Jana Dittmann

Affiliations:
  • Otto von Guericke University of Magdeburg, Germany


According to our database1, Jana Dittmann authored at least 275 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection.
J. Imaging, February, 2024

On Feasibility of Transferring Watermarks from Training Data to GAN-Generated Fingerprint Images.
Proceedings of the 19th International Joint Conference on Computer Vision, 2024

2023
Synthetische Daten in der Biometrie.
Datenschutz und Datensicherheit, 2023

A Survey on Synthetic Biometrics: Fingerprint, Face, Iris and Vascular Patterns.
IEEE Access, 2023

Data-Driven Fingerprint Reconstruction from Minutiae Based on Real and Synthetic Training Data.
Proceedings of the 18th International Joint Conference on Computer Vision, 2023

Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior.
Proceedings of the Media Watermarking, 2023

Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models.
Proceedings of the Media Watermarking, 2023

Protocol Based Similarity Evaluation of Publicly Available Synthetic and Real Fingerprint Datasets.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

2022
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection.
Sensors, 2022

Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover.
Digit. Investig., 2022

Data-driven Reconstruction of Fingerprints from Minutiae Maps.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection.
Proceedings of the Media Watermarking, 2022

Covert Channels in Network Time Security.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics.
Proceedings of the IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27, 2022

Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features.
J. Imaging, 2021

Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks.
EURASIP J. Inf. Secur., 2021

Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks.
Proceedings of the 16th International Joint Conference on Computer Vision, 2021

On feasibility of GAN-based fingerprint morphing.
Proceedings of the 23rd International Workshop on Multimedia Signal Processing, 2021

AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions.
Proceedings of the Media Watermarking, 2021

General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling.
Proceedings of the 51. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2021 - Computer Science & Sustainability, Berlin, Germany, 27. September, 2021

A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper).
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

A Revised Taxonomy of Steganography Embedding Patterns.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Systematic Analysis of Covert Channels in the Network Time Protocol.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines.
EURASIP J. Inf. Secur., 2020

Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

2019
Visual Feature Space Analyses of Face Morphing Detectors.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Digital Forensics in Industrial Control Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2019

A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

Dempster-Shafer Theory for Fusing Face Morphing Detectors.
Proceedings of the 27th European Signal Processing Conference, 2019

2018
Extended <i>StirTrace</i> benchmarking of biometric and forensic qualities of morphed face images.
IET Biom., 2018

Generalized Benford's Law for Blind Detection of Morphed Face Images.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

A Requirement Analysis for Privacy Preserving Biometrics in View of Universal Human Rights and Data Protection Regulation.
Proceedings of the 26th European Signal Processing Conference, 2018

Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector.
Proceedings of the 26th European Signal Processing Conference, 2018

Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Capture and Analysis of Latent Marks.
Proceedings of the Handbook of Biometrics for Forensic Science, 2017

A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation.
IEEE Trans. Inf. Forensics Secur., 2017

Automatic Generation and Detection of Visually Faultless Facial Morphs.
Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017) - Volume 6: VISAPP, Porto, Portugal, February 27, 2017

Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Adapting Organic Computing Architectures to an Automotive Environment to Increase Safety & Security.
Proceedings of the Automotive - Safety & Security 2017, 2017

2016
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance.
Proceedings of the First International Workshop on Sensing, 2016

A semantic framework for a better understanding, investigation and prevention of organized financial crime.
Proceedings of the Sicherheit 2016: Sicherheit, 2016

Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling.
Proceedings of the Computer Safety, Reliability, and Security, 2016

StirTraceV2.0 and printed fingerprint detection: simulation of acquisition condition tilting and its impact to latent fingerprint detection feature spaces for crime scene forgeries.
Proceedings of the 4th International Conference on Biometrics and Forensics, 2016

Resource-efficient latent fingerprint age estimation for Adhoc crime scene forensics: Quality assessment of flat bed scans and statistical features.
Proceedings of the Sixth International Conference on Image Processing Theory, 2016

2015
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection.
IEEE Trans. Inf. Forensics Secur., 2015

Spectral Fiber Feature Space Evaluation for Crime Scene Forensics - Traditional Feature Classification vs. BioHash Optimization.
Proceedings of the VISAPP 2015, 2015

Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence.
Proceedings of the Media Watermarking, 2015

Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes.
Proceedings of the Media Watermarking, 2015

Application of stirtrace benchmarking for the evaluation of latent fingerprint age estimation robustness.
Proceedings of the 3rd International Workshop on Biometrics and Forensics, 2015

Supporting Forensic Design - A Course Profile to Teach Forensics.
Proceedings of the Ninth International Conference on IT Security Incident Management & IT Forensics, 2015

ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

From classical forensics to digitized crime scene analysis.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

