The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Miroslav Goljan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jiri Fridrich, Miroslav Goljan
    Images with Self-Correcting Capabilities. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1999, pp:792-796 [Conf]
  2. Jiri Fridrich, Miroslav Goljan, Arnold C. Baldoza
    New Fragile Authentication Watermark for Images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  3. Jan Lukas, Jessica J. Fridrich, Miroslav Goljan
    Digital "bullet scratches" for images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:65-68 [Conf]
  4. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Efficient Wet Paper Codes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:204-218 [Conf]
  5. Miroslav Goljan, Jessica J. Fridrich, Rui Du
    Distortion-Free Data Embedding for Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:27-41 [Conf]
  6. Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea
    Steganalysis of JPEG Images: Breaking the F5 Algorithm. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:310-323 [Conf]
  7. Jiri Fridrich, Miroslav Goljan, Rui Du
    Invertible Authentication Watermark for JPEG Images. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:223-227 [Conf]
  8. Jessica J. Fridrich, Miroslav Goljan
    On estimation of secret message length in LSB steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:23-34 [Conf]
  9. Jessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak
    Lossless data embedding with file size preservation. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:354-365 [Conf]
  10. Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal
    Writing on wet paper. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:328-340 [Conf]
  11. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Searching for the stego-key. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:70-82 [Conf]
  12. Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak
    Forensic steganalysis: determining the stego key in spatial domain steganography. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:631-642 [Conf]
  13. Jessica J. Fridrich, David Soukal, Miroslav Goljan
    Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:595-606 [Conf]
  14. Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou
    Handling uneven embedding capacity in binary images: a revisit. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:194-205 [Conf]
  15. Jessica J. Fridrich, Miroslav Goljan, Rui Du
    Detecting LSB Steganography in Color and Gray-Scale Images. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:4, pp:22-28 [Journal]
  16. Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal
    Quantitative steganalysis of digital images: estimating the secret message length. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:288-302 [Journal]
  17. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Perturbed quantization steganography. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:98-107 [Journal]
  18. Jessica J. Fridrich, Miroslav Goljan, Rui Du
    Reliable detection of LSB steganography in color and grayscale images. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:27-30 [Conf]
  19. Jessica J. Fridrich, Miroslav Goljan, David Soukal
    Perturbed quantization steganography with wet paper codes. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:4-15 [Conf]

  20. Identifying Common Source Digital Camera from Image Pairs. [Citation Graph (, )][DBLP]


  21. Using sensor pattern noise for camera model identification. [Citation Graph (, )][DBLP]


  22. Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. [Citation Graph (, )][DBLP]


  23. Digital Camera Identification from Images - Estimating False Acceptance Probability. [Citation Graph (, )][DBLP]


  24. Large scale test of sensor fingerprint camera identification. [Citation Graph (, )][DBLP]


  25. Sensor noise camera identification: countering counter-forensics. [Citation Graph (, )][DBLP]


  26. Managing a large database of camera fingerprints. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002