Jessica Fridrich Conferences

  • V. Holub and J. Fridrich, “Optimizing Pixel Predictors for Steganalysis,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 09 1–13, 2012.
  • M. Goljan and J. Fridrich, “Sensor-Fingerprint Based Identification of Images Corrected For Lens Distortion,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 0H 1–13, 2012.
  • J. Kodovský and J. Fridrich, “Steganalysis of JPEG Images Using Rich Models,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 23–26, pp. 0A 1–13, 2012.
  • J. Kodovský, J. Fridrich, and V. Holub, “On Dangers of Overtraining Steganography to an Incomplete Cover Model,” Proc. ACM Multimedia & Security Workshop, Niagara Falls, New York, September 29–30, pp. 69–76, 2011.
  • T. Filler and J. Fridrich, “Design of adaptive steganographic schemes for digital images,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OF 1–14, 2011.
  • M. Goljan and J. Fridrich,“Determining approximate age of digital images using sensor defects,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. 06 1–11, 2011.
  • J. Kodovský and J. Fridrich, “Steganalysis in high dimensions: fusing classifiers built on random subspaces,” Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OL 1–13, 2011.
  • T. Filler and J. Fridrich, “Minimizing Additive Distortion Functions with Non-Binary Embedding Operation in Steganography,” Proc. IEEE WIFS’10, Seattle, WA, December 12–15, 2010.
  • J. Kodovský and J. Fridrich, “Quantitative Steganalysis of LSB Embedding in JPEG Domain,” ACM Multimedia & Security Workshop, Rome, Italy, September 9–10, pp. 187–198, 2010.
  • T. Filler and J. Fridrich, “Steganography Using Gibbs Random Fields,” ACM Multimedia & Security Workshop, Rome, Italy, September 9–10, pp. 199–212, 2010.
  • M. Goljan, J. Fridrich, and Mo Chen,“Sensor Noise Camera Identification: Countering Counter-Forensics,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 0S 1–12, 2010.
  • M. Goljan, J. Fridrich, and T. Filler, “Managing a Large Database of Camera Fingerprints,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 08 1–12, 2010.
  • J. Kodovský, T. Pevný, and J. Fridrich, “Modern Steganalysis Can Detect YASS,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 02 1–11, 2010.
  • T. Filler, J. Judas, and J. Fridrich, “Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 05 1–14, 2010.
  • M. Kirchner and J. Fridrich, “On Detection of Median Filtering in Images,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 10 1–12, 2010.
  • T. Filler and J. Fridrich, “Wet ZZW Construction,” Proc. IEEE WIFS’09, London, UK, December 6–9, 2009.
  • J. Kodovský, and J. Fridrich, “Calibration Revisited,” Proc. ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 63–74, 2009.
  • T. Pevný, P. Bas, and J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” Proc. ACM Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84, 2009.
  • T. Filler and J. Fridrich, “Complete Characterization of Perfectly Secure Stegosystems with Mutually Independent Embedding Operation,” Proc. IEEE ICASSP, April 19"24, 2009.
  • M. Goljan, T. Filler, and J. Fridrich, “Camera Identification – Large Scale Test,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. 0I 1–12, 2009.
  • T. Pevný, J. Fridrich, and A. D. Ker, “From Blind to Quantitative Steganalysis,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. OC 1–14, 2009.
  • T. Filler, J. Fridrich, and A. D. Ker,“The Square Root Law of Steganographic Capacity for Markov Covers,” Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, vol. 7254, San Jose, CA, January 18–22, pp. 08 1–11, 2009.
  • A. D. Ker, T. Pevný, J. Kodovský, and J. Fridrich, “The Square Root Law of Steganographic Capacity,” Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22–23, pp. 107–116, 2008.
  • J. Kodovský, and J. Fridrich, “On Completeness of Feature Spaces in Steganalysis,” Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22–23, pp. 123–132, 2008.
  • T. Pevný and J. Fridrich, “Novelty Detection in Blind Steganalysis,” Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22–23, pp. 167–176, 2008.
  • J. Fridrich and M. Goljan,“Camera Identification from Cropped and Scaled Images,” Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, January 26–31, pp. OE 1–13, 2008.
  • J. Fridrich, M. Goljan, and J. Lukáš, “Camera Identification from Printed Images,” Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, January 26–31, pp. OI 1–12, 2008.
  • J. Fridrich and T. Pevný, “Estimation of Primary Quantization Matrix for Steganalysis of Double-Compressed JPEG Images,” Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, January 26–31, pp. 11 1–13, 2008.
