default search action
Miroslav Goljan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c55]Kun Yu, Morteza Darvish Morshedi Hosseini, Anjie Peng, Hui Zeng, Miroslav Goljan:
Make Your Enemy Your Friend: Improving Image Rotation Angle Estimation with Harmonics. ICASSP 2023: 1-5 - 2021
- [c54]Hui Zeng, Morteza Darvish Morshedi Hosseini, Miroslav Goljan:
Replacing DWT with DTCWT in blind image rotation angle estimation. Media Watermarking, Security, and Forensics 2021 - [i1]Hui Zeng, Morteza Darvish Morshedi Hosseini, Kang Deng, Anjie Peng, Miroslav Goljan:
A comparison study of CNN denoisers on PRNU extraction. CoRR abs/2112.02858 (2021) - 2020
- [c53]Morteza Darvish Morshedi Hosseini, Miroslav Goljan, Hui Zeng:
Semi-Blind Image Resampling Factor Estimation for PRNU Computation. Media Watermarking, Security, and Forensics 2020
2010 – 2019
- 2019
- [c52]Morteza Darvish Morshedi Hosseini, Miroslav Goljan:
Camera Identification from HDR Images. IH&MMSec 2019: 69-76 - 2018
- [c51]Miroslav Goljan:
Blind Detection of Image Rotation and Angle Estimation. Media Watermarking, Security, and Forensics 2018 - [c50]Miroslav Goljan, Jessica J. Fridrich, Matthias Kirchner:
Image Manipulation Detection Using Sensor Linear Pattern. Media Watermarking, Security, and Forensics 2018 - 2016
- [c49]Miroslav Goljan, Mo Chen, Pedro Comesaña, Jessica J. Fridrich:
Effect of Compression on Sensor-Fingerprint Based Camera Identification. Media Watermarking, Security, and Forensics 2016: 1-10 - 2015
- [c48]Miroslav Goljan, Jessica J. Fridrich:
CFA-aware features for steganalysis of color images. Media Watermarking, Security, and Forensics 2015: 94090V - 2014
- [c47]Miroslav Goljan, Jessica J. Fridrich:
Estimation of lens distortion correction from single images. Media Watermarking, Security, and Forensics 2014: 90280N - [c46]Miroslav Goljan, Jessica J. Fridrich, Rémi Cogranne:
Rich model for Steganalysis of color images. WIFS 2014: 185-190 - 2013
- [c45]Miroslav Goljan, Jessica J. Fridrich:
Sensor fingerprint digests for fast camera identification from geometrically distorted images. Media Watermarking, Security, and Forensics 2013: 86650B - 2012
- [c44]Miroslav Goljan, Jessica J. Fridrich:
Sensor-fingerprint based identification of images corrected for lens distortion. Media Watermarking, Security, and Forensics 2012: 83030H - 2011
- [j12]Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification. IEEE Trans. Inf. Forensics Secur. 6(1): 227-236 (2011) - [j11]Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Erratum to "Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification" [Mar 11 227-236]. IEEE Trans. Inf. Forensics Secur. 6(2): 513 (2011) - [c43]Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan:
Breaking HUGO - The Process Discovery. Information Hiding 2011: 85-101 - [c42]Jessica J. Fridrich, Jan Kodovský, Vojtech Holub, Miroslav Goljan:
Steganalysis of Content-Adaptive Steganography in Spatial Domain. Information Hiding 2011: 102-117 - [c41]Jessica J. Fridrich, Miroslav Goljan:
Determining approximate age of digital images using sensor defects. Media Forensics and Security 2011: 788006 - 2010
- [c40]Miroslav Goljan, Jessica J. Fridrich, Mo Chen:
Sensor noise camera identification: countering counter-forensics. Media Forensics and Security 2010: 75410S - [c39]Miroslav Goljan, Jessica J. Fridrich, Tomás Filler:
Managing a large database of camera fingerprints. Media Forensics and Security 2010: 754108
2000 – 2009
- 2009
- [j10]Miroslav Goljan, Andreas Westfeld:
Secure Steganography in Multimedia Content. EURASIP J. Inf. Secur. 2009 (2009) - [c38]Miroslav Goljan, Jessica J. Fridrich, Tomás Filler:
Large scale test of sensor fingerprint camera identification. Media Forensics and Security 2009: 72540I - 2008
