DDE Mission | Members | Funding | Download
Mission
Current Members
Affiliates
Former Affiliates
Download Section
Funding



















Publications

A Collection of Publications by DDE Members on the Following Topics:

Watermarking for Image Authentication and Tamper Detection

  • Image Watermarking for Tamper Detection, Proc. ICIP '98, Chicago, Oct 1998. PostScript, MS Word 97.
  • Methods for Detecting Changes in Digital Images, Proc. of The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS'98), Melbourne, Australia, 4-6 November 1998, pp. 173–177. PostScript, MS Word 7.0.
  • A Hybrid Watermark for Tamper Detection in Digital Images, ISSPA'99 Conf., Brisbane, Australia, August 22-25, 1999, pp. 301–304. PostScript, MS Word 97.
  • Methods for Tamper Detection in Digital Images, Proc. ACM Workshop on Multimedia and Security, Orlando, FL, October 30-31, 1999, pp. 19-23. PostScript, MS Word 97.
  • Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme, with N. Memon, and M. Goljan Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24-26, 2000, pp.428–437. PostScript, MS Word 97.
  • Digital Watermarking for the Authentication of AVS Data, with M. Barni, F. Bartolini, and A. Piva, EUSIPCO 2000, Tampere, Finland, September 5-8, 2000. PostScript.
  • New Fragile Authentication Watermark for Images, with M. Goljan and A.C. Baldoza, ICIP'2000, Vancouver, September 10-13, 2000, Canada. PostScript, MS Word 97.
  • Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique, with M. Goljan and N. Memon, Journal of Electronic Imaging, May, 2002. PDF.
  • Security of Fragile Authentication Watermarks with Localization, Proc. SPIE Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 691-700. PostScript, MS Word 2000.
  • Estimation of Primary Quantization Matrix in Double Compressed JPEG Images, with J. Lukas, Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 2003. PDF
  • Detection of Copy-Move Forgery in Digital Images with D. Soukal and J. Lukas, Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 2003. PDF
  • Secure Digital Camera, with P. Blythe, presented at Digital Forensic Research Workshop, Baltimore, August 11-13, 2004. PDF
  • Determining Digital Image Origin Using Sensor Imperfections, with J. Lukas and M. Goljan, Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 249-260, 2005.PDF
  • Digital Bullet Scratches for Images, with J. Lukáš, Proc. ICIP 2005, Sep. 11-14, 2005, Genova, Italy. PDF
  • Digital Camera Identification from Sensor Noise, with J. Lukas and M. Goljan, IEEE Transactions on Information Security and Forensics, vol. 1(2), pp. 205-214, June 2006.PDF
  • Detecting Digital Image Forgeries Using Sensor Pattern Noise, with J. Lukas and M. Goljan, Proc. of SPIE Electronic Imaging, Photonics West, January 2006.PDF

Lossless (erasable, removable, invertible, distortion-free) Embedding and Authentication

  • Invertible Authentication, with M. Goljan and Rui Du, Proc. SPIE Photonics West, vol. 3971, Security and Watermarking of Multimedia Contents III, San Jose, California January (2001), pp. 197-208 MS Word 97.
  • Invertible Authentication Watermark for JPEG Images, with M. Goljan and R. Du, ITCC 2001, Las Vegas, Nevada, April 2-4, 2001, pp. 223–227.MS Word 97.
  • Distortion-free Data Embedding, with M. Goljan and R. Du, 4th Information Hiding Workshop, LNCS vol. 2137, Springer-Verlag, New York, 2001, pp. 27-41. MS Word 97.
  • Lossless Data Embedding – New Paradigm in Digital Watermarking, with M. Goljan and R. Du, Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2002, No.2, February 2002, pp. 185–196. PDF Journal Editorial
  • Lossless Data Embedding for All Image Formats, with M. Goljan and R. Du, Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, 572–583. PostScript, MS Word 2000.
  • Lossless Authentication of MPEG-2 Video, with Rui Du, Proc. ICIP 2002, Rochester, NY PDF
  • Lossless Data Embedding with File Size Preservation, with M. Goljan, Q. Chen, and V. Pathak, Proc. EI SPIE San Jose, CA, Jan 2004. PDF