  • J. Fridrich and J. Kodovský, “Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain,” Proc. SPIE, Electronic Imaging, Security, Forensics , Steganography, and Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, January 26–31, pp. 02-1–02-13, 2008.
  • J. Fridrich, T. Pevný, and J. Kodovský, “Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities,” Proc. ACM Multimedia and Security Workshop, Dallas, TX, September 20–21, pp. 3–14, 2007.
  • T. Filler and J. Fridrich, “Binary Quantization using Belief Propagation with Decimation over Factor Graphs of LDGM Codes,” Proc. 45th Allerton Conference on Coding, Communication, and Control, September 26–28, 2007.
  • J. Fridrich, M. Goljan, and Mo Chen, “Identifying Common Source Digital Camera from Image Pairs,” Proc. ICIP’ 07, San Antonio, Texas, September 14–19, 2007.
  • J. Fridrich, Mo Chen, M. Goljan, and J. Lukáš,“Digital Imaging Sensor Identification (Further Study),” Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28–February 2, pp. 0P–0Q, 2007.
  • J. Fridrich, Mo Chen, M. Goljan, and J. Lukáš, “Source Digital Camcorder Identification Using Sensor Photo Response Non-Uniformity”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28–February 2, pp. 1G–1H, 2007.
  • J. Fridrich and T. Filler, “Practical methods for Minimizing Embedding Impact in Steganography”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28–February 2, pp. 02–03, 2007.
  • J. Fridrich and T. Pevný, “Merging Markov and DCT Features for Multi-Class JPEG Steganalysis”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28–February 2, pp. 3 1–14, 2007.
  • J. Fridrich, “Minimizing the Embedding Impact in Steganography,” Proc. 8th ACM Multimedia and Security Workshop, September 26–27, Geneva, Switzerland, pp. 2–10, 2006.
  • J. Fridrich and D. Soukal, “Matrix Embedding for Large Payloads,” in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16–19, pp. W 1–15, 2006.
  • J. Fridrich, M. Goljan, and D. Soukal, “Wet paper Codes with Improved Embedding Efficiency,” conference version of journal paper, in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16–19, pp. 15 1–12, 2006.
  • J. Fridrich, M. Goljan, and D. Soukal, “Steganography via Codes for Memory with Defective Cells,” 43rd Conference on Coding, Communication, and Control, September 28–30, 2005.
  • J. Fridrich, M. Goljan, and T. Holotyak, “New Blind Steganalysis and its Implications,” in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16–19, pp. 1–13, 2006.
  • J. Fridrich and T. Pevný, “Multiclass Blind Steganalysis for JPEG Images,” in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16–19, pp. 0O1–0O13, 2006.
  • J. Fridrich, J. Lukáš, and M. Goljan, “Detecting Digital Image Forgeries Using Sensor Pattern Noise,” in Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16–19, pp. 0Y 1–11, 2006.
  • J. Fridrich and T. Pevný, "Towards Multi-class Blind Steganalyzer for JPEG Images," Proc. IWDW, LNCS vol. 3710, pp. 39–53, September 15–17, 2005, Siena, Italy.
  • J. Fridrich, T. Holotyak, and S. Voloshynovskii,"Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics," Proc. 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 19–21, 2005, Salzburg, Austria.
  • J. Fridrich and J. Lukáš, “Digital Bullet Scratches for Images”, Proc. ICIP 2005, Genova, Italy, 2005.
  • J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on Wet Paper," conference version of the above journal paper, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16–20, pp. 328–340, 2005.
  • J. Fridrich, M. Goljan, D. Soukal, and T. Holotyak, "Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography," Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16–20, pp. 631–642, 2005.
  • J. Fridrich, Min Wu, M. Goljan, and H. Gou,"Handling Uneven Embedding Capacity in Binary Images: A Revisit," Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16–20, pp. 194–205, 2005.
  • J. Fridrich, D. Soukal, and M. Goljan, "Maximum Likelihood Estimation of Secret Message Length Embedded Using PMK Steganography in Spatial Domain," Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16–20, pp. 595–606, 2005.
  • J. Fridrich, T.S. Holotyak, and D. Soukal "Stochastic Approach to Secret Message Length Estimation in "k Embedding Steganography," Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16–20, pp. 673–684, 2005.
  • J. Fridrich, J. Lukáš, and M. Goljan,"Determining Digital Image Origin Using Sensor Imperfections," Proc. SPIE, Electronic Imaging, Image and Video Communications and Processing, vol. 5685, San Jose, CA, January 16–20, pp. 249–260, 2005.
