Tomas Pevny Tomas Pevny
Contact: pevnak [at] gmail [dot] com
Affiliation: Czech Technical University in Prague
Department of Computers
Agent Technology Group
Address: Technicka 2
Praha 6, 166 27
occupation:
2008-2009 postdoc at GIPSA-Lab, France
Grenoble INP - Université Joseph Fourier - Université Stendhal
961 rue de la Houille Blanche
Domaine universitaire - BP 46
F - 38402 GRENOBLE Cedex
Education:
2004-2008 Ph.D. in Computer Science, Binghamton University
1997-2003 M.S. in Computer Science, Czech Technical University in Prague,
Faculty of Nuclear Sciences and Physical Engineering
Specialization: Steganography, Steganalysis, Machine learning, Non-parametric statistics, optimization
Downloads:
  • Datasets, implementation of all algorithms an results used in the paper: Loda: Lightweight online detection of anomalies is available here bundle. Alternatively, implementation only is available here implementation. The implementation and experiments uses PRTools and DD tools.
  • BossBase with raw images is available here Bossbase. If you use Bossbase, please, cite the paper Break Our Steganographic System": The Ins and Outs of Organizing BOSS, Procceedings of Information Hiding Conference, 2011 describing the database in full detail.
  • BossBase 1.01 with resized, cropped and greyscale images of size 512x512 is available here Bossbase 1.01. List of cameras used to create Bossbase is here, alternatively use EXIFs for details.
Publications: 2015
  • Loda: Lightweight on-line detector of anomalies, Machine Learning 2015 [pdf]
  • Towards scalable network host simulation, Procceedings of the 2nd International Workshop on Agents and CyberSecurity 2015 [pdf]
  • Unsupervised detection of malware in persistent web traffic, Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on 2015 [pdf]
  • Automatic discovery of web servers hosting similar applications, Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on 2015 [pdf]
  • Towards dependable steganalysis, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XVII} 2015 [pdf]
2014
  • Interpreting and clustering outliers with sapling random forests, ITAT 2014. Information Technologies - Applications and Theory. Part II 2014 [pdf]
  • Explaining Anomalies with Sapling Random Forests, ITAT 2014. Information Technologies - Applications and Theory. Part II 2014 [pdf]
  • Randomized Operating Point Selection in Adversarial Classification, Machine Learning and Knowledge Discovery in Databases 2014 [pdf]
  • A Memory Efficient Privacy Preserving Representation of Connection Graphs, Proceedings of the 1st International Workshop on Agents and CyberSecurity 2014 [pdf]
  • A mishmash of methods for mitigating the model mismatch mess, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XVI} 2014 [pdf]
  • Steganographic Key Leakage Through Payload Metadata, Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security 2014 [pdf]
  • The Steganographer is the Outlier: Realistic Large-Scale Steganalysis, IEEE Transactions on Information Forensics and Security 2014 [pdf]
2013
  • Moving Steganography and Steganalysis from the Laboratory into the Real World, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security 2013 [pdf]
  • The challenges of rich features in universal steganalysis, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XV} 2013 [pdf]
  • Anomaly detection by bagging, Proceedings of {COPEM}, ECML/PKDD workshop 2013 2013 [pdf]
  • Attacking the IDS learning processes, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2013 [pdf]
2012
  • Co-occurrence steganalysis in high dimensions, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIV} 2012 [pdf]
  • Identifying a steganographer in realistic and heterogeneous data sets, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIV} 2012 [pdf]
  • From Blind to Quantitative Steganalysis, IEEE Transactions on Information Forensics and Security 2012 [pdf]
  • Batch Steganography in the Real World, Proceedings of the on Multimedia and Security 2012 [pdf]
  • Detecting anomalous network hosts by means of PCA, IEEE International Workshop on Information Forensics and Security (WIFS), 2012 2012 [pdf]
2011
  • "Break Our Steganographic System": The Ins and Outs of Organizing BOSS, Procceedings of Information Hiding Conference 2011
  • A new paradigm for steganalysis via clustering, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIII} 2011 [pdf]
  • Detecting messages of unknown length, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XIII} 2011 [pdf]
2010
  • Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, 12th International Workshop 2010 [pdf]
  • Steganalysis by Subtractive Pixel Adjacency Matrix, Transactions on Information Forensics and Security 2010 [pdf]
  • Modern Steganalysis Can Detect {YASS}, Proceedings {SPIE}, Electronic Imaging, Security and Forensics Multimedia {XII} 2010 [pdf]
2009
  • Steganalysis by subtractive pixel adjacency matrix, Proceedings of the 11th workshop on Multimedia & security, Princeton, NJ, USA, September 7--8 2009 [pdf]
  • From Blind to Quantitative Steganalysis, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents XI, San Jose, CA, January 19--January 22 2009 [pdf]
2008
  • Novelty Detection in Blind Steganalysis, Proceedings of the 10th workshop on Multimedia & security 2008 [pdf]
  • The Square Root Law of Steganographic Capacity, Proceedings of the 10th workshop on Multimedia & security 2008 [pdf]
  • Multiclass Detector of Current Steganographic Methods for {JPEG} Format, {IEEE} Transactions on Information Forensics and Security 2008 [pdf]
  • Benchmarking for Steganography, Information Hiding, 10th International Workshop 2008 [pdf]
  • Estimation of Primary Quantization Matrix for Steganalysis of Double-Compressed JPEG Images, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 27--January 31 2008 [pdf]
  • Detection of double-compression in JPEG images for applications in steganography, IEEE Transactions onInformation Forensics and Security 2008 [pdf]
  • Kernel Methods in Steganalysis, 2008 [pdf]
2007
  • Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, Proceedings of the 9th workshop on Multimedia & security 2007 [pdf]
  • Merging {M}arkov and {DCT} Features for Multi-Class {JPEG} Steganalysis, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, January 29--February 1 2007 [pdf]
2006
  • Determining the {S}tego {A}lgorithm for {JPEG} {I}mages, Special {I}ssue of {IEE} {P}roceedings --- {I}nformation {S}ecurity 2006 [pdf]
  • Multiclass Blind Steganalyasis for {JPEG} Images, Proceedings {SPIE}, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, January 16--19 2006 [pdf]
2005
  • Towards Multi-Class Blind Steganalyzer for {JPEG} Images, International Workshop on Digital Watermarking 2005 [pdf]