Steganography and Steganalysis

  • A New Steganographic Method for Palette Images, IS&T PICS, Savannah, Georgia, April 25-28, 1999, pp. 285-289. PostScript, MS Word 97.
  • Secure Steganographic Methods for Palette Images, with Rui Du, Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, 2000, pp. 47-60. PostScript, MS Word 97.
  • Steganalysis of LSB Encoding in Color Images, with Rui Du and Long Meng, ICME 2000, New York City, July 31-August 2, New York, USA. PostScript, MS Word 97.
  • Steganalysis Based on JPEG Compatibility, with M. Goljan and R. Du, Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280. PDF, MS Word 2000.
  • Reliable Detection of LSB Steganography in Grayscale and Color Images, with M. Goljan and R. Du, Proc. of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30. PDF
  • Detecting LSB Steganography in Color and Gray-Scale Images, with M. Goljan and R. Du, Magazine of IEEE Multimedia Special Issue on Security, October-November 2001, pp. 22-28. PDF
  • Practical Steganalysis – State of the Art, with M. Goljan, Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1-13. PDF
  • Attacking the OutGuess, with M. Goljan and D. Hogea, Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002. PDF
  • Steganalysis of JPEG Images: Breaking the F5 Algorithm, with M. Goljan and D. Hogea, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7–9 October 2002, pp. 310-323. PDF
  • Digital Image Steganography Using Stochastic Modulation, with M. Goljan, in Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 191-202. PDF
  • Higher-Order Statistical Steganalysis of Palette Images, with M. Goljan and D. Soukal, in Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 178-190. PDF
  • New Methodology for Breaking Steganographic Techniques for JPEGs, with M. Goljan and D. Hogea, in Proc. SPIE Electronic Imaging Santa Clara, CA, Jan 2003, pp. 143-155.PDF
  • Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length, with M. Goljan, D. Hogea, and D. Soukal, ACM Multimedia Systems Journal, Special issue on Multimedia Security, Vol. 9(3), 2003, pp. 288-302.PDF
  • Searching for the Stego Key, with M. Goljan and D. Soukal, Proc. SPIE Electronic Imaging San Jose, CA, Jan 2004. PDF
  • On Estimation of Secret Message Length in LSB Steganography in Spatial Domain, with M. Goljan, Proc. SPIE Electronic Imaging San Jose, CA, Jan 2004. PDF
  • Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes, 6th Information Hiding Workshop, J. Fridrich (ed), LNCS, vol. 3200, Springer-Verlag, pp. 67-81, 2004. PDF
  • Perturbed Quantization Steganography with Wet Paper Codes, with M. Goljan and D. Soukal, Proc. ACM Multimedia Security Workshop, Magdeburg, Germany, September 20-21, pp. 4-15, 2004.PDF
  • Writing on Wet Paper, with M. Goljan, P. Lisonek, and D. Soukal, IEEE Trans. on Sig. Proc., Special Issue on Media Security, Eds. T. Kalker and P. Moulin, vol. 53, pp. 3923-3935, October 2005.PDF
  • Writing on Wet Paper, with M. Goljan, P. Lisonek, and D. Soukal, conference version of the above journal paper, Proc. EI SPIE San Jose, CA, January 16-20, pp. 328-340, 2005.PDF
  • Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography, with M. Goljan, D. Soukal, and T. Holotyak, Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 631-642, 2005.PDF
  • Handling Uneven Embedding Capacity in Binary Images: A Revisit, with Min Wu, M. Goljan, and H. Gou, Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 194-205, 2005.PDF
  • Maximum Likelihood Estimation of Secret Message Length Embedded Using PMK Steganography in Spatial Domain, with D. Soukal and M. Goljan, Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 595-606, 2005.PDF
  • Stochastic Approach to Secret Message Length Estimation in +-k Embedding Steganography, with T.S. Holotyak and D. Soukal, Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 673-684, 2005.PDF
  • Perturbed Quantization Steganography, with M. Goljan and D. Soukal, to appear in ACM Multimedia&Security Journal, 2005.PDF
  • Towards Multi-class Blind Steganalyzer for JPEG Images, with T. Pevny, International Workshop on Digital Watermarking, LNCS vol. 3710, Springer-Verlag, pp. 39-53, 2005.PDF
  • Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics with T. Holotyak and S. Voloshynovskiy, Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sep. 19-21, 2005, Salzburg, Austria. PDF
  • Efficient Wet Paper Codes, with M. Goljan and D. Soukal, in M. Barni et al. (eds.): Information Hiding. 7th International Workshop, LNCS vol. 3727, Springer-Verlag, New York, pp. 204-218, 2005.PDF
  • Steganography via Codes for Memory with Defective Cells," with M. Goljan and D. Soukal, 43rd Conference on Coding, Communication, and Control, Sep 28-30, 2005.PDF
  • Matrix Embedding for Large Payloads", with D. Soukal, Proc. of SPIE Electronic Imaging, Photonics West, January 2006.PDF
  • Wet paper Codes with Improved Embedding Efficiency," with M. Goljan and D. Soukal, IEEE Transactions on Information Security and Forensics, vol. 1(1), pp. 102-110, March 2006.PDF
  • New Blind Steganalysis and its Implications, with M. Goljan and T. Holotyak, Proc. SPIE Electronic Imaging, Photonics West, January 2006.PDF
  • Multiclass Blind Steganalysis for JPEG Images , with T. Pevny, Proc. SPIE Electronic Imaging, Photonics West, January 2006.PDF
  • Determining the Stego Algorithm for JPEG Images, with T. Pevny, to appear in Special Issue of IEE IFS Proceedings, 2006.
  • Matrix Embedding for Large Payloads", with D. Soukal, (journal version) IEEE Transactions on Information Security and Forensics, to appear in September issue 2006.PDF
  • “Constructing Good Covering Codes for Applications in Steganography”, with J. Bierbrauer, submitted to LNCS Transactions on Data Hiding and Multimedia Security, Springer-Verlag, 2006.
  • "Minimizing the Embedding Impact in Steganography", submitted to ACM MM&S Workshop, Geneva, October 2006.
  • “Grid Colorings in Steganography", with P. Lisonek, in preparation.