  • J. Fridrich, M. Goljan, Q. Chen, and V. Pathak, “Lossless Data Embedding with File Size Preservation”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, CA, pp. 354–365, 2004.
  • J. Fridrich, M. Goljan, and D. Soukal, “Searching for the Stego Key”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, CA, pp. 70–82, 2004.
  • J. Fridrich and M. Goljan, “On Estimation of Secret Message Length in LSB Steganography in Spatial Domain”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, California, pp. 23–34, 2004.
  • J. Fridrich, M. Goljan, and D. Soukal "Perturbed Quantization Steganography with Wet Paper Codes," Proc. ACM Multimedia Security Workshop, Magdeburg, Germany, September 20–21, pp. 4–15, 2004.
  • J. Fridrich and P. Blythe, "Secure Digital Camera," presented at Digital Forensic Research Workshop, Baltimore, August 11–13, 2004.
  • J. Fridrich, M. Goljan, and D. Hogea, “New Methodology for Breaking Steganographic Techniques for JPEGs”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, pp. 143–155, 2003.
  • J. Fridrich, M. Goljan, and D. Soukal, “Higher Order Statistical Steganalysis of Palette Images”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, pp. 178–190, 2003.
  • J. Fridrich and J. Lukáš,“Estimation of Primary Quantization Matrix in Double Compressed JPEG Images”, Proc. of DFRWS 2003, Cleveland, OH, USA, August 5–8, 2003.
  • J. Fridrich, D. Soukal, and J. Lukas, “Detection of Copy-Move Forgery in Digital Images”, Proc. of DFRWS 2003, Cleveland, OH, USA, August 5–8, 2003.
  • J. Fridrich and M. Goljan, “Secure Digital Image Steganography Using Stochastic Modulation”, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara, California, pp. 191–202, 2003.
  • J. Fridrich and M. Goljan, "Practical Steganalysis of Digital Images – State of the Art", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, vol. 4675, San Jose, January 21–24, pp. 1–13, 2002.
  • J. Fridrich, M. Goljan, and R. Du, "Lossless Data Embedding For All Image Formats", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, vol. 4675, San Jose, January 21–24, pp. 572–583, 2002.
  • J. Fridrich and Rui Du, “Lossless Authentication of MPEG-2 Video”, Proc. ICIP 2002, Rochester, NY, 2002 (CD version only).
  • J. Fridrich, “Security of Fragile Authentication Watermarks with Localization”, Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents IV, vol. 4675, San Jose, January 21–24, pp. 691–700, 2002.
  • J. Fridrich, M. Goljan, and D. Hogea, “Attacking the OutGuess”, Proc. ACM: Multimedia Security and Watermarking Workshop, Juan-les-Pins, France, December 2002.
  • J. Fridrich, M. Goljan, and R. Du, "Invertible Authentication Watermark for JPEG Images", Proc. ITCC 2001, Las Vegas, Nevada, USA, April 2"4, pp. 223–227, 2001.
  • J. Fridrich, M. Goljan, and R. Du, "Invertible Authentication", Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents III, vol. 3971, January 23–26, San Jose, California, USA, pp. 197–208, 2001.
  • J. Fridrich, M. Goljan, and R. Du, “Steganalysis Based on JPEG Compatibility”, Proc. SPIE Multimedia Systems and Applications IV, Denver, CO, August 20–24, pp. 275–280, 2001.
  • J. Fridrich, M. Goljan, M. Barni, F. Bartolini, and A. Piva, "Digital Watermarking for the Authentication of AVS data", Proc. of EUSIPCO, Tampere, Finland, September, 2000.
  • J. Fridrich, M. Goljan, and R. Du, "Reliable Detection of LSB Steganography in Grayscale and Color Images ", Proc. ACM, Multimedia Security and Watermarking Workshop, Ottawa, Canada, October 5, pp. 27–30, 2001.
  • J. Fridrich, N. Memon and M. Goljan, "Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents II, San Jose, California, January 24"26, pp. 428–437, 2000.
  • J. Fridrich, "Visual Hash for Oblivious Watermarking", Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents II, San Jose, California, January 24"26, pp. 286–294, 2000.
  • J. Fridrich and M. Goljan, "Robust Hash Functions for Digital Watermarking", Proc. ITCC 2000, Las Vegas, Nevada, USA, March 27"29, pp. 173–178, 2000.
  • J. Fridrich, R. Du, and M. Long, "Steganalysis of LSB Encoding in Color Images", Proc. ICME 2000, New York City, New York, July, 2000 (CD only).
  • J. Fridrich, M. Goljan, and A. C. Baldoza, "New Fragile Authentication Watermark for Images", Proc. ICIP, Vancouver, Canada, September 2000 (CD only).
  • J. Fridrich, "Methods for Tamper Detection in Digital Images", Proc. ACM Workshop on Multimedia and Security, Orlando, FL, October 30"31, pp. 19"23, 1999.
  • J. Fridrich, “Robust Bit-Extraction from Images”, Proc. IEEE ICMCS'99 Conference, Florence, Italy, June 7"11, vol. 2, pp. 536"540, 1999.
  • J. Fridrich, “A New Steganographic Method for Palette-Based Images”, Proc. of the IS&T PICS conference, Savannah, Georgia, April 25"28, pp. 285"289, 1999.
  • J. Fridrich and M. Goljan, “Comparing Robustness of Watermarking Techniques”, Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Content I, vol. 3657, San Jose, California, January 25"27, pp. 214–225, 1999.
  • J. Fridrich and M. Goljan, “Protection of Digital Images Using Self Embedding”, The Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 15, 1999.
  • J. Fridrich, “Key-Dependent Random Image Transforms and Their Applications in Image Watermarking”, Proc. International Conference on Imaging Science, Systems, and Technology (CISST'99), Las Vegas, June 28"July 1, pp. 237"243, 1999.
  • J. Fridrich, "A Hybrid Watermark for Tamper Detection in Digital Images", ISSPA'99 Conf., Brisbane, Australia, August 22"25, pp. 301–304, 1999.
  • J. Fridrich, “Methods for Detecting Changes in Digital Images”, Proc. of The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98), Melbourne, Australia, pp. 173"177, 1998.
  • J. Fridrich, “Image Watermarking for Tamper Detection”, Proc. ICIP ’98, Chicago, Illinois, pp. 173–177, 1998.
  • J. Fridrich, “Combining Low-Frequency and Spread Spectrum Watermarking”, Proc. SPIE Mathematics of Data/Image Coding, Compression, and Encryption, vol. 3456, San Diego, July 21"22, pp. 2"12, 1998.
  • J. Fridrich, “Applications of Data Hiding in Digital Images”, Tutorial for The ISPACS’98 Conference in Melbourne, Australia, November 4"6, 1998.
  • J. Fridrich, “Observational Uncertainty in Chaotic Systems”, Proc. IFSA, vol. III, June 25"29, Prague, pp. 261"268, 1997.
  • J. Fridrich, “Image Encryption Based on Chaotic Maps”, Proc. IEEE Conf. on Systems, Man, and Cybernetics, October 12"15, pp. 1105"1110, 1997.
  • J. Fridrich, “Parallel Implementation of Chaos Based Encryption Techniques”, Final report for Grant #F30602-97-1-0047909 for Rome Laboratory, NY, December 31, 1997.
  • J. Fridrich, “Secure Image Ciphering Based on Chaos”, Final report for Grant #F30602-96-1-0047 for AFRL, NY, March 10, 1997.
  • J. Fridrich, M. Goljan and T. Filler,M."Large Scale Test of Sensor Fingerprint Camera Identification," , Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, San Jose, CA, January 18-22, 2009, pp. 0I 1-0I 12
  • J. Fridrich and M. Goljan,"Digital Camera Identification from Images - Estimating False Acceptance Probability," invited talk at the International Workshop on Digital Watermarking, Busan, Korea, November 10-12, 2008.
  • J. Fridrich and T. Filler,"Using Sensor Pattern Noise for Camera Model Identification," Proc. ICIP 2008, San Diego, California, October 12-15, 2008.
  • Jessica Fridrich Journals

  • J. Fridrich and J. Kodovský, “Steganalysis of LSB Replacement Using Parity-Aware Features,” 14th Information Hiding Conference, Berkeley, May 15–18, 2012, LNCS vol. xxxx, Springer-Verlag, pp. xx–xx.
  • J. Kodovský and J. Fridrich, “JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts,” 14th Information Hiding Conference, Berkeley, May 15–18, 2012, LNCS vol. xxxx, Springer-Verlag, pp. xx–xx.
  • J. Fridrich and J. Kodovský, “Rich Models for Steganalysis of Digital Images,” IEEE Trans. on Info. Forensics and Security 7(3), pp. 868–882, June 2012.