From biometric to forensic hashing: Challenges in digital crime scene trace analysis.
Proceedings of the 23rd European Signal Processing Conference, 2015

Considerations on the benchmarking of media forensics.
Proceedings of the 23rd European Signal Processing Conference, 2015

Second workshop on databases in biometrics, forensics and security applications (DBforBFS).
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW 2015), 2015

2014
Context-based approach of separating contactless captured high-resolution overlapped latent fingerprints.
IET Biom., 2014

An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics.
Proceedings of the Media Watermarking, 2014

Context analysis of artificial sweat printed fingerprint forgeries: Assessment of properties for forgery detection.
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

A Hierarchical Model for the Description of Internet-Based Communication.
Proceedings of the Eighth International Conference on IT Security Incident Management & IT Forensics, 2014

From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Latent fingerprint persistence: A new temporal feature space for forensic trace evidence analysis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Beyond mileage: Towards more secure techniques to assess the fitness levels of smart cars.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Visibility enhancement and validation of segmented latent fingerprints in crime scene forensics.
Proceedings of the Media Watermarking, 2013

Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes.
Proceedings of the Media Watermarking, 2013

Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms.
Proceedings of the Media Watermarking, 2013

High quality training materials to detect printed fingerprints: Benchmarking three different aquisition sensors producing printing templates.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Separation of contactless captured high-resolution overlapped latent fingerprints: Parameter optimisation and evaluation.
Proceedings of the 1st International Workshop on Biometrics and Forensics, 2013

Printing artificial sweat using ink jet printers for the test set generation in forensics: an image quality assessment of the reproducibility of the printing results.
Proceedings of the Image Quality and System Performance X, 2013

Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

First investigation of latent fingerprints long-term aging using chromatic white light sensors.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Statistical latent fingerprint residue recognition in contact-less scans to support fingerprint segmentation.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet.
Proceedings of the 43. Jahrestagung der Gesellschaft für Informatik, 2013

Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes.
Proceedings of the Multimedia Content and Mobile Devices 2013, 2013

Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications.
Proceedings of the Communications and Multimedia Security, 2013

Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans.
Proceedings of the Communications and Multimedia Security, 2013

E-Learning of IT Security Threats: A Game Prototype for Children.
Proceedings of the Communications and Multimedia Security, 2013

Proposal of a privacy-enhancing fingerprint capture for a decentralized police database system from a legal perspective using the example of Germany and the EU.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

Workshop on Databases in Biometrics, Forensics and Security Applications.
Proceedings of the Datenbanksysteme für Business, Technologie und Web (BTW),, 2013

Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis.
Trans. Data Hiding Multim. Secur., 2012

Sequence detection of overlapping latent fingerprints using a short-term aging feature.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensors.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Program Comprehension in Preprocessor-Based Software.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation.
Proceedings of the Computer Safety, Reliability, and Security, 2012

IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data.
Proceedings of the Computer Safety, Reliability, and Security, 2012

An evaluation of biometric fingerprint matchers in a forensic context using latent impressions.
Proceedings of the Multimedia and Security Workshop, 2012

A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy.
Proceedings of the Multimedia and Security Workshop, 2012

Extending a context model for microphone forensics.
Proceedings of the Media Watermarking, 2012

High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection.
Proceedings of the Media Watermarking, 2012

Driver/passenger discrimination for the interaction with the dual-view touch screen integrated to the automobile centre console.
Proceedings of the Image Processing: Algorithms and Systems X; and Parallel Processing for Imaging Applications II, 2012

Voruntersuchungen und erste Ergebnisse zur Webseitengestaltung für die situationsbewusste Unterstützung von Kindern in IT-Sicherheitsfragen.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012

Challenges in contact-less latent fingerprint processing in crime scenes: Review of sensors and image processing investigations.
Proceedings of the 20th European Signal Processing Conference, 2012

Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Design and evaluation of security multimedia warnings for children's smartphones.
Proceedings of the Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 2012

AR.Drone: security threat analysis and exemplary attack to track persons.
Proceedings of the Intelligent Robots and Computer Vision XXIX: Algorithms and Techniques, 2012

Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans.
Proceedings of the Communications and Multimedia Security, 2012

Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries.
Proceedings of the Communications and Multimedia Security, 2012

Computer-aided fiber analysis for crime scene forensics.
Proceedings of the Computational Imaging X, 2012

General fusion approaches for the age determination of latent fingerprint traces: results for 2D and 3D binary pixel feature fusion.
Proceedings of the Three-Dimensional Image Processing (3DIP) and Applications II, 2012

3D imaging for ballistics analysis using chromatic white light sensor.
Proceedings of the Three-Dimensional Image Processing (3DIP) and Applications II, 2012

2011
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures.
Reliab. Eng. Syst. Saf., 2011