Self-Embedding

  • Protection of Digital Images Using Self Embedding, with M. Goljan, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, 1999. PostScript, MS Word 97.
  • Images with Self-Correcting Capabilities, with M. Goljan, ICIP'99, Kobe, Japan, October 25-28, 1999. PostScript, MS Word 97.

Robust Watermarking

  • Robust Digital Watermarking Based on Key-Dependent Basis Functions, with 2 Lt Arnold C. Baldoza and Richard J. Simard, Proc. 2nd Information Hiding Workshop, LNCS vol. 1525, Springer-Verlag, New York 1998,pp. 143-157. PostScript, MS Word 7.0, Abstract.
  • Key-Dependent Random Image Transforms and Their Applications in Image Watermarking, 1999 International Conference on Imaging Science, Systems, and Technology (CISST'99), Las Vegas, June 28-July 1, 1999, pp. 237-243. PostScript, MS Word 97.
  • Combining Low-Frequency and Spread Spectrum Watermarking, Proc. SPIE Int. Symposium on Optical Science, Engineering, and Instrumentation, San Diego, July 19-24, 1998, pp. 2-12. PostScript, MS Word 97.
  • Comparing Robustness of Watermarking Techniques, with M. Goljan, Proc. of SPIE Vol. 3657 (Security and Watermarking of Multimedia Content), San Jose, Jan 25-27, 1999, pp. 214–225. PostScript, MS Word 97.

Visual Hash

  • J. Fridrich, Robust Bit Extraction from Images, Proc. IEEE ICMCS'99 , Florence, Italy, Vol. 2, pp. 536-540, June 7-11, 1999, pp. 536-540. PostScript, MS Word 97.
  • J. Fridrich, Visual Hash for Oblivious Watermarking, Proc. SPIE Photonic West Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24-26, 2000, pp. 286–294. PostScript, MS Word 97.
  • J. Fridrich, M. Goljan, Robust Hash Functions for Digital Watermarking, ITCC 2000, Las Vegas, Nevada, March 27-29, 2000, pp. 173–178. PostScript, MS Word 97.