  • J. Kodovský, J. Fridrich, and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE Trans. on Info. Forensics and Security 7(2), pp. 432–444, 2012.
  • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub, “Breaking HUGO – the Process Discovery,” 13th Information Hiding Conference, Prague, Czech Republic, May 18–20, 2011, LNCS vol. 6958, Springer-Verlag, pp. 85–101.
  • J. Fridrich, J. Kodovský, M. Goljan, and V. Holub, “Steganalysis of Spatially-Adaptive Steganography,” 13th Information Hiding Conference, Prague, Czech Republic, May 18–20, 2011, LNCS vol. 6958, Springer-Verlag, pp. 102–117.
  • T. Filler, J. Judas, and J. Fridrich, “Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes,” IEEE Trans. on Info. Forensics and Security 6(1), pp. 920–935, 2011.
  • J. Kodovský and J. Fridrich, “Quantitative Structural Steganalysis of Jsteg,” IEEE Trans. on Info. Forensics and Security 5(4), pp. 681–693, 2010.
  • T. Filler and J. Fridrich, “Gibbs construction in Steganography,” IEEE Trans. on Info. Forensics and Security 5(4), pp. 705–720, 2010.
  • T. Pevný, A. Ker, and J. Fridrich, “From Blind to Quantitative Steganalysis,” IEEE Trans. on Info. Forensics and Security 7(2), pp. 445–454, 2012.
  • T. Pevný, P. Bas, and J. Fridrich, “Steganalysis by Subtractive Pixel Adjacency Matrix,” IEEE Trans. on Info. Forensics and Security 5(2), pp. 215–224, 2010.
  • T. Filler and J. Fridrich, “Fisher Information Determines Capacity of "-secure Steganography,” 11th Information Hiding Workshop, Darmstadt, Germany, June 7–10, 2009, LNCS vol. 5806, Springer-Verlag, pp. 31–47.
  • J. Fridrich, "Asymptotic Behavior of the ZZW Embedding Construction," IEEE Trans. on Info. Forensics and Security 4(1), pp. 151–153, March 2009.
  • J. Fridrich, "Digital Image Forensics Using Sensor Noise." Signal Processing Magazine, Special Issue on Digital Forensics 26(2), pp. 26–37, March 2009.
  • T. Pevný and J. Fridrich,“Benchmarking for Steganography,” 10th Information Hiding Workshop, Santa Barbara, California, May 19–21, LNCS, vol. 5284, Springer-Verlag, pp. 251"267, 2008.
  • J. Fridrich and J. Bierbrauer, “Constructing good covering codes for applications in Steganography”, LNCS Transactions on Data Hiding and Multimedia Security, Springer-Verlag, vol. 4920, pp. 1–22, 2008.
  • T. Pevný and J. Fridrich, “Multi-Class Detector of Current Steganographic Methods for JPEG Format,” IEEE Trans. on Info. Forensics and Security 3(4), pp. 635–650, December 2008.
  • T. Pevný and J. Fridrich, “Detection of Double-Compression in JPEG Images for Applications in Steganography,” IEEE Trans. on Info. Forensics and Security 3(2), pp. 247–258, 2008.
  • J. Fridrich, Mo Chen, M. Goljan, and J. Lukáš,“Determining Image Origin and Integrity Using Sensor Noise,” IEEE Trans. on Info. Forensics and Security 3(1), pp. 74–90, March 2008.
  • J. Fridrich, Mo Chen, J. Lukáš, and M. Goljan,“Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries,” 9th Information Hiding Workshop, Saint Malo, France, June 9–11, LNCS, 4567, Springer-Verlag, pp. 342–358, 2007.
  • J. Fridrich and P. Lisonek, “Grid Colorings in Steganography,” IEEE Transactions on Information Theory 53(4), pp. 1547–1549, April 2007.
  • J. Fridrich, P. Lisonek, and D. Soukal,“On Embedding Efficiency,” 8th Information Hiding, Washington, DC, July 10–12, LNCS, vol. 4437, Springer-Verlag, pp. 282–296, 2006.
  • J. Fridrich and D. Soukal, “Matrix Embedding for Large Payloads,” IEEE Transactions on Information Security and Forensics 1(3), pp. 390–394, 2006.
  • J. Fridrich and T. Pevný, “Determining the Stego Algorithm for JPEG Images”, Special Issue of IEE Proceedings – Information Security 153(3), pp. 75–139, 2006.
