayappa, P. Montesinos, D. Diep, and B. Magnier, A novel image descriptor based on anisotropic filtering, Computer Analysis of Images and Patterns-16th International Conference, CAIP 2015, vol.9256, pp.161-173, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02114315

D. Venkatrayappa, P. Montesinos, D. Diep, and B. Magnier, Rsd-hog : a new image descriptor, Scandinavian Conference on Image Analysis, pp.400-409, 2015.

S. Venkatesh and P. L. Rosin, Dynamic threshold determination by local and global edge evaluation, CVGIP, vol.57, issue.2, p.207, 1995.

Z. Wang, A. C. Bovik, R. Hamid, . Sheikh, and . Simoncelli, Image quality assessment : from error visibility to structural similarity, IEEE transactions on image processing, vol.13, issue.4, pp.600-612, 2004.

E. Ian-h-witten, . Frank, A. Mark, C. Hall, and . Pal, Data Mining : Practical machine learning tools and techniques, 2016.

M. Wu and B. Liu, Watermarking for image authentication, IEEE International Conference on Image Processing, pp.437-441, 1998.

Y. Wang and P. Moulin, Perfectly secure steganography : Capacity, error exponents, and code constructions, IEEE Transactions on Information Theory, Special Issue on Security, vol.54, issue.6, pp.2706-2722, 2008.

A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, 3rd Int. Workshop Lecture Notes in Computer Science, vol.1768, pp.61-76, 2000.

C. I. Raymond-b-wolfgang, E. Podilchuk, and . Delp, Perceptual watermarks for digital images and video, Proceedings of the IEEE, vol.87, issue.7, pp.1108-1126, 1999.

J. Wang, C. Zhang, and P. Hao, New color filter arrays of high light sensitivity and high demosaicking performance, IEEE International Conference on Image Processing (ICIP), pp.3153-3156, 2011.

G. S. Xia, J. Delon, and Y. Gousseau, Accurate junction detection and characterization in natural images, IJCV, vol.106, issue.1, pp.31-56, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00631609

W. A. Yasnoff, W. Galbraith, and J. W. Bacus, Error measures for objective assessment of scene segmentation algorithms, Analytical and Quantitative Cytology, vol.1, issue.2, pp.107-121, 1978.

Y. Yitzhaky and E. Peli, A method for objective edge detection evaluation and detector parameter selection, IEEE TPAMI, vol.25, issue.8, pp.1027-1033, 2003.

L. Yuan and J. Sun, High quality image reconstruction from raw and jpeg image pair, IEEE International Conference on Computer Vision (ICCV), pp.2158-2165, 2011.

D. Ziou and S. Tabbone, Edge detection techniques : an overview, International Journal on Pattern Recognition and Image Analysis, vol.8, issue.4, pp.537-559, 1998.
URL : https://hal.archives-ouvertes.fr/inria-00098446

[. Bibliographie, S. Ziou, and . Tabbone, Edge detection techniques-an overview. Pattern Recognition and Image Analysis C/C of Raspoznavaniye Obrazov I Analiz Izobrazhenii, vol.8, pp.537-559, 1998.