Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Fridrich, Jessica")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 72

  • Page / 3
Export

Selection :

  • and

IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)Fridrich, Jessica.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-24207-4, IX, 369 p, isbn 3-540-24207-4Conference Proceedings

Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemesFRIDRICH, Jessica.Lecture notes in computer science. 2004, pp 67-81, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Effect of Cover Quantization on Steganographic Fisher InformationFRIDRICH, Jessica.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 361-373, issn 1556-6013, 13 p.Article

An asymmetric security mechanism for navigation signalsKUHN, Markus G.Lecture notes in computer science. 2004, pp 239-252, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Reversing global and local geometrical distortions in image watermarkingBOGUMIŁ, Dariusz.Lecture notes in computer science. 2004, pp 25-37, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper

Improved detection of LSB steganography in grayscale imagesKER, Andrew D.Lecture notes in computer science. 2004, pp 97-115, issn 0302-9743, isbn 3-540-24207-4, 19 p.Conference Paper

Optimization and evaluation of randomized c-secure CRT code defined on polynomial ringMURATANI, Hirofumi.Lecture notes in computer science. 2004, pp 282-292, issn 0302-9743, isbn 3-540-24207-4, 11 p.Conference Paper

A method of linguistic steganography based on collocationally-verified synonymyBOLSHAKOV, Igor A.Lecture notes in computer science. 2004, pp 180-191, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Random Projections of Residuals for Digital Image SteganalysisHOLUB, Vojtech; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1996-2006, issn 1556-6013, 11 p.Article

Grid colorings in steganographyFRIDRICH, Jessica; LISONEK, Petr.IEEE transactions on information theory. 2007, Vol 53, Num 4, pp 1547-1549, issn 0018-9448, 3 p.Article

Effect of Image Downsampling on Steganographic SecurityKODOVSKY, Jan; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 752-762, issn 1556-6013, 11 p.Article

An implementation of, and attacks on, zero-knowledge watermarkingCRAVER, Scott; LIU, Bede; WOLF, Wayne et al.Lecture notes in computer science. 2004, pp 1-12, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

Reasoning about the anonymity provided by pool mixes that generate dummy trafficDIAZ, Claudia; PRENEEL, Bart.Lecture notes in computer science. 2004, pp 309-325, issn 0302-9743, isbn 3-540-24207-4, 17 p.Conference Paper

Fixed-distortion orthogonal dirty paper coding for perceptual still image watermarkingABRARDO, Andrea; BARNI, Mauro.Lecture notes in computer science. 2004, pp 52-66, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Statistical disclosure or intersection attacks on anonymity systemsDANEZIS, George; SERJANTOV, Andrei.Lecture notes in computer science. 2004, pp 293-308, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Threading software watermarksNAGRA, Jasvir; THOMBORSON, Clark.Lecture notes in computer science. 2004, pp 208-223, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

On the possibility of non-invertible watermarking schemesQIMING LI; CHANG, Ee-Chien.Lecture notes in computer science. 2004, pp 13-24, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper

On achievable regions of public multiple-access Gaussian watermarking systemsWEI SUN; YANG, En-Hui.Lecture notes in computer science. 2004, pp 38-51, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Information hiding in finite state machineLIN YUAN; GANG QU.Lecture notes in computer science. 2004, pp 340-354, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Relative generic computational forensic techniquesWONG, Jennifer L; POTKONJAK, Miodrag.Lecture notes in computer science. 2004, pp 148-163, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper

Covert channels for collusion in online computer gamesMURDOCH, Steven J; ZIELINSKI, Piotr.Lecture notes in computer science. 2004, pp 355-369, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Exploiting preserved statistics for steganalysisBÖHME, Rainer; WESTFELD, Andreas.Lecture notes in computer science. 2004, pp 82-96, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper

Statistical tools for digital forensicsPOPESCU, Alin C; FARID, Hany.Lecture notes in computer science. 2004, pp 128-147, issn 0302-9743, isbn 3-540-24207-4, 20 p.Conference Paper

The hitting set attack on anonymity protocolsKESDOGAN, Dogan; PIMENIDIS, Lexi.Lecture notes in computer science. 2004, pp 326-339, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper

Efficient wet paper codesFRIDRICH, Jessica; GOLJAN, Miroslav; SOUKAL, David et al.Lecture notes in computer science. 2005, pp 204-218, issn 0302-9743, isbn 3-540-29039-7, 1Vol, 15 p.Conference Paper

  • Page / 3