  • J. Fridrich, M. Goljan, and D. Soukal, “Wet paper Codes with Improved Embedding Efficiency,” IEEE Transactions on Information Security and Forensics 1(1), pp. 102–110, 2006.
  • J. Fridrich, J. Lukáš, and M. Goljan,“Digital Camera Identification from Sensor Pattern Noise,” IEEE Transactions on Information Security and Forensics 1(2), pp. 205–214, 2006.
  • J. Fridrich, M. Goljan, and D. Soukal, “Efficient Wet Paper Codes”, in M. Barni (ed.): Information Hiding. 7th International Workshop, LNCS vol. 3727, Springer-Verlag, New York, pp. 204–218, 2005.
  • J. Fridrich, M. Goljan, and D. Soukal, “Perturbed Quantization Steganography”, ACM Multimedia and Security Journal 11(2), pp. 98–107, 2005.
  • J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, “Writing on Wet Paper”, IEEE Trans. on Sig. Proc., Special Issue on Media Security, Eds. T. Kalker and P. Moulin, vol. 53, pp. 3923–3935, 2005.
  • J. Fridrich, “Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes”, in J. Fridrich (ed.): Information Hiding. 6th International Workshop, LNCS vol. 3200, Springer-Verlag, Berlin-Heidelberg, New York, pp. 67–81, 2004.
  • J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, “Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length”, ACM Multimedia Systems Journal, Special issue on Multimedia Security, vol. 9(3), pp. 288–302, 2003.
  • J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Color and Gray-Scale Images”, Magazine of IEEE Multimedia, Special Issue on Security, October-November issue, pp. 22–28, 2001.
  • J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding – New Paradigm in Digital Watermarking”, EURASIP Journal, Special Issue on Emerging Applications of Multimedia Data Hiding, vol. 2002, No.2, February, pp. 185–196, 2002.
  • J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique", Journal of Electronic Imaging 11(02), pp. 262–274, 2002.
  • J. Fridrich, M. Goljan, and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm”, in F.A.P. Petitcolas (ed.), Information Hiding. 5th International Workshop, LNCS vol. 2578, Springer-Verlag Berlin-Heidelberg, New York, pp. 310–323, 2002.
  • J. Fridrich, M. Goljan, and R. Du, “Distortion-free Data Embedding”, in I. Moskowicz (ed.), Information Hiding. 4th International Workshop, LNCS vol. 2137, Springer-Verlag Berlin-Heidelberg, New York, pp. 27–41, 2001.
  • J. Fridrich, “Secure Steganographic Methods for Palette Images”, in A. Pfitzmann (ed.), Information Hiding. 3rd International Workshop, LNCS vol. 1768, Springer-Verlag Berlin-Heidelberg, New York, pp. 47"60, 1999.
  • J. Fridrich, 2Lt A.C. Baldoza, and R.J. Simard, “Robust Digital Watermarking Based on Key-Dependent Basis Functions”, in D. Aucsmith (ed.), Information Hiding. 2nd International Workshop, LNCS vol. 1525, Springer-Verlag Berlin-Heidelberg, New York, pp. 143"157, 1998.
  • J. Fridrich, “Symmetric Ciphers Based on Two-Dimensional Chaotic maps”, Int. J. Bifurcation and Chaos, 8(6), June 1998, pp. 1259"1284.
  • J. Fridrich, “Beneficial Chaos"” Int. J. of Gen. Sys. 26(1"2), pp. 179"197, 1997.
  • M. Goljan, J. Fridrich, and Mo Chen, “Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification,” IEEE Trans. on Info. Forensics and Security 6(1), March 2011, pp. 227–236.
  • Jessica Fridrich Books

  • J. Fridrich, book chapter "Sensor Defects in Digital Image Forensics" in Digital Image Forensics: There is More to a Picture than Meets the Eye, editors H.T. Sencar and N. Memon, Springer, May 2012. ISBN: 978-1-4614-0756-0.
  • J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, November 2009.
  • I. Cox, J. Bloom, M. Miller, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann, November 2007.
  • Chapter on Steganalysis in W. Zeng, H. Yu, and C. Lin (Editors), Multimedia Security Technologies for Digital Rights Management. ISBN: 0123694760, Elsevier, June 2006.
  • J. Fridrich (editor), Information Hiding. 6th International Workshop, LNCS vol. 3200, Springer-Verlag, Berlin-Heidelberg, New York, 2005.