2006 |
12 | EE | Jessica J. Fridrich,
Petr Lisonek,
David Soukal:
On Steganographic Embedding Efficiency.
Information Hiding 2006: 282-296 |
11 | EE | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal:
Wet paper codes with improved embedding efficiency.
IEEE Transactions on Information Forensics and Security 1(1): 102-110 (2006) |
10 | EE | Jessica J. Fridrich,
David Soukal:
Matrix embedding for large payloads.
IEEE Transactions on Information Forensics and Security 1(3): 390-395 (2006) |
2005 |
9 | EE | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal:
Efficient Wet Paper Codes.
Information Hiding 2005: 204-218 |
8 | | Jessica J. Fridrich,
Miroslav Goljan,
Petr Lisonek,
David Soukal:
Writing on wet paper.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 328-340 |
7 | | Jessica J. Fridrich,
David Soukal,
Miroslav Goljan:
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 595-606 |
6 | | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal,
Taras Holotyak:
Forensic steganalysis: determining the stego key in spatial domain steganography.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 631-642 |
5 | | Taras Holotyak,
Jessica J. Fridrich,
David Soukal:
Stochastic approach to secret message length estimation in ±k embedding steganography.
Security, Steganography, and Watermarking of Multimedia Contents 2005: 673-684 |
4 | EE | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal:
Perturbed quantization steganography.
Multimedia Syst. 11(2): 98-107 (2005) |
2004 |
3 | EE | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal:
Perturbed quantization steganography with wet paper codes.
MM&Sec 2004: 4-15 |
2 | | Jessica J. Fridrich,
Miroslav Goljan,
David Soukal:
Searching for the stego-key.
Security, Steganography, and Watermarking of Multimedia Contents 2004: 70-82 |
2003 |
1 | EE | Jessica J. Fridrich,
Miroslav Goljan,
Dorin Hogea,
David Soukal:
Quantitative steganalysis of digital images: estimating the secret message length.
Multimedia Syst. 9(3): 288-302 (2003) |