Skip to main content

Showing 1–3 of 3 results for author: Fridrich, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.12159  [pdf, other

    cs.CR cs.CV

    Information Forensics and Security: A quarter-century-long journey

    Authors: Mauro Barni, Patrizio Campisi, Edward J. Delp, Gwenael Doërr, Jessica Fridrich, Nasir Memon, Fernando Pérez-González, Anderson Rocha, Luisa Verdoliva, Min Wu

    Abstract: Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering of solid evidence to hold perpetrators accountable. For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

  2. arXiv:2001.02653  [pdf, other

    cs.MM cs.CR

    Natural Steganography in JPEG Domain with a Linear Development Pipeline

    Authors: Taburet Théo, Bas Patrick, Sawaya Wadih, Jessica Fridrich

    Abstract: In order to achieve high practical security, Natural Steganography (NS) uses cover images captured at ISO sensitivity $ISO_{1}$ and generates stego images mimicking ISO sensitivity $ISO_{2}>ISO_{1}$. This is achieved by adding a stego signal to the cover that mimics the sensor photonic noise. This paper proposes an embedding mechanism to perform NS in the JPEG domain after linear developments by e… ▽ More

    Submitted 12 April, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

    Comments: 13 pages, 14 figures

    ACM Class: I.4.1

  3. arXiv:0710.0192  [pdf, ps, other

    cs.IT

    Binary quantization using Belief Propagation with decimation over factor graphs of LDGM codes

    Authors: Tomas Filler, Jessica Fridrich

    Abstract: We propose a new algorithm for binary quantization based on the Belief Propagation algorithm with decimation over factor graphs of Low Density Generator Matrix (LDGM) codes. This algorithm, which we call Bias Propagation (BiP), can be considered as a special case of the Survey Propagation algorithm proposed for binary quantization by Wainwright et al. [8]. It achieves the same near-optimal rate-… ▽ More

    Submitted 30 September, 2007; originally announced October 2007.

    Comments: Forty-Fifth Annual Allerton Conference on Communication, Control, and Computing, 2007, 10 pages, 6 figures