PUBLICATIONS
These documents are included only to ensure timely dissemination of the authors' research.
All rights are retained by the author or other copyright holder, even though the works are
offered for download here. By downloading one of these documents, you agree to adhere to the
terms of the copyright holder, without whose explicit consent they may not be reposted.
Digital Forensics
- Estimation of Primary Quantization Matrix in Double Compressed JPEG Images, with J. Lukas,
Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 2003.
PDF
- Detection of Copy-Move Forgery in Digital Images with D. Soukal and J. Lukas,
Proc. of DFRWS 2003, Cleveland, OH, USA, August 5-8 2003.
PDF
- Secure Digital Camera, with P. Blythe,
presented at Digital Forensic Research Workshop, Baltimore, August 11-13, 2004.
PDF
- Determining Digital Image Origin Using Sensor Imperfections, with J. Lukas and M. Goljan,
Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 249-260, 2005.
PDF
- Digital Bullet Scratches for Images, with J. Lukas,
Proc. ICIP 2005, Sep. 11-14, 2005, Genova, Italy.
PDF
- Digital Camera Identification from Sensor Noise, with J. Lukas and M. Goljan,
IEEE Transactions on Information Security and Forensics, 1(2), pp. 205-214, June 2006.
PDF
- Detecting Digital Image Forgeries Using Sensor Pattern Noise, with J. Lukas and M. Goljan,
Proc. of SPIE Electronic Imaging, Photonics West, January 2006.
PDF
- Digital Imaging Sensor Identification (Further Study), with Mo Chen and M. Goljan,
Proc. of SPIE Electronic Imaging, Photonics West, January 2007, pp. 0P-0Q.
PDF
- Source Digital Camcorder Identification Using Sensor Photo-Response Non-Uniformity, with Mo Chen, and M. Goljan,
Proc. of SPIE Electronic Imaging, Photonics West, January 2007, pp. 1G-1H.
PDF
- Identifying Common Source Digital Camera From Image Pairs, with M. Goljan and Mo Chen,
Proc. ICIP 2007, Sep. 14-19, 2007, San Antonio, Texas.
PDF
- Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries, with Mo Chen and M. Goljan,
Proc. of 9th Information Hiding Workshop, Saint Malo, France, June 11-13, 2007, LNCS, vol. 4567, pp. 342-358, 2008.
PDF
- Determining Image Origin and Integrity Using Sensor Noise, with Mo Chen, M. Goljan, and J. Lukas,
IEEE Transactions on Information Security and Forensics, 3(1), pp. 74-90, March 2008.
PDF
- Detection of Double-Compression for Applications in Steganography, with T. Pevny,
IEEE Transactions on Information Security and Forensics, 3(2), pp. 247-258, 2008.
PDF
- Camera Identification from Scaled and Cropped Images, with M. Goljan,
Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 26-31, 2008, pp. OE-1-OE-13.
PDF
- Camera Identification from Printed Images, with J. Lukas and M. Goljan,
Proc. SPIE, Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 26-31, 2008, pp. OI-1-OI-12.
PDF
- Digital Camera Identification from Images - Estimating False Acceptance Probability, by M. Goljan,
invited talk at the International Workshop on Digital Watermarking, Busan, Korea, November 10-12, 2008.
PDF
- Using Sensor Pattern Noise for Camera Model Identification, with T. Filler,
Proc. ICIP 2008, San Diego, California, October 12-15, 2008.
PDF
- Large Scale Test of Sensor Fingerprint Camera Identification, with M. Goljan and T. Filler,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, San Jose, CA, January 18-22, 2009, pp. 0I 1-0I 12
PDF
- Digital Image Forensic Using Sensor Noise, IEEE Signal Processing Magazine, vol. 26, no. 2, March 2009, pp. 26-37.PDF
- Sensor Noise Camera Identification: Countering Counter-Forensics, with M. Goljan and Mo Chen,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 0S 01-12, 2010.PDF
- Managing a Large Database of Camera Fingerprints with M. Goljan and T. Filler,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 08 01-12, 2010.PDF
- Derivation of ROCs for Composite Fingerprints and Sequential Trimming with M. Goljan, Technical Report accompanying the paper "Managing a Large Database of Camera Fingerprints" published in Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17–21, 2010.PDF
- On Detection of Median Filtering in Images, with M. Kirchner, Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, vol. 7541, San Jose, CA, January 17–21, pp. 10 1-12, 2010.PDF
- Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification with M. Goljan and Mo Chen, IEEE Trans. on Info. Forensics and Security, vol. 6, no. 1, pp. 227-236, March 2011.PDF
- Determining approximate age of digital images using sensor defects, with M. Goljan, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. 06 1–11, 2011.PDF
- Sensor-Fingerprint Based Identification of Images Corrected for Lens Distortion, with M. Goljan, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 22–26, pp. OH 1-13, 2012.PDF
- Sensor Defects in Digital Image Forensics, Chapter in an edited book "Digital Image Forensics: There is More to a Picture than Meets the Eye", editors H. T. Sencar and N. Memon, Springer, May 2012. ISBN: 978-1-4614-0756-0.PDF
- Sensor Fingerprint Digests for Fast Camera Identification from Geometrically Distorted Images, with M. Goljan, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, vol. 8665, San Francisco, CA, February 3–7, 2013. PDF
- Estimation of Lens Distortion Correction from Single Images, with M. Goljan, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, 2014. PDF
- Effect of Compression on Sensor-Fingerprint Based Camera Identification, with M. Goljan, Mo Chen, and P. ComesanaProc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2016, San Francisco, CA, February 14–18, 2016. PDF
- Scalable Processing History Detector for JPEG Images, with M. Boroumand, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, January 29–February 2, 2017.PDF
- Image Manipulation Detection Using Sensor Linear Pattern, with M. Goljan and M. Kirchner, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, January 29–February 1, 2018.PDF
- Deep Learning for Detecting Processing History of Images, with M. Boroumand, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, January 29–February 1, 2018.PDF
Steganography and Steganalysis
- A New Steganographic Method for Palette Images,
IS&T PICS, Savannah, Georgia, April 25-28, 1999, pp. 285-289.
