Jessica Fridrich
#10,402
Most Influential Person Now
American mathematician and speedcuber
Jessica Fridrich's AcademicInfluence.com Rankings
Jessica Fridrichmathematics Degrees
Mathematics
#1746
World Rank
#2798
Historical Rank
Measure Theory
#773
World Rank
#1032
Historical Rank
Download Badge
Mathematics
Jessica Fridrich's Degrees
- PhD Mathematics Binghamton University
- Masters Mathematics Binghamton University
- Bachelors Mathematics Binghamton University
Similar Degrees You Can Earn
Why Is Jessica Fridrich Influential?
(Suggest an Edit or Addition)According to Wikipedia, Jessica Fridrich is a professor at Binghamton University, who specializes in data hiding applications in digital imagery. She is also known for documenting and popularizing the CFOP method , one of the most commonly used methods for speedsolving the Rubik's Cube, also known as speedcubing. She is considered one of the pioneers of speedcubing, along with Lars Petrus. Nearly all of the fastest speedcubers have based their methods on Fridrich's, usually referred to as CFOP, that is, .
Jessica Fridrich's Published Works
Published Works
- Digital Watermarking and Steganography (2014) (1604)
- Rich Models for Steganalysis of Digital Images (2012) (1349)
- Detection of Copy-Move Forgery in Digital Images (2004) (1234)
- Digital camera identification from sensor pattern noise (2006) (1143)
- Ensemble Classifiers for Steganalysis of Digital Media (2012) (940)
- Detecting LSB Steganography in Color and Gray-Scale Images (2001) (908)
- Steganalysis by Subtractive Pixel Adjacency Matrix (2009) (885)
- Determining Image Origin and Integrity Using Sensor Noise (2008) (819)
- Universal distortion function for steganography in an arbitrary domain (2014) (770)
- Lossless Data Embedding—New Paradigm in Digital Watermarking (2002) (711)
- Designing steganographic distortion using directional filters (2012) (685)
- Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes (2011) (681)
- Reliable detection of LSB steganography in color and grayscale images (2001) (666)
- Steganography in Digital Media: Principles, Algorithms, and Applications (2009) (662)
- Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes (2004) (576)
- Merging Markov and DCT features for multi-class JPEG steganalysis (2007) (562)
- Steganalysis of JPEG Images: Breaking the F5 Algorithm (2002) (515)
- Invertible authentication (2001) (466)
- Practical steganalysis of digital images: state of the art (2002) (460)
- Lossless data embedding for all image formats (2002) (428)
- Statistically undetectable jpeg steganography: dead ends challenges, and opportunities (2007) (411)
- Content-Adaptive Steganography by Minimizing Statistical Detectability (2016) (367)
- Deep Residual Network for Steganalysis of Digital Images (2019) (360)
- Detecting digital image forgeries using sensor pattern noise (2006) (341)
- Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT (2015) (337)
- Digital image forensics (2009) (331)
- Matrix embedding for large payloads (2006) (311)
- New blind steganalysis and its implications (2006) (299)
- Steganalysis of JPEG images using rich models (2012) (290)
- Image encryption based on chaotic maps (1997) (286)
- Detection of Double-Compression in JPEG Images for Applications in Steganography (2008) (284)
- Digital image steganography using universal distortion (2013) (278)
- Writing on wet paper (2005) (276)
- Selection-channel-aware rich model for Steganalysis of digital images (2014) (273)
- Distortion-Free Data Embedding for Images (2001) (271)
- Calibration revisited (2009) (271)
- On detection of median filtering in digital images (2010) (256)
- Large scale test of sensor fingerprint camera identification (2009) (254)
- Moving steganography and steganalysis from the laboratory into the real world (2013) (245)
- Gibbs Construction in Steganography (2010) (242)
- Random Projections of Residuals for Digital Image Steganalysis (2013) (223)
- Source digital camcorder identification using sensor photo response non-uniformity (2007) (207)
- Security of fragile authentication watermarks with localization (2002) (207)
- Steganalysis based on JPEG compatibility (2001) (205)
- Determining digital image origin using sensor imperfections (2005) (200)
- On estimation of secret message length in LSB steganography in spatial domain (2004) (199)
- Practical methods for minimizing embedding impact in steganography (2007) (194)
- Perturbed quantization steganography with wet paper codes (2004) (179)
- Quantitative steganalysis of digital images: estimating the secret message length (2003) (178)
- Minimizing embedding impact in steganography using trellis-coded quantization (2010) (175)
- Attacking the OutGuess (2002) (170)
- Wet paper codes with improved embedding efficiency (2006) (156)
