Jessica J. Fridrich

Affiliations:
  • Binghamton University, Vestal, NY, USA


According to our database1, Jessica J. Fridrich authored at least 188 papers between 1999 and 2023.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to digital media forensics, steganography, and steganalysis".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Information Forensics and Security: A quarter-century-long journey.
IEEE Signal Process. Mag., July, 2023

Explaining the Bag Gain in Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Observing Bag Gain in JPEG Batch Steganography.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

Cost polarization by dequantizing for JPEG steganography.
Proceedings of the Media Watermarking, 2023

Limits of Data Driven Steganography Detectors.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

2022
Detector-Informed Batch Steganography and Pooled Steganalysis.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

2021
Natural Steganography in JPEG Domain With a Linear Development Pipeline.
IEEE Trans. Inf. Forensics Secur., 2021

Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model.
IEEE Trans. Circuits Syst. Video Technol., 2021

CNN Steganalyzers Leverage Local Embedding Artifacts.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Data Augmentation for JPEG Steganalysis.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Improving EfficientNet for JPEG Steganalysis.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

How to Pretrain for Steganalysis.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Revisiting Perturbed Quantization.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Extending the Reverse JPEG Compatibility Attack to Double Compressed Images.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Reverse JPEG Compatibility Attack.
IEEE Trans. Inf. Forensics Secur., 2020

An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHot Solution.
IEEE Signal Process. Lett., 2020

ImageNet Pre-trained CNNs for JPEG Steganalysis.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

JPEG Steganalysis Detectors Scalable With Respect to Compression Quality.
Proceedings of the Media Watermarking, 2020

Minimum Perturbation Cost Modulation for Side-Informed Steganography.
Proceedings of the Media Watermarking, 2020

Synchronizing Embedding Changes in Side-Informed Steganography.
Proceedings of the Media Watermarking, 2020

Turning Cost-Based Steganography into Model-Based.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Deep Residual Network for Steganalysis of Digital Images.
IEEE Trans. Inf. Forensics Secur., 2019

Payload Scaling for Adaptive Steganography: An Empirical Study.
IEEE Signal Process. Lett., 2019

A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain.
Proceedings of the Media Watermarking, 2019

Detection of Diversified Stego Sources with CNNs.
Proceedings of the Media Watermarking, 2019

Are we there yet?
Proceedings of the Media Watermarking, 2019

Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Reference Channels for Steganalysis of Images with Convolutional Neural Networks.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Effect of JPEG Quality on Steganographic Security.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Applications of Explicit Non-Linear Feature Maps in Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2018

Steganalyzing Images of Arbitrary Size with CNNs.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Image Manipulation Detection Using Sensor Linear Pattern.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Natural Steganography in JPEG Compressed Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Deep Learning Regressors for Quantitative Steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Deep Learning for Detecting Processing History of Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

2017
Steganography With Multiple JPEG Images of the Same Scene.
IEEE Trans. Inf. Forensics Secur., 2017

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Model Based Steganography with Precover.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Scalable Processing History Detector for JPEG Images.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Nonlinear Feature Normalization in Steganalysis.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Steganography with two JPEGs of the same scene.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Practical strategies for content-adaptive batch steganography and pooled steganalysis.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
Content-Adaptive Steganography by Minimizing Statistical Detectability.
IEEE Trans. Inf. Forensics Secur., 2016

Steganalysis Features for Content-Adaptive JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2016

Toss that BOSSbase, Alice!
Proceedings of the Media Watermarking, 2016

Effect of Compression on Sensor-Fingerprint Based Camera Identification.
Proceedings of the Media Watermarking, 2016

Improving Selection-Channel-Aware Steganalysis Features.
Proceedings of the Media Watermarking, 2016

Boosting Steganalysis with Explicit Feature Maps.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

Effect of saturated pixels on security of steganographic schemes for digital images.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT.
IEEE Trans. Inf. Forensics Secur., 2015

Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory.
IEEE Trans. Inf. Forensics Secur., 2015

Side-informed steganography with additive distortion.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model.
Proceedings of the Media Watermarking, 2015

Phase-aware projection model for steganalysis of JPEG images.
Proceedings of the Media Watermarking, 2015

CFA-aware features for steganalysis of color images.
Proceedings of the Media Watermarking, 2015

Effect of Imprecise Knowledge of the Selection Channel on Steganalysis.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

Improving Steganographic Security by Synchronizing the Selection Channel.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
Effect of Image Downsampling on Steganographic Security.
IEEE Trans. Inf. Forensics Secur., 2014

Universal distortion function for steganography in an arbitrary domain.
EURASIP J. Inf. Secur., 2014