- [j9]Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan Lukás:
Determining Image Origin and Integrity Using Sensor Noise. IEEE Trans. Inf. Forensics Secur. 3(1): 74-90 (2008) - [c37]Tomás Filler, Jessica J. Fridrich, Miroslav Goljan:
Using sensor pattern noise for camera model identification. ICIP 2008: 1296-1299 - [c36]Miroslav Goljan:
Digital Camera Identification from Images - Estimating False Acceptance Probability. IWDW 2008: 454-468 - [c35]Miroslav Goljan, Jessica J. Fridrich:
Camera identification from cropped and scaled images. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190E - [c34]Miroslav Goljan, Jessica J. Fridrich, Jan Lukás:
Camera identification from printed images. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190I - 2007
- [c33]Miroslav Goljan, Mo Chen, Jessica J. Fridrich:
Identifying Common Source Digital Camera from Image Pairs. ICIP (6) 2007: 125-128 - [c32]Mo Chen, Jessica J. Fridrich, Jan Lukás, Miroslav Goljan:
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries. Information Hiding 2007: 342-358 - [c31]Mo Chen, Jessica J. Fridrich, Miroslav Goljan:
Digital imaging sensor identification (further study). Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050P - [c30]Mo Chen, Jessica J. Fridrich, Miroslav Goljan, Jan Lukás:
Source digital camcorder identification using sensor photo response non-uniformity. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051G - 2006
- [j8]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Wet paper codes with improved embedding efficiency. IEEE Trans. Inf. Forensics Secur. 1(1): 102-110 (2006) - [j7]Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:
Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensics Secur. 1(2): 205-214 (2006) - [c29]Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:
Detecting digital image forgeries using sensor pattern noise. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720Y - [c28]Miroslav Goljan, Jessica J. Fridrich, Taras Holotyak:
New blind steganalysis and its implications. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607201 - [c27]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Wet paper codes with improved embedding efficiency. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607215 - 2005
- [j6]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Perturbed quantization steganography. Multim. Syst. 11(2): 98-107 (2005) - [j5]Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal:
Writing on wet paper. IEEE Trans. Signal Process. 53(10): 3923-3935 (2005) - [c26]Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:
Determining digital image origin using sensor imperfections. Electronic Imaging: Image and Video Communications and Processing 2005 - [c25]Jan Lukás, Jessica J. Fridrich, Miroslav Goljan:
Digital "bullet scratches" for images. ICIP (3) 2005: 65-68 - [c24]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Efficient Wet Paper Codes. Information Hiding 2005: 204-218 - [c23]Min Wu, Jessica J. Fridrich, Miroslav Goljan, Hongmei Gou:
Handling uneven embedding capacity in binary images: a revisit. Security, Steganography, and Watermarking of Multimedia Contents 2005: 194-205 - [c22]Jessica J. Fridrich, Miroslav Goljan, Petr Lisonek, David Soukal:
Writing on wet paper. Security, Steganography, and Watermarking of Multimedia Contents 2005: 328-340 - [c21]Jessica J. Fridrich, David Soukal, Miroslav Goljan:
Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain. Security, Steganography, and Watermarking of Multimedia Contents 2005: 595-606 - [c20]Jessica J. Fridrich, Miroslav Goljan, David Soukal, Taras Holotyak:
Forensic steganalysis: determining the stego key in spatial domain steganography. Security, Steganography, and Watermarking of Multimedia Contents 2005: 631-642 - 2004
