Miroslav Goljan

According to our database1, Miroslav Goljan authored at least 66 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Make Your Enemy Your Friend: Improving Image Rotation Angle Estimation with Harmonics.
Proceedings of the IEEE International Conference on Acoustics, 2023

2021
A comparison study of CNN denoisers on PRNU extraction.
CoRR, 2021

Replacing DWT with DTCWT in blind image rotation angle estimation.
Proceedings of the Media Watermarking, 2021

2020
Semi-Blind Image Resampling Factor Estimation for PRNU Computation.
Proceedings of the Media Watermarking, 2020

2019
Camera Identification from HDR Images.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Image Manipulation Detection Using Sensor Linear Pattern.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Blind Detection of Image Rotation and Angle Estimation.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

2016
Effect of Compression on Sensor-Fingerprint Based Camera Identification.
Proceedings of the Media Watermarking, 2016

2015
CFA-aware features for steganalysis of color images.
Proceedings of the Media Watermarking, 2015

2014
Rich model for Steganalysis of color images.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

Estimation of lens distortion correction from single images.
Proceedings of the Media Watermarking, 2014

2013
Sensor fingerprint digests for fast camera identification from geometrically distorted images.
Proceedings of the Media Watermarking, 2013

2012
Sensor-fingerprint based identification of images corrected for lens distortion.
Proceedings of the Media Watermarking, 2012

2011
Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236].
IEEE Trans. Inf. Forensics Secur., 2011

Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification.
IEEE Trans. Inf. Forensics Secur., 2011

Determining approximate age of digital images using sensor defects.
Proceedings of the Media Forensics and Security III, 2011

Steganalysis of Content-Adaptive Steganography in Spatial Domain.
Proceedings of the Information Hiding - 13th International Conference, 2011

Breaking HUGO - The Process Discovery.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Managing a large database of camera fingerprints.
Proceedings of the Media Forensics and Security II, 2010

Sensor noise camera identification: countering counter-forensics.
Proceedings of the Media Forensics and Security II, 2010

2009
Secure Steganography in Multimedia Content.
EURASIP J. Inf. Secur., 2009

Large scale test of sensor fingerprint camera identification.
Proceedings of the Media Forensics and Security I, 2009

2008
Determining Image Origin and Integrity Using Sensor Noise.
IEEE Trans. Inf. Forensics Secur., 2008

Camera identification from printed images.
Proceedings of the Security, 2008

Camera identification from cropped and scaled images.
Proceedings of the Security, 2008

Digital Camera Identification from Images - Estimating False Acceptance Probability.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Using sensor pattern noise for camera model identification.
Proceedings of the International Conference on Image Processing, 2008

2007
Source digital camcorder identification using sensor photo response non-uniformity.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Digital imaging sensor identification (further study).
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Identifying Common Source Digital Camera from Image Pairs.
Proceedings of the International Conference on Image Processing, 2007

2006
Digital camera identification from sensor pattern noise.
IEEE Trans. Inf. Forensics Secur., 2006

Wet paper codes with improved embedding efficiency.
IEEE Trans. Inf. Forensics Secur., 2006

Detecting digital image forgeries using sensor pattern noise.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

New blind steganalysis and its implications.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Writing on wet paper.
IEEE Trans. Signal Process., 2005

Perturbed quantization steganography.
Multim. Syst., 2005

Handling uneven embedding capacity in binary images: a revisit.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Forensic steganalysis: determining the stego key in spatial domain steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Efficient Wet Paper Codes.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Digital "bullet scratches" for images.
Proceedings of the 2005 International Conference on Image Processing, 2005

Determining digital image origin using sensor imperfections.
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005

2004
Searching for the stego-key.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Lossless data embedding with file size preservation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

On estimation of secret message length in LSB steganography in spatial domain.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Perturbed quantization steganography with wet paper codes.
Proceedings of the 6th workshop on Multimedia & Security, 2004

2003
Quantitative steganalysis of digital images: estimating the secret message length.
Multim. Syst., 2003

Higher-order statistical steganalysis of palette images.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

New methodology for breaking steganographic techniques for JPEGs.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Digital image steganography using stochastic modulation.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

2002
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique.
J. Electronic Imaging, 2002

Lossless Data Embedding - New Paradigm in Digital Watermarking.
EURASIP J. Adv. Signal Process., 2002

Lossless data embedding for all image formats.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Practical steganalysis of digital images: state of the art.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Steganalysis of JPEG Images: Breaking the F5 Algorithm.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
Detecting LSB Steganography in Color and Gray-Scale Images.
IEEE Multim., 2001

Invertible authentication.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Reliable detection of LSB steganography in color and grayscale images.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

Invertible Authentication Watermark for JPEG Images.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Distortion-Free Data Embedding for Images.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Further attacks on Yeung-Mintzer fragile watermarking scheme.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

New Fragile Authentication Watermark for Images.
Proceedings of the 2000 International Conference on Image Processing, 2000

Digital watermarking for the authentication of AVS data.
Proceedings of the 10th European Signal Processing Conference, 2000

1999
Comparing robustness of watermarking techniques.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Images with Self-Correcting Capabilities.
Proceedings of the 1999 International Conference on Image Processing, 1999


  Loading...