1. Steganography via cover-source switching
2. ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS
3. P. Bas and T. Furon. BOWS-2. http://bows2.ec-lille.fr July 2007. P. Bas and T. Furon. BOWS-2. http://bows2.ec-lille.fr July 2007.
4. M. Boroumand , J. Fridrich , and R. Cogranne . Are we there yet" In A. Alattar and N. D. Memon, editors , Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019 , San Francisco, CA , January 26-30, 2019 . M. Boroumand, J. Fridrich, and R. Cogranne. Are we there yet" In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 26-30, 2019.
5. Reverse JPEG Compatibility Attack