Rich model for Steganalysis of color images.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Selection-channel-aware rich model for Steganalysis of digital images.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Theoretical model of the FLD ensemble classifier based on hypothesis testing theory.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Study of cover source mismatch in steganalysis and ways to mitigate its impact.
Proceedings of the Media Watermarking, 2014

Challenging the doctrines of JPEG steganography.
Proceedings of the Media Watermarking, 2014

Estimation of lens distortion correction from single images.
Proceedings of the Media Watermarking, 2014

Further study on the security of S-UNIWARD.
Proceedings of the Media Watermarking, 2014

Detection of content adaptive LSB matching: a game theory approach.
Proceedings of the Media Watermarking, 2014

2013
Random Projections of Residuals for Digital Image Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2013

Effect of Cover Quantization on Steganographic Fisher Information.
IEEE Trans. Inf. Forensics Secur., 2013

Quantitative steganalysis using rich models.
Proceedings of the Media Watermarking, 2013

Random projections of residuals as an alternative to co-occurrences in steganalysis.
Proceedings of the Media Watermarking, 2013

Sensor fingerprint digests for fast camera identification from geometrically distorted images.
Proceedings of the Media Watermarking, 2013

On the role of side information in steganography in empirical covers.
Proceedings of the Media Watermarking, 2013

Moving steganography and steganalysis from the laboratory into the real world.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Digital image steganography using universal distortion.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Steganalysis in resized images.
Proceedings of the IEEE International Conference on Acoustics, 2013

Multivariate gaussian model for designing additive distortion for steganography.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
From Blind to Quantitative Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2012

Ensemble Classifiers for Steganalysis of Digital Media.
IEEE Trans. Inf. Forensics Secur., 2012

Rich Models for Steganalysis of Digital Images.
IEEE Trans. Inf. Forensics Secur., 2012

Designing steganographic distortion using directional filters.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Steganalysis of JPEG images using rich models.
Proceedings of the Media Watermarking, 2012

Optimizing pixel predictors for steganalysis.
Proceedings of the Media Watermarking, 2012

Sensor-fingerprint based identification of images corrected for lens distortion.
Proceedings of the Media Watermarking, 2012

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts.
Proceedings of the Information Hiding - 14th International Conference, 2012

Steganalysis of LSB Replacement Using Parity-Aware Features.
Proceedings of the Information Hiding - 14th International Conference, 2012

2011
Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236].
IEEE Trans. Inf. Forensics Secur., 2011

Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification.
IEEE Trans. Inf. Forensics Secur., 2011

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.
IEEE Trans. Inf. Forensics Secur., 2011

On dangers of overtraining steganography to incomplete cover model.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Steganalysis in high dimensions: fusing classifiers built on random subspaces.
Proceedings of the Media Forensics and Security III, 2011

Determining approximate age of digital images using sensor defects.
Proceedings of the Media Forensics and Security III, 2011

Design of adaptive steganographic schemes for digital images.
Proceedings of the Media Forensics and Security III, 2011

Modern Trends in Steganography and Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Steganalysis of Content-Adaptive Steganography in Spatial Domain.
Proceedings of the Information Hiding - 13th International Conference, 2011

Breaking HUGO - The Process Discovery.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Steganalysis by subtractive pixel adjacency matrix.
IEEE Trans. Inf. Forensics Secur., 2010

Quantitative Structural Steganalysis of Jsteg.
IEEE Trans. Inf. Forensics Secur., 2010

Gibbs Construction in Steganography.
IEEE Trans. Inf. Forensics Secur., 2010

Minimizing additive distortion functions with non-binary embedding operation in steganography.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Quantitative steganalysis of LSB embedding in JPEG domain.
Proceedings of the Multimedia and Security Workshop, 2010

Steganography using Gibbs random fields.
Proceedings of the Multimedia and Security Workshop, 2010

Modern steganalysis can detect YASS.
Proceedings of the Media Forensics and Security II, 2010

On detection of median filtering in digital images.
Proceedings of the Media Forensics and Security II, 2010

Managing a large database of camera fingerprints.
Proceedings of the Media Forensics and Security II, 2010

Sensor noise camera identification: countering counter-forensics.
Proceedings of the Media Forensics and Security II, 2010

Minimizing embedding impact in steganography using trellis-coded quantization.
Proceedings of the Media Forensics and Security II, 2010

2009
Asymptotic behavior of the ZZW embedding construction.
IEEE Trans. Inf. Forensics Secur., 2009

Digital image forensics.
IEEE Signal Process. Mag., 2009

Wet ZZW construction for steganography.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Calibration revisited.
Proceedings of the Multimedia and Security Workshop, 2009