- [c19]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Perturbed quantization steganography with wet paper codes. MM&Sec 2004: 4-15 - [c18]Jessica J. Fridrich, Miroslav Goljan:
On estimation of secret message length in LSB steganography in spatial domain. Security, Steganography, and Watermarking of Multimedia Contents 2004: 23-34 - [c17]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Searching for the stego-key. Security, Steganography, and Watermarking of Multimedia Contents 2004: 70-82 - [c16]Jessica J. Fridrich, Miroslav Goljan, Qing Chen, Vivek Pathak:
Lossless data embedding with file size preservation. Security, Steganography, and Watermarking of Multimedia Contents 2004: 354-365 - 2003
- [j4]Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal:
Quantitative steganalysis of digital images: estimating the secret message length. Multim. Syst. 9(3): 288-302 (2003) - [c15]Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:
New methodology for breaking steganographic techniques for JPEGs. Security and Watermarking of Multimedia Contents 2003: 143-155 - [c14]Jessica J. Fridrich, Miroslav Goljan, David Soukal:
Higher-order statistical steganalysis of palette images. Security and Watermarking of Multimedia Contents 2003: 178-190 - [c13]Jessica J. Fridrich, Miroslav Goljan:
Digital image steganography using stochastic modulation. Security and Watermarking of Multimedia Contents 2003: 191-202 - 2002
- [j3]Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Lossless Data Embedding - New Paradigm in Digital Watermarking. EURASIP J. Adv. Signal Process. 2002(2): 185-196 (2002) - [j2]Jessica J. Fridrich, Miroslav Goljan, Nasir D. Memon:
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique. J. Electronic Imaging 11(2): 262-274 (2002) - [c12]Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea:
Steganalysis of JPEG Images: Breaking the F5 Algorithm. Information Hiding 2002: 310-323 - [c11]Jessica J. Fridrich, Miroslav Goljan:
Practical steganalysis of digital images: state of the art. Security and Watermarking of Multimedia Contents 2002: 1-13 - [c10]Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Lossless data embedding for all image formats. Security and Watermarking of Multimedia Contents 2002: 572-583 - 2001
- [j1]Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Detecting LSB Steganography in Color and Gray-Scale Images. IEEE Multim. 8(4): 22-28 (2001) - [c9]Miroslav Goljan, Jessica J. Fridrich, Rui Du:
Distortion-Free Data Embedding for Images. Information Hiding 2001: 27-41 - [c8]Jiri Fridrich, Miroslav Goljan, Rui Du:
Invertible Authentication Watermark for JPEG Images. ITCC 2001: 223-227 - [c7]Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Reliable detection of LSB steganography in color and grayscale images. MM&Sec 2001: 27-30 - [c6]Jessica J. Fridrich, Miroslav Goljan, Rui Du:
Invertible authentication. Security and Watermarking of Multimedia Contents 2001: 197-208 - 2000
- [c5]Mauro Barni, Franco Bartolini, Jessica J. Fridrich, Miroslav Goljan, Alessandro Piva:
Digital watermarking for the authentication of AVS data. EUSIPCO 2000: 1-4 - [c4]Jiri Fridrich, Miroslav Goljan, Arnold C. Baldoza:
New Fragile Authentication Watermark for Images. ICIP 2000: 446-449 - [c3]Jessica J. Fridrich, Miroslav Goljan, Nasir D. Memon:
Further attacks on Yeung-Mintzer fragile watermarking scheme. Security and Watermarking of Multimedia Contents 2000: 428-437
1990 – 1999
- 1999
- [c2]Jiri Fridrich, Miroslav Goljan:
Images with Self-Correcting Capabilities. ICIP (3) 1999: 792-796 - [c1]Jessica J. Fridrich, Miroslav Goljan:
Comparing robustness of watermarking techniques. Security and Watermarking of Multimedia Contents 1999: 214-225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 02:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint