Jana Dittmann
Affiliations:- Otto von Guericke University of Magdeburg, Germany
According to our database1,
Jana Dittmann
authored at least 279 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection.
J. Imaging, February, 2024
On Feasibility of Transferring Watermarks from Training Data to GAN-Generated Fingerprint Images.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT).
Proceedings of the Sicherheit, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
2023
IEEE Access, 2023
Data-Driven Fingerprint Reconstruction from Minutiae Based on Real and Synthetic Training Data.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023
Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior.
Proceedings of the Media Watermarking, 2023
Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models.
Proceedings of the Media Watermarking, 2023
Protocol Based Similarity Evaluation of Publicly Available Synthetic and Real Fingerprint Datasets.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
2022
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection.
Sensors, 2022
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig., 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection.
Proceedings of the Media Watermarking, 2022
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022
Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
J. Imaging, 2021
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur., 2021
Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021
AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions.
Proceedings of the Media Watermarking, 2021
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021
A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper).
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines.
EURASIP J. Inf. Secur., 2020
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the 27th European Signal Processing Conference, 2019
2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
A Requirement Analysis for Privacy Preserving Biometrics in View of Universal Human Rights and Data Protection Regulation.
Proceedings of the 26th European Signal Processing Conference, 2018
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018
Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the Handbook of Biometrics for Forensic Science, 2017
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 6: VISAPP, Porto, Portugal, February 27, 2017
Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments.
Proceedings of the International Carnahan Conference on Security Technology, 2017
Adapting Organic Computing Architectures to an Automotive Environment to Increase Safety & Security.
Proceedings of the Automotive - Safety & Security 2017, 2017
2016
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance.
Proceedings of the First International Workshop on Sensing, 2016
A semantic framework for a better understanding, investigation and prevention of organized financial crime.
Proceedings of the Sicherheit 2016: Sicherheit, 2016
Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling.
Proceedings of the Computer Safety, Reliability, and Security, 2016
StirTraceV2.0 and printed fingerprint detection: simulation of acquisition condition tilting and its impact to latent fingerprint detection feature spaces for crime scene forgeries.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016
Resource-efficient latent fingerprint age estimation for Adhoc crime scene forensics: Quality assessment of flat bed scans and statistical features.
Proceedings of the Sixth International Conference on Image Processing Theory, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Spectral Fiber Feature Space Evaluation for Crime Scene Forensics - Traditional Feature Classification vs. BioHash Optimization.
Proceedings of the VISAPP 2015, 2015
Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions.
Proceedings of the Computer Safety, Reliability, and Security, 2015
Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence.
Proceedings of the Media Watermarking, 2015
Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes.
Proceedings of the Media Watermarking, 2015
Application of stirtrace benchmarking for the evaluation of latent fingerprint age estimation robustness.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015
ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
From biometric to forensic hashing: Challenges in digital crime scene trace analysis.
Proceedings of the 23rd European Signal Processing Conference, 2015
Proceedings of the 23rd European Signal Processing Conference, 2015
Second workshop on databases in biometrics, forensics and security applications (DBforBFS).
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW 2015), 2015
2014
Context-based approach of separating contactless captured high-resolution overlapped latent fingerprints.
IET Biom., 2014
An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics.
Proceedings of the Media Watermarking, 2014
Context analysis of artificial sweat printed fingerprint forgeries: Assessment of properties for forgery detection.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014
From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Latent fingerprint persistence: A new temporal feature space for forensic trace evidence analysis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Beyond mileage: Towards more secure techniques to assess the fitness levels of smart cars.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
2013
Visibility enhancement and validation of segmented latent fingerprints in crime scene forensics.
Proceedings of the Media Watermarking, 2013
Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes.
Proceedings of the Media Watermarking, 2013
Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms.
Proceedings of the Media Watermarking, 2013
High quality training materials to detect printed fingerprints: Benchmarking three different aquisition sensors producing printing templates.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013
Separation of contactless captured high-resolution overlapped latent fingerprints: Parameter optimisation and evaluation.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013
Printing artificial sweat using ink jet printers for the test set generation in forensics: an image quality assessment of the reproducibility of the printing results.
Proceedings of the Image Quality and System Performance X, 2013
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013
First investigation of latent fingerprints long-term aging using chromatic white light sensors.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Statistical latent fingerprint residue recognition in contact-less scans to support fingerprint segmentation.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013
Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes.
Proceedings of the Multimedia Content and Mobile Devices 2013, 2013
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications.
Proceedings of the Communications and Multimedia Security, 2013
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans.
Proceedings of the Communications and Multimedia Security, 2013
Proceedings of the Communications and Multimedia Security, 2013
Proposal of a privacy-enhancing fingerprint capture for a decentralized police database system from a legal perspective using the example of Germany and the EU.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013
Proceedings of the Security and Privacy in Biometrics, 2013
2012
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis.
Trans. Data Hiding Multim. Secur., 2012
Sequence detection of overlapping latent fingerprints using a short-term aging feature.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensors.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Sicherheit 2012: Sicherheit, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation.
Proceedings of the Computer Safety, Reliability, and Security, 2012
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data.
Proceedings of the Computer Safety, Reliability, and Security, 2012
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions.
Proceedings of the Multimedia and Security Workshop, 2012
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy.
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the Media Watermarking, 2012
High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection.
Proceedings of the Media Watermarking, 2012
Driver/passenger discrimination for the interaction with the dual-view touch screen integrated to the automobile centre console.
Proceedings of the Image Processing: Algorithms and Systems X; and Parallel Processing for Imaging Applications II, 2012
Voruntersuchungen und erste Ergebnisse zur Webseitengestaltung für die situationsbewusste Unterstützung von Kindern in IT-Sicherheitsfragen.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012
Challenges in contact-less latent fingerprint processing in crime scenes: Review of sensors and image processing investigations.
Proceedings of the 20th European Signal Processing Conference, 2012
Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012
Proceedings of the Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, 2012
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans.
Proceedings of the Communications and Multimedia Security, 2012
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries.
Proceedings of the Communications and Multimedia Security, 2012
Proceedings of the Computational Imaging X, 2012
General fusion approaches for the age determination of latent fingerprint traces: results for 2D and 3D binary pixel feature fusion.
Proceedings of the Three-Dimensional Image Processing (3DIP) and Applications II, 2012
Proceedings of the Three-Dimensional Image Processing (3DIP) and Applications II, 2012
2011
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures.
Reliab. Eng. Syst. Saf., 2011
How contact pressure, contact time, smearing and oil/skin lotion influence the aging of latent fingerprint traces: First results for the binary pixel feature using a CWL sensor.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011
Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors.
Proceedings of the Media Watermarking, 2011
Proceedings of the Media Watermarking, 2011
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
Proceedings of the Image Quality and System Performance VIII, 2011
Proceedings of the Image Processing: Algorithms and Systems IX, 2011
Resolution and size of measured area influences on the short- and long-term aging of latent fingerprint traces using the binary pixel feature and a high-resolution non-invasive chromatic white light (CWL) sensor.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Detection of malicious traces in crime scene forensics: An enhanced optical dot pattern analysis for untreated traces of printed amino acid residues.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011
Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011
Proceedings of the 1st International Workshop on Semantic Digital Archives, 2011
Comparative review of studies on aging effects in context of biometric authentication.
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011
Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL).
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011
FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature.
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Communications and Multimedia Security, 2011
Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks.
Proceedings of the Advances in Databases - 28th British National Conference on Databases, 2011
Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling.
Proceedings of the Biometrics and ID Management, 2011
Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2011
Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
Proceedings of the Three-Dimensional Imaging, 2011
2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Media Forensics and Security II, 2010
Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments.
Proceedings of the First International Workshop on Digital Engineering, 2010
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm.
Proceedings of the First International Workshop on Digital Engineering, 2010
The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010
Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010
Proceedings of the Communications and Multimedia Security, 2010
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction.
Proceedings of the Communications and Multimedia Security, 2010
2009
nestor Materialien 14, 2009
Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach.
Image Vis. Comput., 2009
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats.
Proceedings of the Computer Safety, 2009
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
Proceedings of the Multimedia and Security Workshop, 2009
The impact of information fusion in steganalysis on the example of audio steganalysis.
Proceedings of the Media Forensics and Security I, 2009
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2009
Proceedings of the IMF 2009, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Car-seat occupancy detection using a monocular 360° NIR camera and advanced template matching.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Proceedings of the Datenbanksysteme in Business, 2009
Proceedings of the Adaptive Multimedia Retrieval. Understanding Media and Adapting to the User, 2009
2008
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008
Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth.
Proceedings of the Security, 2008
Proceedings of the Security, 2008
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches.
Proceedings of the Security, 2008
Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache.
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags.
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Digital audio watermarking evaluation within the application field of perceptual hashing.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding.
Proceedings of the 10th workshop on Multimedia & Security, 2008
Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities.
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Biosecure reference systems for on-line signature verification: A study of complementarity.
Ann. des Télécommunications, 2007
Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Digital watermarking of biometric speech references: impact to the EER system performance.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment.
Proceedings of the Computer Safety, 2007
Digital audio forensics: a first practical evaluation on microphone and environment classification.
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems.
Proceedings of the International Conference on Image Processing, 2007
Proceedings of the 15th European Signal Processing Conference, 2007
2006
Proceedings of the Encyclopedia of Multimedia, 2006
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.
Trans. Data Hiding Multim. Secur., 2006
J. Electronic Imaging, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
Proceedings of the Multimedia Content Representation, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the 8th workshop on Multimedia & Security, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides.
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, 2006
2005
Inform. Spektrum, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005
Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen.
Proceedings of the Sicherheit 2005: Sicherheit, 2005
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005
Ensuring Media Integrity on Third-Party Infrastructures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Proceedings of the 7th workshop on Multimedia & Security, 2005
Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen.
Proceedings of the Marktplatz Internet: von E-Learning bis E-Payment, 2005
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005
2004
Proc. IEEE, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Network based intrusion detection to detect steganographic communication channels: on the example of audio data.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Proceedings of the 6th workshop on Multimedia & Security, 2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004
2003
EURASIP J. Adv. Signal Process., 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003
Proceedings of the 11th Pacific Conference on Computer Graphics and Applications, 2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
2002
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources.
EURASIP J. Adv. Signal Process., 2002
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions.
Proceedings of the Advanced Communications and Multimedia Security, 2002
2001
Merkmale digitaler Audiodaten zur Verwendung in inhaltsfragilen digitalen Wasserzeichen.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Eine Sicherheitsarchitektur auf Basis digitaler Wasserzeichen und kryptographischer Ansätze.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001
Proceedings of the Advances in Multimedia Information Processing, 2001
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001
Introduction to multimedia and security: protecting the media of the future - securing the future of the media.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Conditional Access for Business and M-Commerce Applications using Annotation Watermarks.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
J. Electronic Imaging, 2000
Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen.
Datenschutz und Datensicherheit, 2000
Combined video and audio watermarking: embedding content information in multimedia data.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP).
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000
H204M - watermarking for media: classification, quality evaluation, design improvements.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000
Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Xpert.press, Springer, ISBN: 978-3-642-56971-5, 2000
1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1999
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the Ausgezeichnete Informatikdissertationen 1999, 1999
1998
Proceedings of the Broadband European Networks and Multimedia Services 1998, 1998
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1998
1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997