Jessica J. Fridrich
Orcid: 0009-0003-6516-628XAffiliations:
- Binghamton University, Vestal, NY, USA
According to our database1,
Jessica J. Fridrich
authored at least 189 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2016, "For contributions to digital media forensics, steganography, and steganalysis".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on isni.org
On csauthors.net:
Bibliography
2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
IEEE Signal Process. Mag., July, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the Media Watermarking, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model.
IEEE Trans. Circuits Syst. Video Technol., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
IEEE Signal Process. Lett., 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
Proceedings of the Media Watermarking, 2020
Proceedings of the Media Watermarking, 2020
Proceedings of the Media Watermarking, 2020
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Signal Process. Lett., 2019
A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019
Proceedings of the Media Watermarking, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Practical strategies for content-adaptive batch steganography and pooled steganalysis.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the Media Watermarking, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model.
Proceedings of the Media Watermarking, 2015
Proceedings of the Media Watermarking, 2015
Proceedings of the Media Watermarking, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
EURASIP J. Inf. Secur., 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the Media Watermarking, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the Media Watermarking, 2013
Sensor fingerprint digests for fast camera identification from geometrically distorted images.
Proceedings of the Media Watermarking, 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Media Watermarking, 2012
Proceedings of the Media Watermarking, 2012
Proceedings of the Media Watermarking, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
2011
Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236].
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Minimizing additive distortion functions with non-binary embedding operation in steganography.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Media Forensics and Security II, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation.
Proceedings of the IEEE International Conference on Acoustics, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Inf. Forensics Secur., 2008
Trans. Data Hiding Multim. Secur., 2008
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images.
Proceedings of the Security, 2008
Influence of embedding strategies on security of steganographic methods in the JPEG domain.
Proceedings of the Security, 2008
Proceedings of the Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the International Conference on Image Processing, 2008
2007
Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes
CoRR, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the International Conference on Image Processing, 2007
2006
IEEE Trans. Inf. Forensics Secur., 2006
IEEE Trans. Inf. Forensics Secur., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Stochastic approach to secret message length estimation in ±k embedding steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Information Hiding, 7th International Workshop, 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005
2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.
Proceedings of the Information Hiding, 6th International Workshop, 2004
2003
Multim. Syst., 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
2002
J. Electronic Imaging, 2002
EURASIP J. Adv. Signal Process., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the Information Hiding, 5th International Workshop, 2002
2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the Information Hiding, 4th International Workshop, 2001
2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
Proceedings of the 10th European Signal Processing Conference, 2000
1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999