Martin Steinebach

Orcid: 0000-0002-0240-0388

According to our database1, Martin Steinebach authored at least 187 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Umgang mit GenAI und Deepfakes.
Datenschutz und Datensicherheit (dud), November, 2024

KI-generierte Abbildungen von Kindesmissbrauch.
Datenschutz und Datensicherheit (dud), May, 2024

Robustness and Collision-Resistance of PhotoDNA.
J. Cyber Secur. Mobil., 2024

Unveiling the Potential of BERTopic for Multilingual Fake News Analysis - Use Case: Covid-19.
CoRR, 2024

A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and Their Detection.
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes, 2024

Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays.
Proceedings of the 14th Workshop on Computational Approaches to Subjectivity, 2024

Comparative Analysis of Voice Conversion in German.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche Einordnung.
Proceedings of the 54. Jahrestagung der Gesellschaft für Informatik, 2024

Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter.
Proceedings of the 4th Workshop on Reducing Online Misinformation through Credible Information Retrieval co-located with the 46th European Conference on Information Retrieval, 2024

Improved identification of check-worthiness in social media data through multimodal analyses.
Proceedings of the 4th Workshop on Reducing Online Misinformation through Credible Information Retrieval co-located with the 46th European Conference on Information Retrieval, 2024

DiffSeg: Towards Detecting Diffusion-Based Inpainting Attacks Using Multi-Feature Segmentation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection.
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024

Natural Language Steganography by ChatGPT.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Erkennung von Kindesmissbrauch in Medien.
Datenschutz und Datensicherheit (dud), April, 2023

Deepfakes, Dall-E & Co.
Datenschutz und Datensicherheit (dud), April, 2023

Scraping and Analyzing Data of a Large Darknet Marketplace.
J. Cyber Secur. Mobil., 2023

Image Hashing Robust Against Cropping and Rotation.
J. Cyber Secur. Mobil., 2023

Audio captcha breaking and consequences for human users.
Proceedings of the Media Watermarking, 2023

Privacy preserving leak detection in peer-to-peer communication.
Proceedings of the Media Watermarking, 2023

Predicting positions of flipped bits in robust image hashes.
Proceedings of the Media Watermarking, 2023

Detection of deepfakes using background-matching.
Proceedings of the Media Watermarking, 2023

An Analysis of PhotoDNA.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Image montage detection based on image segmentation and robust hashing techniques.
Proceedings of the Media Watermarking, 2022

NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches.
Proceedings of the Media Watermarking, 2022

Smartphone-supported integrity verification of printed documents.
Proceedings of the Media Watermarking, 2022

Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit.
Proceedings of the 52. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2022, Informatik in den Naturwissenschaften, 26., 2022

Recognition of objects from looted excavations by smartphone app and deep learning.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, 2022

Cultural assets identification using transfer learning.
Proceedings of the Imaging and Multimedia Analytics at the Edge 2022, 2022

Fraunhofer SIT@SMM4H'22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models.
Proceedings of The Seventh Workshop on Social Media Mining for Health Applications, 2022

Data Acquisition on a Large Darknet Marketplace.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Towards Image Hashing Robust Against Cropping and Rotation.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Using Telegram as a carrier for image steganography: Analysing Telegrams API limits.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Deanonymisierung im Tor-Netzwerk - Technische Möglichkeiten und rechtliche Rahmenbedingungen.
Proceedings of the Selbstbestimmung, 2022

Ausprägungen von Uploadfiltern.
Proceedings of the Selbstbestimmung, 2022

2021
Critical Traffic Analysis on the Tor Network.
J. Cyber Secur. Mobil., 2021

Cover-aware Steganalysis.
J. Cyber Secur. Mobil., 2021

Privacy-Enhanced Robust Image Hashing with Bloom Filters.
J. Cyber Secur. Mobil., 2021

Phishing detection on tor hidden services.
Digit. Investig., 2021

Automated Image Metadata Verification.
Proceedings of the Media Watermarking, 2021

A Close Look at Robust Hash Flip Positions.
Proceedings of the Media Watermarking, 2021

Video Source Identification from MP4 Data Based on Field Values in Atom/Box Attributes.
Proceedings of the Media Watermarking, 2021

Detecting Deepfakes with Haralick's Texture Properties.
Proceedings of the Media Watermarking, 2021

Fingerprinting Blank Paper and Printed Material by Smartphones.
Proceedings of the Media Watermarking, 2021

Comparison of Cyber Attacks on Services in the Clearnet and Darknet.
Proceedings of the Advances in Digital Forensics XVII, 2021

Technische Herausforderungen bei der Umsetzung von Uploadfiltern.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

exHide: Hiding Data within the exFAT File System.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Discovery of Single-Vendor Marketplace Operators in the Tor-Network.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Detection and Analysis of Tor Onion Services.
J. Cyber Secur. Mobil., 2020

Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification.
J. Cyber Secur. Mobil., 2020

Fake News Detection by Image Montage Recognition.
J. Cyber Secur. Mobil., 2020

Checking the Integrity of Images with Signed Thumbnail Images.
Proceedings of the Media Watermarking, 2020

Motion Vector based Robust Video Hash.
Proceedings of the Media Watermarking, 2020

Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts.
Proceedings of the Media Watermarking, 2020

JAB Code - A Versatile Polychrome 2D Barcode.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, 2020

Detecting double compression and splicing using benfords first digit law.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Non-blind steganalysis.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
The Need for Steganalysis in ImageDistribution Channels.
J. Cyber Secur. Mobil., 2019

Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

Automatisierte Analyse Radikaler Inhalte im Internet.
Proceedings of the 49. Jahrestagung der Gesellschaft für Informatik, 50 Jahre Gesellschaft für Informatik, 2019

Detection and Analysis of Tor Onion Services.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Privacy and Robust Hashes.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improved Manipulation Detection with Convolutional Neural Network for JPEG Images.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Digitale Wasserzeichen in der Kriminalistik.
Datenschutz und Datensicherheit, 2018

Transfer Learning for Data Triage Applications.
Proceedings of the Visual Information Processing and Communication IX, Burlingame, CA, USA, 28 January 2018, 2018

Hybrid Image Encryption.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Privacy Preserving Forensics for JPEG Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Double Embedding Steganalysis: Steganalysis with Low False Positive Rate.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Monitoring Product Sales in Darknet Shops.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

New authentication concept using certificates for big data analytic tools.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Channel Steganalysis.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Benefits of combining forensic image creation and file carving.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

MP3 Partial Encryption for DRM.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Towards Imperceptible Natural Language Watermarking for German.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Secure communication protocol for a low-bandwidth audio channel.
Proceedings of the 25th European Signal Processing Conference, 2017

Forensic Image Inspection Assisted by Deep Learning.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Datenschutz und Datenanalyse.
Datenschutz und Datensicherheit, 2016

A Novel Attack Model for Collusion Secure Fingerprinting Codes.
Proceedings of the Media Watermarking, 2016

Quality Metric for 2D Textures on 3D Objects.
Proceedings of the Media Watermarking, 2016

Maximal stable extremal regions for robust video watermarking.
Proceedings of the Media Watermarking, 2016

2015
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A novel image secret sharing scheme with meaningful shares.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

A ROI-based self-embedding method with high recovery capability.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Autorschaftsanalyse - die Illusion der Anonymität.
Wirtschaftsinformatik Manag., 2014

Fast indexing strategies for robust image hashes.
Digit. Investig., 2014

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Watermarking textures in video games.
Proceedings of the Media Watermarking, 2014

Robust hashing for 3D models.
Proceedings of the Media Watermarking, 2014

Data Corpora for Digital Forensics Education and Research.
Proceedings of the Advances in Digital Forensics X, 2014

A new method for image reconstruction using self-embedding.
Proceedings of the IEEE International Conference on Acoustics, 2014

VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

Efficient Cropping-Resistant Robust Image Hashing.
Proceedings of the Ninth International Conference on Availability, 2014

An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning.
Proceedings of the Ninth International Conference on Availability, 2014

2013
3D watermarking in the context of video games.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013


Natural language watermarking for german texts.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Leakage detection and tracing for databases.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Hash-Based File Content Identification Using Distributed Systems.
Proceedings of the Advances in Digital Forensics IX, 2013

Automating Video File Carving and Content Identification.
Proceedings of the Advances in Digital Forensics IX, 2013

FaceHash: Face Detection and Robust Hashing.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Towards a Process Model for Hash Functions in Digital Forensics.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Robust Hash Algorithms for Text.
Proceedings of the Communications and Multimedia Security, 2013

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
Proceedings of the Communications and Multimedia Security, 2013

Authorship Verification via k-Nearest Neighbor Estimation Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

2012
Watermark Embedding Using Audio Fingerprinting.
Trans. Data Hiding Multim. Secur., 2012

FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Digital audio authentication by robust feature embedding.
Proceedings of the Media Watermarking, 2012

Forensic audio watermark detection.
Proceedings of the Media Watermarking, 2012

ForBild: efficient robust image hashing.
Proceedings of the Media Watermarking, 2012

Ranking search for probabilistic fingerprinting codes.
Proceedings of the Media Watermarking, 2012

Robust image obfuscation for privacy protection in Web 2.0 applications.
Proceedings of the Media Watermarking, 2012