- Steganalysis Features for Content-Adaptive JPEG Steganography (2016) (151)
- Perturbed quantization steganography (2005) (150)
- Steganalysis in high dimensions: fusing classifiers built on random subspaces (2011) (145)
- Higher-order statistical steganalysis of palette images (2003) (143)
- JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images (2017) (135)
- Using sensor pattern noise for camera model identification (2008) (133)
- Camera identification from cropped and scaled images (2008) (133)
- Digital image steganography using stochastic modulation (2003) (131)
- Chapter 12 – Steganography (2008) (130)
- Design of adaptive steganographic schemes for digital images (2011) (128)
- Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification (2011) (125)
- Rich model for Steganalysis of color images (2014) (122)
- Digital imaging sensor identification (further study) (2007) (120)
- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics (2005) (119)
- The square root law of steganographic capacity for Markov covers (2009) (113)
- Constructing Good Covering Codes for Applications in Steganography (2008) (112)
- Visual hash for oblivious watermarking (2000) (112)
- Phase-aware projection model for steganalysis of JPEG images (2015) (112)
- New methodology for breaking steganographic techniques for JPEGs (2003) (110)
- Steganalysis of Content-Adaptive Steganography in Spatial Domain (2011) (106)
- Modern steganalysis can detect YASS (2010) (106)
- Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model (2015) (105)
- The square root law of steganographic capacity (2008) (99)
- From Blind to Quantitative Steganalysis (2009) (98)
- Multivariate gaussian model for designing additive distortion for steganography (2013) (98)
- Improving Steganographic Security by Synchronizing the Selection Channel (2015) (93)
- Cryptanalysis of the Yeung - Mintzer fragile watermarking technique (2002) (91)
- Managing a large database of camera fingerprints (2010) (89)
- On Steganographic Embedding Efficiency (2006) (86)
- Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain (2005) (84)
- Searching for the stego-key (2004) (83)
- Comparison of orthogonality estimation methods for the two-dimensional separations of peptides. (2012) (82)
- Multiclass Detector of Current Steganographic Methods for JPEG Format (2008) (80)
- Further attacks on Yeung-Mintzer fragile watermarking scheme (2000) (74)
- Breaking HUGO - The Process Discovery (2011) (74)
- On dangers of overtraining steganography to incomplete cover model (2011) (71)
- Secure Digital Camera (2004) (71)
- Benchmarking for Steganography (2008) (68)
- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries (2007) (68)
- Minimizing the embedding impact in steganography (2006) (67)
- Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? (2015) (67)
- Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes (2007) (63)
- Grid Colorings in Steganography (2007) (63)
- Multi-class blind steganalysis for JPEG images (2006) (63)
- Sensor Defects in Digital Image Forensic (2013) (63)
- Study of cover source mismatch in steganalysis and ways to mitigate its impact (2014) (62)
- Digital Image Forensics Using Sensor Noise (62)
- Combining low-frequency and spread-spectrum watermarking (1998) (62)
- Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory (2015) (61)
- Digital "bullet scratches" for images (2005) (60)
- Comparing robustness of watermarking techniques (1999) (60)
- Sensor noise camera identification: countering counter-forensics (2010) (58)
- CFA-aware features for steganalysis of color images (2015) (58)
- Stochastic approach to secret message length estimation in ±k embedding steganography (2005) (55)
- Efficient Wet Paper Codes (2005) (53)
- Steganography With Multiple JPEG Images of the Same Scene (2017) (52)
- Towards Multi-class Blind Steganalyzer for JPEG Images (2005) (52)
- Forensic steganalysis: determining the stego key in spatial domain steganography (2005) (51)
- Lossless data embedding with file size preservation (2004) (50)
- Influence of embedding strategies on security of steganographic methods in the JPEG domain (2008) (49)
- Further study on the security of S-UNIWARD (2014) (48)
- Fisher Information Determines Capacity of ε-Secure Steganography (2009) (48)
- Novelty detection in blind steganalysis (2008) (48)
- Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis (2017) (48)
- Sensor-fingerprint based identification of images corrected for lens distortion (2012) (47)
- Random projections of residuals as an alternative to co-occurrences in steganalysis (2013) (46)
- Identifying Common Source Digital Camera from Image Pairs (2007) (45)
- Quantitative steganalysis using rich models (2013) (45)
- Deep Learning for Detecting Processing History of Images (2018) (45)