PostScript,
MS Word 97.
- Secure Steganographic Methods for Palette Images, with Rui Du,
Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, 2000, pp. 47-60.
PostScript,
MS Word 97.
- Steganalysis of LSB Encoding in Color Images, with Rui Du and Long Meng,
ICME 2000, New York City, July 31-August 2, New York, USA.
PostScript,
MS Word 97.
- Steganalysis Based on JPEG Compatibility, with M. Goljan and R. Du,
Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding,
SPIE Multimedia Systems and Applications IV, Denver, CO, August 20-24, 2001, pp. 275-280.
PDF,
MS Word 2000.
- Reliable Detection of LSB Steganography in Grayscale and Color Images, with M. Goljan and R. Du,
Proc. of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30.
PDF
- Detecting LSB Steganography in Color and Gray-Scale Images, with M. Goljan and R. Du,
Magazine of IEEE Multimedia Special Issue on Security, October-November 2001, pp. 22-28.
PDF
- Practical Steganalysis-State of the Art, with M. Goljan,
Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, pp. 1-13.
PDF
- Attacking the OutGuess, with M. Goljan and D. Hogea,
Proc. of the ACM Workshop on Multimedia and Security 2002, Juan-les-Pins, France, December 6, 2002.
PDF
- Steganalysis of JPEG Images: Breaking the F5 Algorithm, with M. Goljan and D. Hogea,
5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, 7-9 October 2002, pp. 310-323.
PDF
- Digital Image Steganography Using Stochastic Modulation, with M. Goljan,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara, California, pp. 191-202, 2003.
PDF
- Higher-Order Statistical Steganalysis of Palette Images, with M. Goljan and D. Soukal,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, pp. 178-190, 2003.
PDF
- New Methodology for Breaking Steganographic Techniques for JPEGs, with M. Goljan and D. Hogea,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents V, Santa Clara, California, pp. 143-155, 2003.
PDF
- Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length, with M. Goljan, D. Hogea, and D. Soukal,
ACM Multimedia Systems Journal, Special issue on Multimedia Security, 9(3), 2003, pp. 288-302.
PDF
- Searching for the Stego Key, with M. Goljan and D. Soukal,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, CA, pp. 70-82, 2004.
PDF
- On Estimation of Secret Message Length in LSB Steganography in Spatial Domain, with M. Goljan,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, San Jose, California, pp. 23-34, 2004.
PDF
- Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes,
6th Information Hiding Workshop, J. Fridrich (ed), LNCS, vol. 3200, Springer-Verlag, pp. 67-81, 2004.
PDF
- Perturbed Quantization Steganography with Wet Paper Codes, with M. Goljan and D. Soukal,
Proc. ACM Multimedia Security Workshop, Magdeburg, Germany, September 20-21, pp. 4-15, 2004.
PDF
- Writing on Wet Paper, with M. Goljan, P. Lisonek, and D. Soukal,
IEEE Trans. on Sig. Proc., Special Issue on Media Security, Eds. T. Kalker and P. Moulin, vol. 53, pp. 3923-3935, October 2005.
PDF
- Writing on Wet Paper, with M. Goljan, P. Lisonek, and D. Soukal, conference version of the above journal paper,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16-20, pp. 328-340, 2005.
PDF
- Forensic Steganalysis: Determining the Stego Key in Spatial Domain Steganography, with M. Goljan, D. Soukal, and T. Holotyak,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16-20, pp. 631-642, 2005.
PDF
- Handling Uneven Embedding Capacity in Binary Images: A Revisit, with Min Wu, M. Goljan, and H. Gou,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16-20, pp. 194-205, 2005.
PDF
- Maximum Likelihood Estimation of Secret Message Length Embedded Using PMK Steganography in Spatial Domain, with D. Soukal and M. Goljan,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, CA, January 16-20, pp. 595-606, 2005.
PDF
- Stochastic Approach to Secret Message Length Estimation in +-k Embedding Steganography, with T.S. Holotyak and D. Soukal,
Proc. SPIE Electronic Imaging San Jose, CA, January 16-20, pp. 673-684, 2005.
PDF
- Perturbed Quantization Steganography, with M. Goljan and D. Soukal,
ACM Multimedia&Security Journal, 11(2), 2005, pp.98--107.
PDF
- Towards Multi-class Blind Steganalyzer for JPEG Images, with T. Pevny,
International Workshop on Digital Watermarking, LNCS vol. 3710, Springer-Verlag, pp. 39-53, 2005.
PDF
- Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics with T. Holotyak and S. Voloshynovskiy,
Proc. of the 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sep. 19-21, 2005, Salzburg, Austria.
PDF
- Efficient Wet Paper Codes, with M. Goljan and D. Soukal,
Information Hiding. 7th International Workshop, LNCS vol. 3727, Springer-Verlag, New York, pp. 204-218, 2005.