Large scale test of sensor fingerprint camera identification.
Proceedings of the Media Forensics and Security I, 2009

The square root law of steganographic capacity for Markov covers.
Proceedings of the Media Forensics and Security I, 2009

Fisher Information Determines Capacity of ε-Secure Steganography.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation.
Proceedings of the IEEE International Conference on Acoustics, 2009

2008
Multiclass Detector of Current Steganographic Methods for JPEG Format.
IEEE Trans. Inf. Forensics Secur., 2008

Detection of Double-Compression in JPEG Images for Applications in Steganography.
IEEE Trans. Inf. Forensics Secur., 2008

Determining Image Origin and Integrity Using Sensor Noise.
IEEE Trans. Inf. Forensics Secur., 2008

Constructing Good Covering Codes for Applications in Steganography.
Trans. Data Hiding Multim. Secur., 2008

Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images.
Proceedings of the Security, 2008

Influence of embedding strategies on security of steganographic methods in the JPEG domain.
Proceedings of the Security, 2008

Camera identification from printed images.
Proceedings of the Security, 2008

Camera identification from cropped and scaled images.
Proceedings of the Security, 2008

Novelty detection in blind steganalysis.
Proceedings of the 10th workshop on Multimedia & Security, 2008

On completeness of feature spaces in blind steganalysis.
Proceedings of the 10th workshop on Multimedia & Security, 2008

The square root law of steganographic capacity.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Benchmarking for Steganography.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Using sensor pattern noise for camera model identification.
Proceedings of the International Conference on Image Processing, 2008

2007
Grid Colorings in Steganography.
IEEE Trans. Inf. Theory, 2007

Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes
CoRR, 2007

Merging Markov and DCT features for multi-class JPEG steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Practical methods for minimizing embedding impact in steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Source digital camcorder identification using sensor photo response non-uniformity.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Digital imaging sensor identification (further study).
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Identifying Common Source Digital Camera from Image Pairs.
Proceedings of the International Conference on Image Processing, 2007

2006
Digital camera identification from sensor pattern noise.
IEEE Trans. Inf. Forensics Secur., 2006

Matrix embedding for large payloads.
IEEE Trans. Inf. Forensics Secur., 2006

Wet paper codes with improved embedding efficiency.
IEEE Trans. Inf. Forensics Secur., 2006

Multi-class blind steganalysis for JPEG images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Detecting digital image forgeries using sensor pattern noise.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

New blind steganalysis and its implications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Minimizing the embedding impact in steganography.
Proceedings of the 8th workshop on Multimedia & Security, 2006

On Steganographic Embedding Efficiency.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Writing on wet paper.
IEEE Trans. Signal Process., 2005

Perturbed quantization steganography.
Multim. Syst., 2005

Handling uneven embedding capacity in binary images: a revisit.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Stochastic approach to secret message length estimation in ±k embedding steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Forensic steganalysis: determining the stego key in spatial domain steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Towards Multi-class Blind Steganalyzer for JPEG Images.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Efficient Wet Paper Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Digital "bullet scratches" for images.
Proceedings of the 2005 International Conference on Image Processing, 2005

Determining digital image origin using sensor imperfections.
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005

Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics.
Proceedings of the Communications and Multimedia Security, 2005

2004
Searching for the stego-key.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Lossless data embedding with file size preservation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

On estimation of secret message length in LSB steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Perturbed quantization steganography with wet paper codes.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Introduction to the ACM multimedia and security workshop.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes.
Proceedings of the Information Hiding, 6th International Workshop, 2004

2003
Security of data hiding technologies.
Signal Process., 2003

Quantitative steganalysis of digital images: estimating the secret message length.
Multim. Syst., 2003

Higher-order statistical steganalysis of palette images.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

New methodology for breaking steganographic techniques for JPEGs.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Digital image steganography using stochastic modulation.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique.
J. Electronic Imaging, 2002

Lossless Data Embedding - New Paradigm in Digital Watermarking.
EURASIP J. Adv. Signal Process., 2002

Editorial.
EURASIP J. Adv. Signal Process., 2002

Lossless data embedding for all image formats.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Practical steganalysis of digital images: state of the art.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Security of fragile authentication watermarks with localization.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Steganalysis of JPEG Images: Breaking the F5 Algorithm.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Detecting LSB Steganography in Color and Gray-Scale Images.
IEEE Multim., 2001

Invertible authentication.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Reliable detection of LSB steganography in color and grayscale images.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Distortion-Free Data Embedding for Images.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Further attacks on Yeung-Mintzer fragile watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Visual hash for oblivious watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
Comparing robustness of watermarking techniques.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999


  Loading...