- On completeness of feature spaces in blind steganalysis (2008) (43)
- Steganalysis of LSB Replacement Using Parity-Aware Features (2012) (43)
- Camera identification from printed images (2008) (43)
- Improving Selection-Channel-Aware Steganalysis Features (2016) (43)
- Asymptotic Behavior of the ZZW Embedding Construction (2009) (41)
- Steganalyzing Images of Arbitrary Size with CNNs (2018) (39)
- Quantitative Structural Steganalysis of Jsteg (2010) (37)
- Side-informed steganography with additive distortion (2015) (37)
- Effect of Compression on Sensor-Fingerprint Based Camera Identification (2016) (36)
- Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images (2008) (33)
- Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain (2019) (33)
- Determining the stego algorithm for JPEG images (2006) (32)
- Sensor fingerprint digests for fast camera identification from geometrically distorted images (2013) (31)
- Detection of double-compression for applications in steganography (2007) (30)
- ImageNet Pre-trained CNNs for JPEG Steganalysis (2020) (30)
- Proceedings of the 10th ACM workshop on Multimedia and security (2008) (29)
- Practical strategies for content-adaptive batch steganography and pooled steganalysis (2017) (27)
- Effect of Image Downsampling on Steganographic Security (2014) (27)
- Model Based Steganography with Precover (2017) (24)
- Natural Steganography in JPEG Compressed Images (2018) (24)
- Toss that BOSSbase, Alice! (2016) (23)
- Determining approximate age of digital images using sensor defects (2011) (23)
- Applications of Explicit Non-Linear Feature Maps in Steganalysis (2018) (22)
- Minimizing additive distortion functions with non-binary embedding operation in steganography (2010) (22)
- Optimizing pixel predictors for steganalysis (2012) (22)
- Reverse JPEG Compatibility Attack (2020) (22)
- Steganalysis in resized images (2013) (21)
- Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model (2021) (21)
- Quantitative steganalysis of LSB embedding in JPEG domain (2010) (20)
- An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHot Solution (2020) (20)
- Wet ZZW construction for steganography (2009) (20)
- Effect of saturated pixels on security of steganographic schemes for digital images (2016) (19)
- Estimation of lens distortion correction from single images (2014) (18)
- Challenging the doctrines of JPEG steganography (2014) (17)
- Effect of Cover Quantization on Steganographic Fisher Information (2012) (17)
- How to Pretrain for Steganalysis (2021) (17)
- Theoretical model of the FLD ensemble classifier based on hypothesis testing theory (2014) (16)
- Natural Steganography in JPEG Domain With a Linear Development Pipeline (2020) (16)
- Handling uneven embedding capacity in binary images: a revisit (2005) (16)
- Improving EfficientNet for JPEG Steganalysis (2021) (16)
- Scalable Processing History Detector for JPEG Images (2017) (15)
- Complete characterization of perfectly secure stego-systems with mutually independent embedding operation (2009) (14)
- Effect of Imprecise Knowledge of the Selection Channel on Steganalysis (2015) (14)
- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts (2012) (14)
- Kernel methods in steganalysis (2008) (14)
- Steganography via Codes for Memory with Defective Cells (12)
- Deep Learning Regressors for Quantitative Steganalysis (2018) (12)
- Steganography in Digital Media: Preface (2009) (12)
- Steganography with two JPEGs of the same scene (2017) (12)
- Effect of JPEG Quality on Steganographic Security (2019) (12)
- A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain (2019) (11)
- Detection of content adaptive LSB matching: a game theory approach (2014) (11)
- Boosting Steganalysis with Explicit Feature Maps (2016) (11)
- Digital watermarking for the authentication of AVS data (2000) (11)
- Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain (2019) (11)
- Steganography using Gibbs random fields (2010) (10)
- On the role of side information in steganography in empirical covers (2013) (10)
- Nonlinear Feature Normalization in Steganalysis (2017) (9)
- Special issue on : security of data hiding technologies (2002) (9)
- Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers (2005) (9)
- Detection of Diversified Stego Sources with CNNs (2019) (8)
- Turning Cost-Based Steganography into Model-Based (2020) (8)
- Reference Channels for Steganalysis of Images with Convolutional Neural Networks (2019) (7)
- Steganography and its Detection in JPEG Images Obtained with the "TRUNC" Quantizer (2020) (6)
- Synchronizing Embedding Changes in Side-Informed Steganography (2020) (6)
- Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007 (2007) (6)
- JPEG Steganalysis Detectors Scalable With Respect to Compression Quality (2020) (6)