PDF
- Steganography via Codes for Memory with Defective Cells, with M. Goljan and D. Soukal,
43rd Conference on Coding, Communication, and Control, Sep 28-30, 2005.
PDF
- Matrix Embedding for Large Payloads, with D. Soukal,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16-19, pp. W1-W15, 2006.
PDF
- Wet paper Codes with Improved Embedding Efficiency, with M. Goljan and D. Soukal,
IEEE Transactions on Information Security and Forensics, 1(1), pp. 102-110, March 2006.
PDF
- New Blind Steganalysis and its Implications, with M. Goljan and T. Holotyak,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16-19, pp. 1-13, 2006.
PDF
- Multiclass Blind Steganalysis for JPEG Images, with T. Pevný,
Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, San Jose, CA, January 16-19, pp. 0O1-0O13, 2006.
PDF
- Determining the Stego Algorithm for JPEG Images, with T. Pevný,
Special Issue of IEE Proceedings-Information Security, 153(3), pp. 75-139, 2006.
PDF
- Matrix Embedding for Large Payloads, with D. Soukal,
IEEE Transactions on Information Security and Forensics, 1(3), pp. 390-394, 2006.
PDF
- On Steganographic Embedding Efficiency, with P. Lisonek and D. Soukal,
Information Hiding. 8th INternational Workshop, Alexandria, VA, LNCS, vol. 4437, pp. 282-296, 2008.
PDF
- Constructing Good Covering Codes for Applications in Steganography, with J. Bierbrauer,
LNCS Transactions on Data Hiding and Multimedia Security, Springer-Verlag, vol. 4920, pp. 1-22, 2008.
PDF
- Minimizing the Embedding Impact in Steganography,
Proc. ACM MM&S Workshop, Geneva, September 26-27, 2006, pp. 2-10.
PDF
- Grid Colorings in Steganography, with P. Lisonek,
IEEE Trans. on Information Theory, 53(4), pp. 1547-1549, April 2007.
PDF
- Merging Markov and DCT Features for Multi-Class JPEG Steganalysis, with T. Pevný,
Proc. SPIE Electronic Imaging, Photonics West, January 2007, pp. 03-04.
PDF
- Practical Methods for Minimizing Embedding Impact in Steganography, with T. Filler,
Proc. SPIE Electronic Imaging, Photonics West, January 2007, pp. 02-03.
PDF
- Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, with T. Pevný and J. Kodovský,
Proc. ACM MM&S Workshop, Dallas, TX, September 20-21, pp. 3-14, 2007.
PDF
- Binary Quantization using Belief Propagation with Decimation over Factor Graphs of LDGM Codes, with T. Filler,
Proc. 45th Allerton Conference on Coding, Communication, and Control, September 26-28, 2007.
PDF
- Influence of Embedding Strategies on Security of Steganographic Methods in the JPEG Domain, with J. Kodovský,
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 28-31, 2008, pp. 02-1-02-13.
PDF
- Estimation of Primary Quantization Matrix for Steganalysis of Double-Compressed JPEG Images, with T. Pevný,
Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, January 28-31, 2008, pp. 11-1-11-13.
PDF
- Detection of Double-Compression in JPEG Images for Applications in Steganography, with T. Pevný,
IEEE Trans. on Info. Forensics and Security, 3(2), pp. 247-258, 2008.
PDF
- Benchmarking for Steganography, with T. Pevný,
Information Hiding. 10th International Workshop, Santa Barbara, CA, LNCS vol. 5284, 2008.
PDF
- Multi-Class Detector of Current Steganographic Methods for JPEG Format, with T. Pevný,
IEEE Trans. on Info. Forensics and Security, 3(4), pp. 635-650, 2008.
PDF
- The Square Root Law of Steganographic Capacity, with A. D. Ker, T. Pevný, and J. Kodovský,
Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22-23, pp. 107-116, 2008.
PDF
- On Completeness of Feature Spaces in Steganalysis, with J. Kodovský,
Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22-23, pp. 123-132, 2008.
PDF
- Novelty Detection in Blind Steganalysis, with T. Pevný,
Proc. ACM Multimedia and Security Workshop, Oxford, UK, September 22-23, pp. 167-176, 2008.
PDF
- From Blind to Quantitative Steganalysis, with T. Pevný and A. D. Ker,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, San Jose, CA, January 18-22, 2009, pp. 0C 1-0C 14.
PDF
- The Square Root Law of Steganographic Capacity for Markov Covers, with T. Filler and A. D. Ker,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XI, San Jose, CA, January 18-22, 2009, pp. 08 1-08 11.
PDF
- Asymptotic Behavior of the ZZW Embedding Construction,
IEEE Trans. on Information Security and Forensics, 4(1), pp. 151-153, 2009.
PDF
- Complete Characterization of Perfectly Secure Stegosystems with Mutually Independent Embedding Operation, with T. Filler,
IEEE ICASSP, April 19-24, 2009.
PDF
- Fisher Information Determines Capacity of epsilon-secure Steganography, with T. Filler, 11th Information
Hiding Workshop, Darmstadt, Germany, June 7–10, 2009, LNCS vol. 5806, Springer-Verlag, pp. 31-47.
PDF
- Calibration Revisited, with J. Kodovský, Proc. ACM Multimedia and Security Workshop,
Princeton, NJ, September 7–8, pp. 63–74, 2009.
