Follow
Jessica J Fridrich
Jessica J Fridrich
Professor of Electrical and Computer Engineering, Binghamton University
Verified email at binghamton.edu - Homepage
Title
Cited by
Year
Improving Steganographic Security with Source Biasing
E Dworetzky, E Kaziakhmedov, J Fridrich
Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia …, 2024
2024
Python Implementation of Natural Steganography: Notebooks accompanying the paper published in IEEE TIFS.
T Taburet, W Sawaya, P Bas, J Fridrich
2024
Secure Payload Scaling For Source Adaptive Payload Allocation
E Dworetzky, E Kaziakhmedov, J Fridrich
Electronic Imaging 36, 1-11, 2024
2024
Analyzing Quantitative Detectors for Content-Adaptive Steganography
E Kaziakhmedov, E Dworetzky, J Fridrich
Electronic Imaging 36, 1-11, 2024
2024
Observing Bag Gain in JPEG Batch Steganography
E Kaziakhmedov, E Dworetzky, J Fridrich
2023 IEEE International Workshop on Information Forensics and Security (WIFS …, 2023
12023
Information Forensics and Security: A quarter-century-long journey
M Barni, P Campisi, EJ Delp, G Doërr, J Fridrich, N Memon, ...
IEEE Signal Processing Magazine 40 (5), 67-79, 2023
82023
On comparing ad hoc detectors with statistical hypothesis tests
E Dworetzky, E Kaziakhmedov, J Fridrich
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023
12023
Limits of Data Driven Steganography Detectors
E Kaziakhmedov, E Dworetzky, J Fridrich
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023
2023
Advancing the JPEG compatibility attack: Theory, performance, robustness, and practice
E Dworetzky, E Kaziakhmedov, J Fridrich
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia …, 2023
22023
Explaining the bag gain in batch steganography
E Dworetzky, J Fridrich
IEEE Transactions on Information Forensics and Security 18, 3031-3043, 2023
32023
Cost polarization by dequantizing for JPEG steganography
E Kaziakhmedov, Y Yousfi, E Dworetzky, J Fridrich
Electronic Imaging 35, 1-14, 2023
12023
Detector-informed batch steganography and pooled steganalysis
Y Yousfi, E Dworetzky, J Fridrich
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia …, 2022
62022
Data augmentation for JPEG steganalysis
T Itzhaki, Y Yousfi, J Fridrich
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
82021
CNN steganalyzers leverage local embedding artifacts
Y Yousfi, J Butora, J Fridrich
2021 IEEE International Workshop on Information Forensics and Security (WIFS …, 2021
42021
Data Augmentation for JPEG Steganalysis
Y Yousfi, T Itzhaki, J Fridrich
13th IEEE Workshop on Information Security and Forensics, 2021
2021
Improving EfficientNet for JPEG steganalysis
Y Yousfi, J Butora, J Fridrich, C Fuji Tsang
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
492021
Revisiting perturbed quantization
J Butora, J Fridrich
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
22021
How to pretrain for steganalysis
J Butora, Y Yousfi, J Fridrich
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
432021
Extending the reverse JPEG compatibility attack to double compressed images
J Butora, J Fridrich
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
42021
JPEG compatibility attack revisited
E Dworetzky, J Fridrich
IEEE transactions on information forensics and security, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20