Improved Fourier domain patchwork and template embedding using spatial masking.
Proceedings of the Media Watermarking, 2012

2011
Rihamark: perceptual image hash benchmarking.
Proceedings of the Media Watermarking, 2011

Re-synchronizing audio watermarking after non-linear time stretching.
Proceedings of the Media Watermarking, 2011

Collusion-secure patchwork embedding for transaction watermarking.
Proceedings of the Media Watermarking, 2011

Robust Hashing for Efficient Forensic Analysis of Image Sets.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011

2010
Challenges and Solutions in Multimedia Document Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Collusion-Secure Fingerprint Watermarking for Real World Applications.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search.
Proceedings of the Multimedia and Security Workshop, 2010

Audio watermarking forensics: detecting malicious re-embedding.
Proceedings of the Media Forensics and Security II, 2010

SIFT features in semi-fragile video watermarks.
Proceedings of the Media Forensics and Security II, 2010

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
Proceedings of the Communications and Multimedia Security, 2010

2009
Security of robust audio hashes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Perception-based authentication watermarking for digital audio data.
Proceedings of the Media Forensics and Security I, 2009

Digital watermarking for digital cinema.
Proceedings of the Media Forensics and Security I, 2009

Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain.
Proceedings of the Information Hiding, 11th International Workshop, 2009

On the Reliability of Cell Phone Camera Fingerprint Recognition.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Robust audio hashing for audio authentication watermarking.
Proceedings of the Security, 2008

The video watermarking container: efficient real-time transaction watermarking.
Proceedings of the Security, 2008

Evaluation of robustness and transparency of multiple audio watermark embedding.
Proceedings of the Security, 2008

Content-based Message Authentication Coding for Audio Data.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Bildforensische Verfahren zur Unterstützung von Wasserzeichendetektion.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Psycho-acoustic model-based message authentication coding for audio data.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Content-Based Authentication Watermarking with Improved Audio Content Feature Extraction.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Complementing DRM with digital watermarking: mark, search, retrieve.
Online Inf. Rev., 2007

Robust message authentication code algorithm for digital audio recordings.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Joint forensics and watermarking approach for video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Blind audio watermark synchronization by passive audio fingerprinting.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Framework for combined video frame synchronization and watermark detection.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2006

Using entropy for image and video authentication watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Countermeasure for collusion attacks against digital watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Temporal synchronization of marked MPEG video frames based on image hash system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Robust-audio-hash Synchronized Audio Watermarking.
Proceedings of the Security in Information Systems, 2006

Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

A digital watermark for vector-based fonts.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Digital Watermarking for Image Authentication with Localization.
Proceedings of the International Conference on Image Processing, 2006

Suche nach Urheberrechtsverletzungen in Internet-Tauschbörsen mittels digitaler Wasserzeichen.
Proceedings of the 36. Jahrestagung der Gesellschaft für Informatik, 2006

Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability.
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, 2006

2005
Applying interest operators in semi-fragile video watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Audio watermarking and partial encryption.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robust digital watermark solution for intercoded frames of MPEG video data.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Vertrauenswürdigkeit von Audiodaten - Digitale Wasserzeichen und Verifikation der semantischen Integrität.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Semantically Extended Digital Watermarking Model for Multimedia Content.
Proceedings of the Communications and Multimedia Security, 2005

Digital Signatures Based on Invertible Watermarks for Video Authentication.
Proceedings of the Communications and Multimedia Security, 2005

Secure Production of Digital Media.
Proceedings of the From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005

2004
Digitale Wasserzeichen für Audiodaten.
PhD thesis, 2004

Advanced audio watermarking benchmarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Feature-based watermarking scheme for MPEG-I/II video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

The digital watermarking container: secure and efficient embedding.
Proceedings of the 6th workshop on Multimedia & Security, 2004

A High-Capacity Block Based Video Watermark.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Watermarking-Based Digital Audio Data Authentication.
EURASIP J. Adv. Signal Process., 2003

Capacity-optimized mp2 audio watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Robustness evaluation of transactional audio watermarking systems.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources.
EURASIP J. Adv. Signal Process., 2002

StirMark Benchmark: audio watermarking attacks based on lossy compression.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Merkmale digitaler Audiodaten zur Verwendung in inhaltsfragilen digitalen Wasserzeichen.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Eine Sicherheitsarchitektur auf Basis digitaler Wasserzeichen und kryptographischer Ansätze.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Computer-aided visual model for ensuring video watermarking transparency.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Joint watermarking of audio-visual data.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

PlataJanus: an audio annotation watermarking framework.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen.
Datenschutz und Datensicherheit, 2000

Combined video and audio watermarking: embedding content information in multimedia data.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

H204M - watermarking for media: classification, quality evaluation, design improvements.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000


  Loading...