PDF
- Steganalysis by Subtractive Pixel Adjacency Matrix, with T. Pevný and P. Bas, Proc. ACM
Multimedia and Security Workshop, Princeton, NJ, September 7–8, pp. 75–84, 2009.
PDF
- Wet ZZW Construction for Steganography with T. Filler, IEEE Workshop on Information Forensic
and Security (WIFS), London, UK, December 7-9, 2009.
PDF
- Minimizing Embedding Impact in Steganography Using Trellis-Coded Quantization, with T. Filler and J. Judas,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17–21, pp. 05-01 - 05-14, 2010.PDF
The implementation of the syndrome trellis codes for steganography is available from: DDE website.
- Modern Steganalysis Can Detect YASS, with J. Kodovsky and T. Pevný,
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17–21, pp. 02-01 - 02-11, 2010.PDF
- Steganalysis by Subtractive Pixel Adjacency Matrix with T. Pevný and P. Bas, IEEE Trans. on Info. Forensics and Security, vol. 5(2), pp. 215–224, 2010.PDF
- Minimizing Additive Distortion Functions with Non-Binary Embedding Operation in Steganography, with T. Filler
Proc. IEEE WIFS’10, Seattle, WA, December 12-15, 2010. PDF
- Quantitative Steganalysis of LSB Embedding in JPEG Domain, with J. Kodovský, Proc. ACM Multimedia & Security Workshop, Rome, Italy, September 9-10, pp. 187-198, 2010.PDF
- Steganography Using Gibbs Random Fields, with T. Filler, Proc. ACM Multimedia & Security Workshop, Rome, Italy, September 9-10, pp. 199-212, 2010.PDF
- Quantitative Structural Steganalysis of Jsteg, with J. Kodovský, IEEE Trans. on Info. Forensics and Security, 5(4), pp. 681-693, 2010.PDF
- Gibbs construction in Steganography, with T. Filler, IEEE Trans. on Info. Forensics and Security, 5(4), pp. 705-720, 2010.PDF
- Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes, with T. Filler and J. Judas, IEEE Trans. on Info. Forensics and Security, vol. 6(1), pp. 920–935, 2011. PDF.
- Design of adaptive steganographic schemes for digital images, with T. Filler, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OF 1–14, 2011.PDF
- Steganalysis in high dimensions: fusing classifiers built on random subspaces, with J. Kodovský, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, vol. 7880, San Francisco, CA, January 23–26, pp. OL 1–13, 2011.PDF.
- Breaking HUGO – the Process Discovery, with J. Kodovský, M. Goljan, and V. Holub, 13th Information Hiding Conference, Prague, Czech Republic, May 18–20, 2011, LNCS vol. 6958, Springer-Verlag, pp. 85-101.PDF
- Steganalysis of Content-Adaptive Steganography in Spatial Domain, with J. Kodovský, M. Goljan, and V. Holub, 13th Information Hiding Conference, Prague, Czech Republic, May 18–20, 2011, LNCS vol. 6958, Springer-Verlag, pp. 102-117.PDF
- On Dangers of Overtraining Steganography to an Incomplete Cover Model, with J. Kodovský and V. Holub, Proc. ACM Multimedia & Security Workshop, Niagara Falls, New York,
September 29-30, pp. 69-76, 2011.PDF
- From Blind to Quantitative Steganalysis, with T. Pevný and A. Ker, IEEE Trans. on Info. Forensics and Security, 2011.PDF
- Ensemble Classifiers for Steganalysis of Digital Media, with J. Kodovský and V. Holub, IEEE Trans. on Info. Forensics and Security, vol. 7(2), pp. 432-444, 2012. PDF
- Rich Models for Steganalysis of Digital Images, with J. Kodovský, IEEE Trans. on Info. Forensics and Security, vol. 7(3), pp. 868-882, 2012.PDF
- Steganalysis of JPEG images using rich models, with J. Kodovský, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 22–26, pp. 0A 1-13, 2012.PDF
- Optimizing pixel predictors for steganalysis, with V. Holub, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIV, vol. 8303, San Francisco, CA, January 22–26, pp. 09 1–13, 2012.PDF
- Steganalysis of LSB Replacement Using Parity-Aware Features, with J. Kodovský 14th Information Hiding Conference, Berkeley, CA, May 15–18, 2012, Springer LNCS vol. 7692, pp. 31-45.PDF
- JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts, with J. Kodovský 14th Information Hiding Conference, Berkeley, CA, May 15–18, 2012, Springer LNCS vol. 7692, pp. 78-93.PDF
- Effect of Cover Quantization on Steganographic Fisher Information, IEEE Workshop on Information Forensic
and Security (WIFS), Tenerife, Spain, December 2-5, 2012.
PDF
- Designing Steganographic Distortion Using Directional Filters, with V. Holub, IEEE Workshop on Information Forensic and Security (WIFS), Tenerife, Spain, December 2-5, 2012.
