Christian Krätzer
Orcid: 0000-0002-0138-4638Affiliations:
- Otto von Guericke University of Magdeburg, Germany
According to our database1,
Christian Krätzer
authored at least 73 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection.
J. Imaging, February, 2024
Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior.
Proceedings of the Media Watermarking, 2023
Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models.
Proceedings of the Media Watermarking, 2023
2022
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection.
Sensors, 2022
Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection.
Proceedings of the Media Watermarking, 2022
2021
J. Imaging, 2021
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur., 2021
Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021
AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions.
Proceedings of the Media Watermarking, 2021
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the 27th European Signal Processing Conference, 2019
2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018
Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
2016
A semantic framework for a better understanding, investigation and prevention of organized financial crime.
Proceedings of the Sicherheit 2016: Sicherheit, 2016
2015
Proceedings of the 23rd European Signal Processing Conference, 2015
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW 2015), 2015
2014
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014
2013
Statistical pattern recognition for audio-forensics : empirical investigations on the application scenarios audio steganalysis and microphone forensics.
PhD thesis, 2013
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack.
Proceedings of the Communications and Multimedia Security, 2013
2012
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis.
Trans. Data Hiding Multim. Secur., 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy.
Proceedings of the Multimedia and Security Workshop, 2012
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope.
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the Media Watermarking, 2012
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012
2011
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Proceedings of the Media Watermarking, 2011
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
Proceedings of the Image Quality and System Performance VIII, 2011
Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011
Proceedings of the 1st International Workshop on Semantic Digital Archives, 2011
Comparative review of studies on aging effects in context of biometric authentication.
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011
FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011
Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2011
Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
Proceedings of the Three-Dimensional Imaging, 2011
2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010
Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010
Proceedings of the Communications and Multimedia Security, 2010
2009
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
Proceedings of the Multimedia and Security Workshop, 2009
The impact of information fusion in steganalysis on the example of audio steganalysis.
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
2008
Proceedings of the Security, 2008
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches.
Proceedings of the Security, 2008
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding.
Proceedings of the 10th workshop on Multimedia & Security, 2008
2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Digital audio forensics: a first practical evaluation on microphone and environment classification.
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006