The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jessica J. Fridrich: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Taras Holotyak, Jessica J. Fridrich, Sviatoslav Voloshynovskiy
    Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:273-274 [Conf]
  2. Jan Lukas, Jessica J. Fridrich, Miroslav Goljan
    Digital "bullet scratches" for images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:65-68 [Conf]
  3. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Efficient Wet Paper Codes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:204-218 [Conf]
  4. Miroslav Goljan, Jessica J. Fridrich, Rui Du
    Distortion-Free Data Embedding for Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:27-41 [Conf]
  5. Jessica J. Fridrich
    Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:67-81 [Conf]
  6. Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea
    Steganalysis of JPEG Images: Breaking the F5 Algorithm. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:310-323 [Conf]
  7. Tomás Pevný, Jessica J. Fridrich
    Towards Multi-class Blind Steganalyzer for JPEG Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:39-53 [Conf]
  8. Jessica J. Fridrich, Miroslav Goljan
    On estimation of secret message length in LSB steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:23-34 [Conf]
  9. Jessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak
    Lossless data embedding with file size preservation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:354-365 [Conf]
  10. Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal
    Writing on wet paper. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:328-340 [Conf]
  11. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Searching for the stego-key. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:70-82 [Conf]
  12. Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak
    Forensic steganalysis: determining the stego key in spatial domain steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:631-642 [Conf]
  13. Jessica J. Fridrich, David Soukal, Miroslav Goljan
    Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:595-606 [Conf]
  14. Taras Holotyak, Jessica J. Fridrich, David Soukal
    Stochastic approach to secret message length estimation in ±k embedding steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:673-684 [Conf]
  15. Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou
    Handling uneven embedding capacity in binary images: a revisit. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:194-205 [Conf]
  16. Jessica J. Fridrich, Miroslav Goljan, Rui Du
    Detecting LSB Steganography in Color and Gray-Scale Images. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:4, pp:22-28 [Journal]
  17. Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal
    Quantitative steganalysis of digital images: estimating the secret message length. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:288-302 [Journal]
  18. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Perturbed quantization steganography. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:98-107 [Journal]
  19. Jessica J. Fridrich, Petr Lisonek
    Grid Colorings in Steganography. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:4, pp:1547-1549 [Journal]
  20. Sviatoslav Voloshynovskiy, Thierry Pun, Jessica J. Fridrich, Fernando Pérez-González, N. Memon
    Security of data hiding technologies. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal]
  21. Jessica J. Fridrich, Petr Lisonek, David Soukal
    On Steganographic Embedding Efficiency. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:282-296 [Conf]
  22. Jessica J. Fridrich, Tomás Pevný, Jan Kodovský
    Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:3-14 [Conf]
  23. Jessica J. Fridrich, Miroslav Goljan, Rui Du
    Reliable detection of LSB steganography in color and grayscale images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:27-30 [Conf]
  24. Jessica J. Fridrich
    Minimizing the embedding impact in steganography. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:2-10 [Conf]
  25. Jana Dittmann, Jessica J. Fridrich
    Introduction to the ACM multimedia and security workshop. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:1-3 [Conf]
  26. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Perturbed quantization steganography with wet paper codes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:4-15 [Conf]
  27. Tomas Filler, Jessica J. Fridrich
    Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  28. Identifying Common Source Digital Camera from Image Pairs. [Citation Graph (, )][DBLP]


  29. Using sensor pattern noise for camera model identification. [Citation Graph (, )][DBLP]


  30. Benchmarking for Steganography. [Citation Graph (, )][DBLP]


  31. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. [Citation Graph (, )][DBLP]


  32. Fisher Information Determines Capacity of ε-Secure Steganography. [Citation Graph (, )][DBLP]


  33. The square root law of steganographic capacity. [Citation Graph (, )][DBLP]


  34. Novelty detection in blind steganalysis. [Citation Graph (, )][DBLP]


  35. On completeness of feature spaces in blind steganalysis. [Citation Graph (, )][DBLP]


  36. Complete characterization of perfectly secure stego-systems with mutually independent embedding operation. [Citation Graph (, )][DBLP]


  37. From blind to quantitative steganalysis. [Citation Graph (, )][DBLP]


  38. Large scale test of sensor fingerprint camera identification. [Citation Graph (, )][DBLP]


  39. Modern steganalysis can detect YASS. [Citation Graph (, )][DBLP]


  40. Minimizing embedding impact in steganography using trellis-coded quantization. [Citation Graph (, )][DBLP]


  41. Sensor noise camera identification: countering counter-forensics. [Citation Graph (, )][DBLP]


  42. Managing a large database of camera fingerprints. [Citation Graph (, )][DBLP]


  43. On detection of median filtering in digital images. [Citation Graph (, )][DBLP]


  44. The square root law of steganographic capacity for Markov covers. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002