PDF
- Effect of Cover Quantization on Steganographic Fisher Information, journal, expanded version of the WIFS paper, IEEE TIFS, vol. 8(2), pp. 361-373, February 2013. PDF
- On the Role of Side-Information in Steganography in Empirical Covers, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, vol. 8665, San Francisco, CA, February 3–7, 2013. PDF
- Quantitative Steganalysis Using Rich Models, with J. Kodovský, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, vol. 8665, San Francisco, CA, February 3–7, 2013. PDF
- Random Projections of Residuals as an Alternative to Co-occurrences in Steganalysis, with V. Holub and T. Denemark, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, vol. 8665, San Francisco, CA, February 3–7, 2013. PDF
- Multivariate Gaussian Model for Designing Additive Distortion for Steganography, with J. Kodovský, IEEE ICASSP, Vancouver, May 26–31, 2013.PDF
- Steganalysis in Resized Images, with J. Kodovský, IEEE ICASSP, Vancouver, May 26–31, 2013.PDF
- Digital Image Steganography Using Universal Distortion, with V. Holub, 1st IH&MMSec. Workshop, Montpellier, France, June 17-19, 2013.PDF
- Moving Steganography and Steganalysis from the Laboratory into the Real World, with A. D. Ker, P. Bas, R. Boehme, R. Cogranne, S. Craver, T. Filler, T. Pevny, 1st IH&MMSec. Workshop, Montpellier, France, June 17-19, 2013.PDF
- Random Projections of Residuals for Digital Image Steganalysis, with V. Holub, IEEE TIFS, vol. 8(12), December 2013, pp. 1996--2006.PDF
- Further Study on the Security of S-UNIWARD, with T. Denemark and V. Holub, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, 2014.PDF
- Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate its Impact, with J. Kodovsky and V. Sedighianaraki, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, 2014.PDF
- Challenging the Doctrines of JPEG Steganography, with V. Holub, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, 2014.PDF
- Detection of Content-Adaptive LSB Matching (a Game Theory Approach), with T. Denemark, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014, vol. 9028, San Francisco, CA, February 2–6, 2014.PDF
- Effect of Image Downsampling on Steganographic Security, with J. Kodovský, IEEE TIFS vol. 9(5), February 2014, pp. 752-762.PDF
- Universal Distortion Function for Steganography in an Arbitrary Domain, with V. Holub and T. Denemark, EURASIP Journal on Information Security (Section: SI: Revised Selected Papers of ACM IH and MMS 2013).PDF
- Selection-Channel-Aware Rich Model for Steganalysis of Digital Images, with T. Denemark, V. Sedighi, V. Holub, and R. Cogranne, Proc. IEEE WIFS, Atlanta, GA, December 3–5, 2014.PDF
- Rich Model for Steganalysis of Color Images, with M. Goljan and R. Cogranne, Proc. IEEE WIFS, Atlanta, GA, December 3–5, 2014.PDF
- Optimal Detection of Steganography Using a Statistical Model of FLD Ensemble Classifiers, with R. Cogranne and T. Denemark, Proc. IEEE WIFS, Atlanta, GA, December 3–5, 2014.PDF
- Low Complexity Features for JPEG Steganalysis Using Undecimated DCT with V. Holub, IEEE TIFS vol. 10(2), February 2015, pp. 219-228.PDF
- Phase-Aware Projection Model for Steganalysis of JPEG Images, with V. Holub, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, February 8–12, 2015.PDF
- CFA-aware Features for Steganalysis of Color Images, with M. Goljan, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, February 8–12, 2015.PDF
- Content-Adaptive Pentary Steganography Using the Multivariate Generalized Gaussian Cover Model, with V. Sedighi and R. Cogranne, Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2015, vol. 9409, San Francisco, CA, February 8–12, 2015.PDF
- Improving Steganographic Security by Synchronizing the Selection Channel, with T. Denemark, 3rd IH&MMSec. Workshop, Portland, Oregon, June 17-19, 2015.PDF
- Effect of Imprecise Knowledge of the Selection Channel on Steganalysis, with V. Sedighi, 3rd IH&MMSec. Workshop, Portland, Oregon, June 17-19, 2015.PDF
- Modeling and Extending the Ensemble Classifier for Steganalysis of Digital Images Using Hypothesis Testing Theory, with R. Cogranne, IEEE TIFS 10(2), pp. 2627--2642, December 2015.PDF
- Content-Adaptive Steganography by Minimizing Statistical Detectability, with V. Sedighi and R. Cogranne, IEEE TIFS, vol 11, no. 2, pp. 221-234, 2016.PDF
- Side-Informed Steganography with Additive Distortion, with T. Denemark, Proc. IEEE WIFS, Rome, Italy November 16–19, 2015.PDF
- Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?, with R. Cogranne, V. Sedighi, and T. Pevny, IEEE WIFS, Rome, Italy November 16–19, 2015.PDF
- Toss that BOSSbase, Alice!, with V. Sedighi and R. Cogranne, Proc. IS&T, Electronic Imaging, Media Watermarking, Security,
and Forensics 2016, San Francisco, CA, February 14–18, 2016.PDF
- Improving Selection-Channel-Aware Steganalysis Features, with T. Denemark and P. Comesana, Proc. IS&T, Electronic Imaging,
Media Watermarking, Security, and Forensics 2016, San Francisco, CA, February 14–18, 2016.PDF
- Steganalysis Features for Content-Adaptive JPEG Steganography, with T. Denemark and M. Boroumand, IEEE TIFS, vol. 11, no. 8, pp. 1736-1746, August 2016.PDF
- Effect of Saturated Pixels on Security of Steganographic Schemes for Digital Images, with V. Sedighi, Proceedings of IEEE International Conference on Image Processing (ICIP), 2016, September 25--28, Phoenix, Arizona.PDF
