Christian Krätzer

Orcid: 0000-0002-0138-4638

Affiliations:
  • Otto von Guericke University of Magdeburg, Germany


According to our database1, Christian Krätzer authored at least 73 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection.
J. Imaging, February, 2024

Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024

Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024

GAN-based Minutiae-driven Fingerprint Morphing.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

2023
Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior.
Proceedings of the Media Watermarking, 2023

Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models.
Proceedings of the Media Watermarking, 2023

2022
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection.
Sensors, 2022

Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection.
Proceedings of the Media Watermarking, 2022

2021
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features.
J. Imaging, 2021

Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur., 2021

Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021

AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions.
Proceedings of the Media Watermarking, 2021

General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Systematic Analysis of Covert Channels in the Network Time Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
Visual Feature Space Analyses of Face Morphing Detectors.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Dempster-Shafer Theory for Fusing Face Morphing Detectors.
Proceedings of the 27th European Signal Processing Conference, 2019

2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018

Generalized Benford's Law for Blind Detection of Morphed Face Images.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018

Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
A semantic framework for a better understanding, investigation and prevention of organized financial crime.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

2015
Considerations on the benchmarking of media forensics.
Proceedings of the 23rd European Signal Processing Conference, 2015

Using different encryption schemes for secure deletion while supporting queries.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW 2015), 2015

2014
A Hierarchical Model for the Description of Internet-Based Communication.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

2013
Statistical pattern recognition for audio-forensics : empirical investigations on the application scenarios audio steganalysis and microphone forensics.
PhD thesis, 2013

Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack.
Proceedings of the Communications and Multimedia Security, 2013

2012
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis.
Trans. Data Hiding Multim. Secur., 2012

Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy.
Proceedings of the Multimedia and Security Workshop, 2012

First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope.
Proceedings of the Multimedia and Security Workshop, 2012

Extending a context model for microphone forensics.
Proceedings of the Media Watermarking, 2012

Design and evaluation of security multimedia warnings for children's smartphones.
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012

2011
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Contextualizing security for digital long-term preservation.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

A context model for microphone forensics and its application in evaluations.
Proceedings of the Media Watermarking, 2011

Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
Proceedings of the Image Quality and System Performance VIII, 2011

Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

A Security Contextualisation Framework for Digital Long-Term Preservation.
Proceedings of the 1st International Workshop on Semantic Digital Archives, 2011

Comparative review of studies on aging effects in context of biometric authentication.
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011

FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011

Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011

Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2011

Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
Proceedings of the Three-Dimensional Imaging, 2011

2010
Modelling watermark communication protocols using the CASPER modelling language.
Proceedings of the Multimedia and Security Workshop, 2010

Audio annotation watermarking with robustness against DA/AD conversion.
Proceedings of the Media Forensics and Security II, 2010

The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010

Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis.
Proceedings of the Communications and Multimedia Security, 2010

2009
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
Proceedings of the Multimedia and Security Workshop, 2009

The impact of information fusion in steganalysis on the example of audio steganalysis.
Proceedings of the Media Forensics and Security I, 2009

Microphone Classification Using Fourier Coefficients.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

2008
Nested object watermarking: transparency and capacity evaluation.
Proceedings of the Security, 2008

WLAN steganography revisited.
Proceedings of the Security, 2008

Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches.
Proceedings of the Security, 2008

Impact of feature selection in classification for hidden channel detection on the example of audio data hiding.
Proceedings of the 10th workshop on Multimedia & Security, 2008

2007
Mel-cepstrum-based steganalysis for VoIP steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Digital audio forensics: a first practical evaluation on microphone and environment classification.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
Transparency benchmarking on audio watermarks and steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Design und Evaluierung von Steganographie für Voice-over-IP.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

WLAN steganography: a first practical review.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Design and evaluation of steganography for voice-over-IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006


  Loading...