Andreas Westfeld

According to our database1, Andreas Westfeld authored at least 36 papers between 1997 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Angriffe auf eine Spreizspektrummethode für Audio-Steganographie.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

2013
Pit Stop for an Audio Steganography Algorithm.
Proceedings of the Communications and Multimedia Security, 2013

2009
Secure Steganography in Multimedia Content.
EURASIP J. Inf. Secur., 2009

Two key estimation techniques for the broken arrows watermarking scheme.
Proceedings of the Multimedia and Security Workshop, 2009

Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2.
Proceedings of the Information Hiding, 11th International Workshop, 2009

2008
Von Bogenschützen und digitalen Wasserzeichen.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Steganalyse von JPEG-Dateien.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

A regression-based restoration technique for automated watermark removal.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Generic Adoption of Spatial Steganalysis to Transformed Domain.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
A Workbench for the BOWS Contest.
EURASIP J. Inf. Secur., 2007

Tackling BOWS with the sensitivity attack.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Weaknesses of MB2.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding.
Proceedings of the Information Hiding, 9th International Workshop, 2007

2006
Steganographie für den Amateurfunk.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Lessons from the BOWS contest.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Steganalysis in the Presence of Weak Cryptography and Encoding.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Category Attack for LSB Steganalysis of JPEG Images.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television.
Proceedings of the Information Hiding, 8th International Workshop, 2006

2005
Feature-based encoder classification of compressed audio streams.
Multim. Syst., 2005

Space filling curves in steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Nutzung der Nachbarkorrelation für Steganalyse mit erhöhter Zuverlässigkeit.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

2004
Statistical characterisation of MP3 encoders for steganalysis.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Exploiting Preserved Statistics for Steganalysis.
Proceedings of the Information Hiding, 6th International Workshop, 2004

Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics.
Proceedings of the Computer Security, 2004

2002
Detecting Low Embedding Rates.
Proceedings of the Information Hiding, 5th International Workshop, 2002

2001
F5 - ein steganographischer Algorithmus Hohe Kapazität trotz verbesserter Angriffe.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Kapselung ausführbarer Binärdateien slcaps: Implementierung von Capabilitys für Linux.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

F5-A Steganographic Algorithm.
Proceedings of the Information Hiding, 4th International Workshop, 2001

2000
Prinzipien sicherer Steganographie.
PhD thesis, 2000

1999
SSONET: Systemunterstützung für mehrseitige Sicherheit in offenen Datennetzen.
Inform. Forsch. Entwickl., 1999

Flexible mehrseitige Sicherheit für verteilte Anwendungen.
Proceedings of the Kommunikation in Verteilten Systemen, 1999

Attacks on Steganographic Systems.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Modeling the Security of Steganographic Systems.
Proceedings of the Information Hiding, 1998

Steganography in a Video Conferencing System.
Proceedings of the Information Hiding, 1998

A Java-Based Distributed Platform for Multilateral Security.
Proceedings of the Trends in Distributed Systems for Electronic Commerce, 1998

1997
Über die Modellierung steganographischer Systeme.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997


  Loading...