Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("FRIDRICH, Jessica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 45

  • Page / 2
Export

Selection :

  • and

IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)Fridrich, Jessica.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-24207-4, IX, 369 p, isbn 3-540-24207-4Conference Proceedings

Random Projections of Residuals for Digital Image SteganalysisHOLUB, Vojtech; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1996-2006, issn 1556-6013, 11 p.Article

An asymmetric security mechanism for navigation signalsKUHN, Markus G.Lecture notes in computer science. 2004, pp 239-252, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Reversing global and local geometrical distortions in image watermarkingBOGUMIŁ, Dariusz.Lecture notes in computer science. 2004, pp 25-37, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper

Effect of Image Downsampling on Steganographic SecurityKODOVSKY, Jan; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 752-762, issn 1556-6013, 11 p.Article

Improved detection of LSB steganography in grayscale imagesKER, Andrew D.Lecture notes in computer science. 2004, pp 97-115, issn 0302-9743, isbn 3-540-24207-4, 19 p.Conference Paper

Security of fragile authentication watermarks with localizationFRIDRICH, Jessica.SPIE proceedings series. 2002, pp 691-700, isbn 0-8194-4415-4Conference Paper

Efficient wet paper codesFRIDRICH, Jessica; GOLJAN, Miroslav; SOUKAL, David et al.Lecture notes in computer science. 2005, pp 204-218, issn 0302-9743, isbn 3-540-29039-7, 1Vol, 15 p.Conference Paper

An implementation of, and attacks on, zero-knowledge watermarkingCRAVER, Scott; LIU, Bede; WOLF, Wayne et al.Lecture notes in computer science. 2004, pp 1-12, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Reasoning about the anonymity provided by pool mixes that generate dummy trafficDIAZ, Claudia; PRENEEL, Bart.Lecture notes in computer science. 2004, pp 309-325, issn 0302-9743, isbn 3-540-24207-4, 17 p.Conference Paper

Fixed-distortion orthogonal dirty paper coding for perceptual still image watermarkingABRARDO, Andrea; BARNI, Mauro.Lecture notes in computer science. 2004, pp 52-66, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Statistical disclosure or intersection attacks on anonymity systemsDANEZIS, George; SERJANTOV, Andrei.Lecture notes in computer science. 2004, pp 293-308, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Threading software watermarksNAGRA, Jasvir; THOMBORSON, Clark.Lecture notes in computer science. 2004, pp 208-223, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

On the possibility of non-invertible watermarking schemesQIMING LI; CHANG, Ee-Chien.Lecture notes in computer science. 2004, pp 13-24, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

On achievable regions of public multiple-access Gaussian watermarking systemsWEI SUN; YANG, En-Hui.Lecture notes in computer science. 2004, pp 38-51, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Information hiding in finite state machineLIN YUAN; GANG QU.Lecture notes in computer science. 2004, pp 340-354, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Relative generic computational forensic techniquesWONG, Jennifer L; POTKONJAK, Miodrag.Lecture notes in computer science. 2004, pp 148-163, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

An improved sample pairs method for detection of LSB embeddingPEIZHONG LU; XIANGYANG LUO; QINGYANG TANG et al.Lecture notes in computer science. 2004, pp 116-127, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Comparison of Orthogonality Estimation Methods for the Two-Dimensional Separations of PeptidesGILAR, Martin; FRIDRICH, Jessica; SCHURE, Mark R et al.Analytical chemistry (Washington). 2012, Vol 84, Num 20, pp 8722-8732, issn 0003-2700, 11 p.Article

Steganalysis of JPEG images: Breaking the F5 algorithmFRIDRICH, Jessica; GOLJAN, Miroslav; HOGEA, Dorin et al.Lecture notes in computer science. 2003, pp 310-323, issn 0302-9743, isbn 3-540-00421-1, 14 p.Conference Paper

Distortion-free data embedding for imagesGOLJAN, Miroslav; FRIDRICH, Jessica J; RUI DU et al.Lecture notes in computer science. 2001, pp 27-41, issn 0302-9743, isbn 3-540-42733-3Conference Paper

Camera Identification from Cropped and Scaled ImagesGOLJAN, Miroslav; FRIDRICH, Jessica.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 68190E.1-68190E.13, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Estimation of Primary Quantization Matrix for Steganalysis of Double-Compressed JPEG ImagesPEVNY, Tomas; FRIDRICH, Jessica.Proceedings of SPIE, the International Society for Optical Engineering. 2008, pp 681911.1-681911.13, issn 0277-786X, isbn 978-0-8194-6991-5Conference Paper

Lossless data embedding for all image formatsFRIDRICH, Jessica; GOLJAN, Miroslav; DU, Rui et al.SPIE proceedings series. 2002, pp 572-583, isbn 0-8194-4415-4Conference Paper

New methodology for breaking steganographic techniques for JPEGsFRIDRICH, Jessica; GOLJAN, Miroslav; HOGEA, Dorin et al.SPIE proceedings series. 2003, pp 143-155, isbn 0-8194-4820-6, 13 p.Conference Paper

  • Page / 2