- Payload Scaling for Adaptive Steganography: An Empirical Study (2019) (5)
- Chapter 11 – Content Authentication (2008) (5)
- Digital Watermarking and Steganography. Ed.2 (2019) (4)
- Chapter 2 – Applications and Properties (2008) (4)
- Security of data hiding technologies (2003) (4)
- Image Manipulation Detection Using Sensor Linear Pattern (2018) (3)
- Component Forensics: Theory, Methodologies, (2009) (3)
- Extending the Reverse JPEG Compatibility Attack to Double Compressed Images (2021) (3)
- Chapter 3 – Models of Watermarking (2008) (3)
- Chapter 9 – Robust Watermarking (2008) (3)
- Chapter 10 – Watermark Security (2008) (2)
- Revisiting Perturbed Quantization (2021) (2)
- Minimum Perturbation Cost Modulation for Side-Informed Steganography (2020) (2)
- Data Augmentation for JPEG Steganalysis (2021) (2)
- Advanced steganographic and steganalytic methods in the spatial domain (2006) (2)
- Introduction to the ACM multimedia and security workshop (2004) (1)
- Steganography in Digital Media: Introduction (2009) (1)
- Practical Dirty-Paper Codes (2008) (1)
- Lossless data embedding methods for digital images and detection of steganography (2001) (1)
- Chapter 4 – Basic Message Coding (2008) (1)
- Nonlinear Feature Normalization in Steganalysis Mehdi (2017) (1)
- Detector-Informed Batch Steganography and Pooled Steganalysis (2022) (1)
- Modern Trends in Steganography and Steganalysis (2011) (1)
- Universal distortion function for steganography in an arbitrary domain (2014) (1)
- Searching for the Stego-Key aJessica (2004) (1)
- Chapter 5 – Watermarking with Side Information (2008) (1)
- Steganography in Digital Media: Statistics (2009) (0)
- Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008 (2008) (0)
- Proceedings of the 7th Multimedia and Security Workshop 2005, MM and Sec' 05: Foreword (2006) (0)
- Session details: Forensics I (2009) (0)
- Steganography in Digital Media: Glossary (2009) (0)
- Steganography in Digital Media: Steganographic capacity (2009) (0)
- Session details: Digital watermarking 1 (2010) (0)
- Steganography in Digital Media: Selected targeted attacks (2009) (0)
- Session details: Steganography (2008) (0)
- Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015 (2015) (0)
- Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques (2002) (0)
- Session details: Session 4: Steganography I (2022) (0)
- Steganography in Digital Media: Non-shared selection channel (2009) (0)
- Session details: Steganography II (2004) (0)
- Steganography in Digital Media: Signal detection and estimation (2009) (0)
- Steganography in Digital Media: References (2009) (0)
- Steganography in Digital Media: Digital image acquisition (2009) (0)
- Steganography in Digital Media: Matrix embedding (2009) (0)
- Chapter 7 – Analyzing Errors (2008) (0)
- Steganalysis of Digital Watermarking Techniques (2003) (0)
- Protocol with priority news for a communication network with multiple access and carrier tracking (1991) (0)
- Explaining the Bag Gain in Batch Steganography (2023) (0)
- Advanced Digital Forensic and Steganalysis Methods (2009) (0)
- Fisher Information Determines Capacity of ε-Secure Steganography Tomáš Filler (0)
- Are we there yet? (2019) (0)
- Information Hiding (2008) (0)
- Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006 (2005) (0)
- Steganography in Digital Media: Digital image formats (2009) (0)
- Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security (2015) (0)
- Steganography in Digital Media: Linear codes (2009) (0)
- Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006 (2006) (0)
- Steganography in Digital Media: Plate section (2009) (0)
- Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004 (2004) (0)
- Cost polarization by dequantizing for JPEG steganography (2023) (0)
- Session details: Media Steganography and Steganalysis (2015) (0)
- CNN Steganalyzers Leverage Local Embedding Artifacts (2021) (0)
- MM&Sec'09: Proceedings of the 2009 ACM SIGMM - Multimedia and Security Workshop: Foreword (2009) (0)
- Proceedings of the 6th international conference on Information Hiding (2004) (0)
- Proceedings of the Multimedia and Security Workshop 2004, September 20-21, 2004, Magdeburg, Germany : MM&SEC'04 (2004) (0)
- Towards Statistically Undetectable Steganography (2011) (0)
- Chapter 8 – Using Perceptual Models (2008) (0)
- Reversible Data Hiding for Security Applications (2020) (0)
- Steganography in Digital Media: Blind steganalysis (2009) (0)
- Steganography in Digital Media: Steganographic channel (2009) (0)
- Support vector machines (2009) (0)
- Steganography in Digital Media: Practical steganographic methods (2009) (0)
This paper list is powered by the following services:
Other Resources About Jessica Fridrich
What Schools Are Affiliated With Jessica Fridrich?
Jessica Fridrich is affiliated with the following schools: