Search the dblp DataBase
Jessica J. Fridrich :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Taras Holotyak , Jessica J. Fridrich , Sviatoslav Voloshynovskiy Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:273-274 [Conf ] Jan Lukas , Jessica J. Fridrich , Miroslav Goljan Digital "bullet scratches" for images. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2005, pp:65-68 [Conf ] Jessica J. Fridrich , Miroslav Goljan , David Soukal Efficient Wet Paper Codes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:204-218 [Conf ] Miroslav Goljan , Jessica J. Fridrich , Rui Du Distortion-Free Data Embedding for Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2001, pp:27-41 [Conf ] Jessica J. Fridrich Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:67-81 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Dorin Hogea Steganalysis of JPEG Images: Breaking the F5 Algorithm. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:310-323 [Conf ] Tomás Pevný , Jessica J. Fridrich Towards Multi-class Blind Steganalyzer for JPEG Images. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:39-53 [Conf ] Jessica J. Fridrich , Miroslav Goljan On estimation of secret message length in LSB steganography in spatial domain. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:23-34 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Qing Chen , Vivek Pathak Lossless data embedding with file size preservation. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:354-365 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Petr Lisonek , David Soukal Writing on wet paper. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:328-340 [Conf ] Jessica J. Fridrich , Miroslav Goljan , David Soukal Searching for the stego-key. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:70-82 [Conf ] Jessica J. Fridrich , Miroslav Goljan , David Soukal , Taras Holotyak Forensic steganalysis: determining the stego key in spatial domain steganography. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:631-642 [Conf ] Jessica J. Fridrich , David Soukal , Miroslav Goljan Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:595-606 [Conf ] Taras Holotyak , Jessica J. Fridrich , David Soukal Stochastic approach to secret message length estimation in ±k embedding steganography. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:673-684 [Conf ] Min Wu , Jessica J. Fridrich , Miroslav Goljan , Hongmei Gou Handling uneven embedding capacity in binary images: a revisit. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:194-205 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Rui Du Detecting LSB Steganography in Color and Gray-Scale Images. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2001, v:8, n:4, pp:22-28 [Journal ] Jessica J. Fridrich , Miroslav Goljan , Dorin Hogea , David Soukal Quantitative steganalysis of digital images: estimating the secret message length. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:288-302 [Journal ] Jessica J. Fridrich , Miroslav Goljan , David Soukal Perturbed quantization steganography. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2005, v:11, n:2, pp:98-107 [Journal ] Jessica J. Fridrich , Petr Lisonek Grid Colorings in Steganography. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2007, v:53, n:4, pp:1547-1549 [Journal ] Sviatoslav Voloshynovskiy , Thierry Pun , Jessica J. Fridrich , Fernando Pérez-González , N. Memon Security of data hiding technologies. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2003, v:83, n:10, pp:2065-2067 [Journal ] Jessica J. Fridrich , Petr Lisonek , David Soukal On Steganographic Embedding Efficiency. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:282-296 [Conf ] Jessica J. Fridrich , Tomás Pevný , Jan Kodovský Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:3-14 [Conf ] Jessica J. Fridrich , Miroslav Goljan , Rui Du Reliable detection of LSB steganography in color and grayscale images. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2001, pp:27-30 [Conf ] Jessica J. Fridrich Minimizing the embedding impact in steganography. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:2-10 [Conf ] Jana Dittmann , Jessica J. Fridrich Introduction to the ACM multimedia and security workshop. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:1-3 [Conf ] Jessica J. Fridrich , Miroslav Goljan , David Soukal Perturbed quantization steganography with wet paper codes. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:4-15 [Conf ] Tomas Filler , Jessica J. Fridrich Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Identifying Common Source Digital Camera from Image Pairs. [Citation Graph (, )][DBLP ] Using sensor pattern noise for camera model identification. [Citation Graph (, )][DBLP ] Benchmarking for Steganography. [Citation Graph (, )][DBLP ] Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. [Citation Graph (, )][DBLP ] Fisher Information Determines Capacity of ε-Secure Steganography. [Citation Graph (, )][DBLP ] The square root law of steganographic capacity. [Citation Graph (, )][DBLP ] Novelty detection in blind steganalysis. [Citation Graph (, )][DBLP ] On completeness of feature spaces in blind steganalysis. [Citation Graph (, )][DBLP ] Complete characterization of perfectly secure stego-systems with mutually independent embedding operation. [Citation Graph (, )][DBLP ] From blind to quantitative steganalysis. [Citation Graph (, )][DBLP ] Large scale test of sensor fingerprint camera identification. [Citation Graph (, )][DBLP ] Modern steganalysis can detect YASS. [Citation Graph (, )][DBLP ] Minimizing embedding impact in steganography using trellis-coded quantization. [Citation Graph (, )][DBLP ] Sensor noise camera identification: countering counter-forensics. [Citation Graph (, )][DBLP ] Managing a large database of camera fingerprints. [Citation Graph (, )][DBLP ] On detection of median filtering in digital images. [Citation Graph (, )][DBLP ] The square root law of steganographic capacity for Markov covers. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.302secs