- Boosting Steganalysis with Explicit Feature Maps, with M. Boroumand, 4th IH&MMSec. Workshop, Vigo, Spain, June 20-22, 2016.PDF
- Practical Strategies for Content-Adaptive Batch Steganography and Pooled Steganalysis, with R. Cogranne and V. Sedighi, IEEE ICASSP, New Orleans, March 5–9, 2017.PDF
- Steganography with Two JPEGs of the Same Scene, with T. Denemark, IEEE ICASSP, New Orleans, March 5–9, 2017.PDF
- Histogram Layer, Moving Convolutional Neural Networks Towards Feature Based Steganalysis, with V. Sedighi, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, January 29–February 2, 2017.PDF
- Model Based Steganography with Precover, with T. Denemark, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, January 29–February 2, 2017.PDF
- Nonlinear Feature Normalization in Steganalysis, with M. Boroumand, 5th IH&MMSec. Workshop, Philadelphia, PA, June 20-22, 2017.PDF
- JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images, with Mo Chen, M. Boroumand, and V. Sedighi, 5th IH&MMSec. Workshop, Philadelphia, PA, June 20-22, 2017.PDF
- Steganography with Multiple JPEG Images of the Same Scene, with T. Denemark, IEEE TIFS, vol. 12, no. 10, pp. 2308-2319, October 2017.PDF
- Applications of Explicit Non-Linear Feature Maps in Steganalysis, with M. Boroumand, IEEE TIFS, vol. 13, no. 4, pp. 823--833, April 2018.PDF
- Deep Learning Regressors for Quantitative Steganalysis, with Mo Chen and M. Boroumand, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, January 29–February 1, 2018.PDF
- Steganalyzing Images of Arbitrary Size with CNNs, with C. Fuji-Tsang, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, January 29–February 1, 2018.PDF
- Natural Steganography in JPEG Compressed Images, with P. Bas and T. Denemark, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, January 29–February 1, 2018.PDF
- Deep Residual Network for Steganalysis of Digital Images, with M. Boroumand and M. Chen, IEEE TIFS, vol. 14, no. 5, pp. 1181--1193, May 2019.PDF
- Detection of Diversified Stego Sources with CNNs, with J. Butora, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 14–17, 2019.PDF
- Are we there yet?, with M. Boroumand and R. Cogranne, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 14–17, 2019.PDF
- A Natural Steganography Embedding Scheme Dedicated to Color Sensors in the JPEG Domain, with Théo Taburet, Patrick Bas, Wadih Sawaya, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 14–17, 2019.PDF
- Reference Channels for Steganalysis of Images with Convolutional Neural Networks, with Mo Chen and M. Boroumand, 7th IH&MMSec. Workshop, Paris, France, July 3-5, 2019.PDF
- Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain, with Y. Yousfi, J. Butora, and Q. Giboulot, 7th IH&MMSec. Workshop, Paris, France, July 3-5, 2019.PDF
- Effect of JPEG Quality on Steganographic Security, with J. Butora, 7th IH&MMSec. Workshop, Paris, France, July 3-5, 2019.PDF
- Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain, with T. Taburet, P. Bas, and W. Sawaya, 7th IH&MMSec. Workshop, Paris, France, July 3-5, 2019.PDF
- Reverse JPEG Compatibility Attack, with J. Butora, IEEE TIFS, 15(1), pp. 1444–1454, Dec 2019.PDF
- Payload Scaling for Adaptive Steganography: An Empirical Study, with Q. Giboulot, IEEE SPL 26(9), 1339–1343 July 2019.PDF
- Synchronizing Embedding Changes in Side-Informed Steganography, with M. Boroumand, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.PDF
- JPEG Steganalysis Detectors Scalable With Respect to Compression Quality, with Y. Yousfi, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.PDF
- Minimum Perturbation Cost Modulation for Side-Informed Steganography, with J. Butora, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2020, San Francisco, CA, January 26–30, 2020.PDF
- Steganography and its Detection in JPEG Images Obtained with the “Trunc” Quantizer, with J. Butora, IEEE ICASSP, Barcelona, Spain, May 4–8, 2020.PDF
- An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHotConv Solution, with Y. Yousfi, IEEE SPL, 2020.PDF
- Turning Cost-Based Steganography into Model-Based, with J. Butora and Y. Yousfi, 8th IH&MMSec. Workshop, Denver, CO, June 20-22, 2020.PDF
- Natural Steganography in JPEG Domain with a Linear Development Pipeline, with T. Taburet, P. Bas, and W. Sawaya, IEEE TIFS, pp. 173-186, 2020.PDF
- Extending the Reverse JPEG Compatibility Attack to Double Compressed Images, with J. Butora, IEEE ICASSP, 2021, Toronto. PDF
- ImageNet Pre-trained CNN Models for JPEG Steganalysis, with Y. Yousfi, J. Butora, and E. Khvedchenya, IEEE WIFS, New York, NY, December 6-11, 2020.PDF
- Improving EfficientNet for JPEG Steganalysis, with J. Butora, Y. Yousfi, and C. F. Tsang, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021.PDF
- How to Pretrain for Steganalysis, with J. Butora and Y. Yousfi, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021.PDF
- Revisiting Perturbed Quantization, with J. Butora, 9th IH&MMSec. Workshop, Brussels, Belgium, June 22-25, 2021.PDF
- CNN Steganalyzers Leverage Local Embedding Artifacts, with Y. Yousfi and J. Butora, IEEE WIFS, Montpellier, France, December 7-10, 2021.PDF
- Data Augmentation for JPEG Steganalysis, with Y. Yousfi and T. Itzhaki, IEEE WIFS, Montpellier, France, December 7-10, 2021.PDF
- Detector-Informed Batch Steganography and Pooled Steganalysis, with Y. Yousfi and E. Dworetzky, 10th IH&MMSec. Workshop, Santa Barbara, California, June 27-28, 2022.
