au.\*:("Fridrich, Jessica")
Results 1 to 25 of 72
Selection :
IH 2004 : information hiding (Toronto ON, 23-25 May 2004, revised selected papers)Fridrich, Jessica.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-24207-4, IX, 369 p, isbn 3-540-24207-4Conference Proceedings
Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemesFRIDRICH, Jessica.Lecture notes in computer science. 2004, pp 67-81, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Effect of Cover Quantization on Steganographic Fisher InformationFRIDRICH, Jessica.IEEE transactions on information forensics and security. 2013, Vol 8, Num 1-2, pp 361-373, issn 1556-6013, 13 p.Article
An asymmetric security mechanism for navigation signalsKUHN, Markus G.Lecture notes in computer science. 2004, pp 239-252, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
Reversing global and local geometrical distortions in image watermarkingBOGUMIŁ, Dariusz.Lecture notes in computer science. 2004, pp 25-37, issn 0302-9743, isbn 3-540-24207-4, 13 p.Conference Paper
Improved detection of LSB steganography in grayscale imagesKER, Andrew D.Lecture notes in computer science. 2004, pp 97-115, issn 0302-9743, isbn 3-540-24207-4, 19 p.Conference Paper
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ringMURATANI, Hirofumi.Lecture notes in computer science. 2004, pp 282-292, issn 0302-9743, isbn 3-540-24207-4, 11 p.Conference Paper
A method of linguistic steganography based on collocationally-verified synonymyBOLSHAKOV, Igor A.Lecture notes in computer science. 2004, pp 180-191, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
Random Projections of Residuals for Digital Image SteganalysisHOLUB, Vojtech; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1996-2006, issn 1556-6013, 11 p.Article
Grid colorings in steganographyFRIDRICH, Jessica; LISONEK, Petr.IEEE transactions on information theory. 2007, Vol 53, Num 4, pp 1547-1549, issn 0018-9448, 3 p.Article
Effect of Image Downsampling on Steganographic SecurityKODOVSKY, Jan; FRIDRICH, Jessica.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 752-762, issn 1556-6013, 11 p.Article
An implementation of, and attacks on, zero-knowledge watermarkingCRAVER, Scott; LIU, Bede; WOLF, Wayne et al.Lecture notes in computer science. 2004, pp 1-12, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
Reasoning about the anonymity provided by pool mixes that generate dummy trafficDIAZ, Claudia; PRENEEL, Bart.Lecture notes in computer science. 2004, pp 309-325, issn 0302-9743, isbn 3-540-24207-4, 17 p.Conference Paper
Fixed-distortion orthogonal dirty paper coding for perceptual still image watermarkingABRARDO, Andrea; BARNI, Mauro.Lecture notes in computer science. 2004, pp 52-66, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Statistical disclosure or intersection attacks on anonymity systemsDANEZIS, George; SERJANTOV, Andrei.Lecture notes in computer science. 2004, pp 293-308, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Threading software watermarksNAGRA, Jasvir; THOMBORSON, Clark.Lecture notes in computer science. 2004, pp 208-223, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
On the possibility of non-invertible watermarking schemesQIMING LI; CHANG, Ee-Chien.Lecture notes in computer science. 2004, pp 13-24, issn 0302-9743, isbn 3-540-24207-4, 12 p.Conference Paper
On achievable regions of public multiple-access Gaussian watermarking systemsWEI SUN; YANG, En-Hui.Lecture notes in computer science. 2004, pp 38-51, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
Information hiding in finite state machineLIN YUAN; GANG QU.Lecture notes in computer science. 2004, pp 340-354, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Relative generic computational forensic techniquesWONG, Jennifer L; POTKONJAK, Miodrag.Lecture notes in computer science. 2004, pp 148-163, issn 0302-9743, isbn 3-540-24207-4, 16 p.Conference Paper
Covert channels for collusion in online computer gamesMURDOCH, Steven J; ZIELINSKI, Piotr.Lecture notes in computer science. 2004, pp 355-369, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Exploiting preserved statistics for steganalysisBÖHME, Rainer; WESTFELD, Andreas.Lecture notes in computer science. 2004, pp 82-96, issn 0302-9743, isbn 3-540-24207-4, 15 p.Conference Paper
Statistical tools for digital forensicsPOPESCU, Alin C; FARID, Hany.Lecture notes in computer science. 2004, pp 128-147, issn 0302-9743, isbn 3-540-24207-4, 20 p.Conference Paper
The hitting set attack on anonymity protocolsKESDOGAN, Dogan; PIMENIDIS, Lexi.Lecture notes in computer science. 2004, pp 326-339, issn 0302-9743, isbn 3-540-24207-4, 14 p.Conference Paper
Efficient wet paper codesFRIDRICH, Jessica; GOLJAN, Miroslav; SOUKAL, David et al.Lecture notes in computer science. 2005, pp 204-218, issn 0302-9743, isbn 3-540-29039-7, 1Vol, 15 p.Conference Paper