PDF
- Cost Polarization by Dequantizing for JPEG Steganography, with E. Kaziakhmedov, Y. Yousfi, and E. Dworetzky, Proc. IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2023, San Francisco, CA, January 16–20, 2023.PDF
- On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests, with E. Dworetzky and E. Kaziakhmedov, 11th IH&MMSec. Workshop, Chicago, IL, June 28-30, 2023.
PDF
- Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice, with E. Dworetzky and E. Kaziakhmedov, 11th IH&MMSec. Workshop, Chicago, IL, June 28-30, 2023.
PDF
- Limits of Data Driven Steganography Detectors, with E. Kaziakhmedov and E. Dworetzky, 11th IH&MMSec. Workshop, Chicago, IL, June 28-30, 2023.
PDF
- Explaining the Bag Gain in Batch Steganography, with E. Dworetzky, IEEE TIFS, vol. 18, pp. 3031-3043, 2023.PDF
- Observing Bag Gain in JPEG Batch Steganography, with E. Kaziakhmedov and E. Dworetzky, IEEE WIFS, Nuremberg, Germany, December 4-7, 2023.
PDF
- Analyzing Quantitative Detectors for Content-Adaptive Steganography, with E. Kaziakhmedov and E. Dworetzky, Proc. IS&T, Electronic Imaging,
Media Watermarking, Security, and Forensics 2024, San Francisco, CA, January 21–25, 2024.PDF
- Secure Payload Scaling for Source Adaptive Payload Allocation, with E. Dworetzky and E. Kaziakhmedov, Proc. IS&T, Electronic Imaging,
Media Watermarking, Security, and Forensics 2024, San Francisco, CA, January 21–25, 2024.PDF
- Improving Steganographic Security with Source Biasing, with E. Dworetzky and E. Kaziakhmedov, 12th IH&MMSec. Workshop, Vigo, Spain, June 24-26, 2024.
PDF
Lossless (erasable, removable, invertible, distortion-free) Embedding and Authentication
- Invertible Authentication, with M. Goljan and Rui Du, Proc. SPIE Photonics West, vol. 3971, Security and Watermarking of
Multimedia Contents III, San Jose, California January (2001), pp. 197-208 MS Word 97.
- Invertible Authentication Watermark for JPEG Images, with M. Goljan and R. Du, ITCC 2001, Las Vegas, Nevada,
April 2-4, 2001, pp. 223-227.MS Word 97.
- Distortion-free Data Embedding, with M. Goljan and R. Du, 4th Information Hiding Workshop, LNCS vol. 2137, Springer-Verlag,
New York, 2001, pp. 27-41. MS Word 97.
- Lossless Data Embedding-New Paradigm in Digital Watermarking, with M. Goljan and R. Du, Special Issue on
Emerging Applications of Multimedia Data Hiding, Vol. 2002, No.2, February 2002, pp. 185-196.
PDF Journal Editorial
- Lossless Data Embedding for All Image Formats, with M. Goljan and R. Du, Proc. SPIE Photonics West, Vol. 4675,
Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2002, 572-583.
PostScript,
MS Word 2000.
- Lossless Authentication of MPEG-2 Video, with Rui Du, Proc. ICIP 2002, Rochester, NY
PDF
- Lossless Data Embedding with File Size Preservation, with M. Goljan, Q. Chen, and V. Pathak, Proc. EI SPIE San Jose, CA, Jan 2004. PDF
Watermarking for Image Authentication
- Image Watermarking for Tamper Detection, Proc. ICIP '98, Chicago, Oct 1998.
PostScript,
MS Word 97.
- Methods for Detecting Changes in Digital Images, Proc. of The 6th
IEEE International Workshop on Intelligent Signal Processing and Communication
Systems (ISPACS'98), Melbourne, Australia, 4-6 November 1998, pp. 173-177.
PostScript,
MS Word 7.0.
- A Hybrid Watermark for Tamper Detection in Digital Images, ISSPA'99 Conf.,
Brisbane, Australia, August 22-25, 1999, pp. 301-304.
PostScript,
MS Word 97.
- Methods for Tamper Detection in Digital Images, Proc. ACM Workshop on
Multimedia and Security, Orlando, FL, October 30-31, 1999, pp. 19-23.
PostScript,
MS Word 97.
- Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme, with N. Memon, and M. Goljan
Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking
of Multimedia Contents, San Jose, California, January 24-26, 2000, pp.428-437.
PostScript,
MS Word 97.
- Digital Watermarking for the Authentication of AVS Data, with M. Barni, F. Bartolini, and A. Piva,
EUSIPCO 2000, Tampere, Finland, September 5-8, 2000.
PostScript.
- New Fragile Authentication Watermark for Images, with M. Goljan and A.C. Baldoza,
ICIP'2000, Vancouver, September 10-13, 2000, Canada.
PostScript,
MS Word 97.
- Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique, with M. Goljan and N. Memon,
Journal of Electronic Imaging, May, 2002. PDF.
- Security of Fragile Authentication Watermarks with Localization, Proc. SPIE
Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents,
San Jose, California, January, 2002, pp. 691-700.
PostScript,
MS Word 2000.
Self-Embedding
- Protection of Digital Images Using Self Embedding, with M. Goljan,
Symposium on Content Security and Data Hiding in Digital Media,
New Jersey Institute of Technology, May 14, 1999.
PostScript,
MS Word 97.
- Images with Self-Correcting Capabilities, with M. Goljan, ICIP'99, Kobe,
Japan, October 25-28, 1999.
PostScript,
MS Word 97.
Robust Watermarking
- Robust Digital Watermarking Based on Key-Dependent Basis Functions,
with 2 Lt Arnold C. Baldoza and Richard J. Simard, Proc. 2nd Information Hiding Workshop,
LNCS vol. 1525, Springer-Verlag, New York 1998,pp. 143-157.
PostScript,
MS Word 7.0,
Abstract.
- Key-Dependent Random Image Transforms and Their Applications in Image Watermarking,
1999 International Conference on Imaging Science, Systems, and Technology (CISST'99),
Las Vegas, June 28-July 1, 1999, pp. 237-243.
PostScript,
MS Word 97.
- Combining Low-Frequency and Spread Spectrum Watermarking, Proc. SPIE Int.
Symposium on Optical Science, Engineering, and Instrumentation, San Diego,
July 19-24, 1998, pp. 2-12.
PostScript,
MS Word 97.
- Comparing Robustness of Watermarking Techniques, with M. Goljan, Proc. of SPIE
Vol. 3657 (Security and Watermarking of Multimedia Content), San Jose, Jan 25-27, 1999, pp. 214-225.
PostScript,
MS Word 97.
Visual Hash
- Robust Bit Extraction from Images, Proc. IEEE ICMCS'99 , Florence, Italy,
Vol. 2, pp. 536-540, June 7-11, 1999, pp. 536-540.
PostScript,
MS Word 97.
- Visual Hash for Oblivious Watermarking, Proc. SPIE Photonic West Electronic
Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose,
California, January 24-26, 2000, pp. 286-294.
PostScript,
MS Word 97.
- Robust Hash Functions for Digital Watermarking, with M. Goljan, ITCC 2000,
Las Vegas, Nevada, March 27-29, 2000, pp. 173-178.
PostScript,
MS Word 97.
Encryption
- Symmetric Ciphers Based on Two-Dimensional Chaotic Maps,
Int. J. Bifurcation and Chaos, 8(6), June 1998, pp. 1259-1284.
PostScript,
MS Word 7.0,
Abstract.
- Image Encryption Based on Chaotic Maps, Proc. IEEE Conf. on Systems,
Man, and Cybernetics, October 12-15, 1997, pp. 1105-1110.
PostScript,
MS Word 7.0.
- Secure Image Ciphering Based on Chaos, Final Report for
AFRL, Rome NY, March 1997.
MS Word 7.0,
Abstract, send me an e-mail if you want a PS version.
Tutorials
- Applications of Data Hiding in Digital Images, Tutorial (PowerPoint slides) for The ISSPA'99
Conference in Brisbane, Australia, August 22-25, 1999.
Part I,
Part II.
Chaotic Systems
- Removing Observational Uncertainty from Orbits of Nonlinear Dynamical Systems,
PhD Dissertation, Binghamton University, May 1995, Abstract
- Reconstruction of Chaotic Orbits Under Finite Resolution, with J.F.Geer, J. Appl. Math. and Comp.
80, 129-159, 1994, Abstract.
- Reconstruction of Blurred Orbits Under Finite Resolution, with J.F.Geer,
J. Appl. Math. and Comp. 71, 227-245, 1995, Abstract.
- Discrete-Time Dynamical Systems Under Observational Uncertainty,
J. Appl. Math. and Comp. 82, pp. 181-207, 1997, Abstract.
- Beneficial Chaos?, Int. J. of Gen. Sys., 26(1-2),
pp. 179-197, 1997, Abstract.
- Observational Uncertainty in Discrete-Time Chaotic Dynamical Systems, Proc.
IFSA'97, vol. III, June 25-29, 1997, Prague, The Czech Republic, pp. 261-268.
PostScript,
MS Word 7.0
Fuzzy Dynamical Systems
- On Chaotic Systems: Fuzzified Logistic Map, Int. J. of Gen. Sys.
22(4), 381-89, 1994,
Abstract.
- Fuzzy Mathematics in Dynamical Systems: Is There a Place for It?,
Int. J. of Gen. Sys. 22(4), 381-89, 1994,
Abstract.
- Mathematics of Finite Resolution, Int. J. of Gen. Sys., 25(3), pp. 245-258, 1996,
Abstract.
Nonlinear Modeling
- Nonlinear Forecasting with Wavelet Neural Networks, with Anya L. Tascillo,
and Chris Gearhart, Proc. IEEE Conf. on Systems, Man, and Cybernetics, October
12-15, 1997, pp. 1111-1116.
- Application of low Dimensional Deterministic Signal Modeling to
Analysis, Forecasting, and Noise Reduction of Automobile Emissions.
Final Report for an industrial grant sponsored by Ford Motor Company,
Detroit, MI, September 1996
- Fractal Growth with L-Systems, with J. Ryder. ACM - SIGCSE 1996,
Technical Symposium, Philadelphia, PA Feb 14-20, 1996
- Fractal Properties of Discontinuities in Rocks, Technical Report,
Sep. 1990, Mining Institute, Ostrava, Czechoslovakia (in Czech)
- Mathematical Model of Plasma Flow in TOKAMAK Castor, M.Sc. Thesis,
Czech Technical University, Prague, Czechoslovakia, May 1987 (in Czech)