How contact pressure, contact time, smearing and oil/skin lotion influence the aging of latent fingerprint traces: First results for the binary pixel feature using a CWL sensor.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles.
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, 2011

Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors.
Proceedings of the Media Forensics and Security III, 2011

A context model for microphone forensics and its application in evaluations.
Proceedings of the Media Forensics and Security III, 2011

Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
Proceedings of the Image Quality and System Performance VIII, 2011

User discrimination in automotive systems.
Proceedings of the Image Processing: Algorithms and Systems IX, 2011

Resolution and size of measured area influences on the short- and long-term aging of latent fingerprint traces using the binary pixel feature and a high-resolution non-invasive chromatic white light (CWL) sensor.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

Detection of malicious traces in crime scene forensics: An enhanced optical dot pattern analysis for untreated traces of printed amino acid residues.
Proceedings of the 7th International Symposium on Image and Signal Processing and Analysis, 2011

A Common Scheme for Evaluation of Forensic Software.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011

Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor.
Proceedings of the 17th International Conference on Digital Signal Processing, 2011

A Security Contextualisation Framework for Digital Long-Term Preservation.
Proceedings of the 1st International Workshop on Semantic Digital Archives, 2011

Comparative review of studies on aging effects in context of biometric authentication.
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011

Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL).
Proceedings of the Multimedia on Mobile Devices 2011; and Multimedia Content Access: Algorithms and Systems V, 2011

FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011

Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
Proceedings of the Intelligent Robots and Computer Vision XXVIII: Algorithms and Techniques, 2011

Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature.
Proceedings of the Communications and Multimedia Security, 2011

Security Warnings for Children's Smart Phones: A First Design Approach.
Proceedings of the Communications and Multimedia Security, 2011

Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks.
Proceedings of the Advances in Databases - 28th British National Conference on Databases, 2011

Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling.
Proceedings of the Biometrics and ID Management, 2011

Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation.
Proceedings of the Automotive User Interfaces and Interactive Vehicular Applications, 2011

Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
Proceedings of the Three-Dimensional Imaging, 2011

2010
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

The impact of ARTMAP to appearance-based face verification.
Proceedings of the Multimedia and Security Workshop, 2010

Modelling watermark communication protocols using the CASPER modelling language.
Proceedings of the Multimedia and Security Workshop, 2010

Audio annotation watermarking with robustness against DA/AD conversion.
Proceedings of the Media Forensics and Security II, 2010

Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments.
Proceedings of the First International Workshop on Digital Engineering, 2010

An exemplary attack scenario: threats to production engineering inspired by the Conficker worm.
Proceedings of the First International Workshop on Digital Engineering, 2010

The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010

Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls.
Proceedings of the Image Processing: Algorithms and Systems VIII, 2010

Statistical Detection of Malicious PE-Executables for Fast Offline Analysis.
Proceedings of the Communications and Multimedia Security, 2010

Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction.
Proceedings of the Communications and Multimedia Security, 2010

2009
Vertrauenswürdige und abgesicherte Langzeitarchivierung multimedialer Inhalte.
nestor Materialien 14, 2009

Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach.
Image Vis. Comput., 2009

Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats.
Proceedings of the Computer Safety, 2009

Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
Proceedings of the Multimedia and Security Workshop, 2009

Nested object watermarking.
Proceedings of the Media Forensics and Security I, 2009

The impact of information fusion in steganalysis on the example of audio steganalysis.
Proceedings of the Media Forensics and Security I, 2009

Evaluation of Fusion for Similarity Searching in Online Handwritten Documents.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2009

From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy.
Proceedings of the IMF 2009, 2009

Microphone Classification Using Fourier Coefficients.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Car-seat occupancy detection using a monocular 360° NIR camera and advanced template matching.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump.
Proceedings of the 39. Jahrestagung der Gesellschaft für Informatik, Im Focus das Leben, INFORMATIK 2009, Lübeck, Germany, September 28, 2009

Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

On the Need of Data Management in Automotive Systems.
Proceedings of the Datenbanksysteme in Business, 2009

Security-Relevant Challenges of Selected Systems for Multi-user Interaction.
Proceedings of the Adaptive Multimedia Retrieval. Understanding Media and Adapting to the User, 2009

2008
Biometrics for User Authentication.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth.
Proceedings of the Security, 2008

Nested object watermarking: transparency and capacity evaluation.
Proceedings of the Security, 2008

WLAN steganography revisited.
Proceedings of the Security, 2008

Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches.
Proceedings of the Security, 2008

Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Digital audio watermarking evaluation within the application field of perceptual hashing.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Impact of feature selection in classification for hidden channel detection on the example of audio data hiding.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Advanced Studies on Reproducibility of Biometric Hashes.
Proceedings of the Biometrics and Identity Management, First European Workshop, 2008

Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Biosecure reference systems for on-line signature verification: A study of complementarity.
Ann. des Télécommunications, 2007

Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Digital watermarking of biometric speech references: impact to the EER system performance.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Mel-cepstrum-based steganalysis for VoIP steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment.
Proceedings of the Computer Safety, 2007

Digital audio forensics: a first practical evaluation on microphone and environment classification.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems.
Proceedings of the International Conference on Image Processing, 2007

Study of possibility of on-pen matching for biometric handwriting verification.
Proceedings of the 15th European Signal Processing Conference, 2007

2006
Biometrics for User Authentication.
Proceedings of the Encyclopedia of Multimedia, 2006

Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2006

Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity.
Trans. Data Hiding Multim. Secur., 2006

Guest Editorial: Special Section on Security, Steganography, and Watermarking.
J. Electronic Imaging, 2006

Veranstaltungsbesprechungen.
Datenschutz und Datensicherheit, 2006

Profiles for evaluation: the usage of audio WET.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Transparency benchmarking on audio watermarks and steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Design und Evaluierung von Steganographie für Voice-over-IP.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing.
Proceedings of the Multimedia Content Representation, 2006

Transparency and complexity benchmarking of audio watermarking algorithms issues.
Proceedings of the 8th workshop on Multimedia & Security, 2006

WLAN steganography: a first practical review.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Design and evaluation of steganography for voice-over-IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides.
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, 2006

2005
Editorial to the special issue about multimedia and security.
Multim. Syst., 2005

Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen.
Inform. Spektrum, 2005

Illustration watermarking: an object-based approach for digital images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Finding meta data in speech and handwriting biometrics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Application-oriented audio watermark benchmark service.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Ensuring Media Integrity on Third-Party Infrastructures.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Verifier-tuple for audio-forensic to determine speaker environment.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Audio watermark attacks: from single to profile attacks.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen.
Proceedings of the Marktplatz Internet: von E-Learning bis E-Payment, 2005

Distance-Level Fusion Strategies for Online Signature Verification.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics.
Proceedings of the Communications and Multimedia Security, 2005

Digital Signatures Based on Invertible Watermarks for Video Authentication.
Proceedings of the Communications and Multimedia Security, 2005

Secure Production of Digital Media.
Proceedings of the From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005

2004
Guest Editorial: Supplement on Secure Media - I.
IEEE Trans. Signal Process., 2004

Benchmarking of Image Watermarking Algorithms for Digital Rights Management.
Proc. IEEE, 2004

Provably Secure Authentication of Digital Media Through Invertible Watermarks.
IACR Cryptol. ePrint Arch., 2004

Malicious attacks on media authentication schemes based on invertible watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Advanced audio watermarking benchmarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Network based intrusion detection to detect steganographic communication channels: on the example of audio data.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Introduction to the ACM multimedia and security workshop.
Proceedings of the 6th workshop on Multimedia & Security, 2004

Using Adapted Levenshtein Distance for On-Line Signature Authentication.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A High-Capacity Block Based Video Watermark.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Introduction from Session Chairs: New Challenges in Media Security.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Editorial.
Multim. Syst., 2003

Watermarking-Based Digital Audio Data Authentication.
EURASIP J. Adv. Signal Process., 2003

Capacity-optimized mp2 audio watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Invertible authentication for 3D meshes.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

3D watermarking design evaluation.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Illustration Watermarks for Vector Graphics.
Proceedings of the 11th Pacific Conference on Computer Graphics and Applications, 2003

Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung.
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003

2002
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources.
EURASIP J. Adv. Signal Process., 2002

StirMark Benchmark: audio watermarking attacks based on lossy compression.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Using Cryptographic and Watermarking Algorithms.
IEEE Multim., 2001

Merkmale digitaler Audiodaten zur Verwendung in inhaltsfragilen digitalen Wasserzeichen.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Eine Sicherheitsarchitektur auf Basis digitaler Wasserzeichen und kryptographischer Ansätze.
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001

Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Computer-aided visual model for ensuring video watermarking transparency.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Content-fragile watermarking for image authentication.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Customer Identification for MPEG Video Based on Digital Fingerprinting.
Proceedings of the Advances in Multimedia Information Processing, 2001

Joint watermarking of audio-visual data.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

Introduction to multimedia and security: protecting the media of the future - securing the future of the media.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

PlataJanus: an audio annotation watermarking framework.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Hologram Watermarks for Document Authentications.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Conditional Access for Business and M-Commerce Applications using Annotation Watermarks.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Combining digital watermarks and collusion secure fingerprints for digital images.
J. Electronic Imaging, 2000

Digitale Wasserzeichen - Aktuelles Schlagwort.
Inform. Spektrum, 2000

Copyright-Copywrong.
IEEE Multim., 2000

Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen.
Datenschutz und Datensicherheit, 2000

Combined video and audio watermarking: embedding content information in multimedia data.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP).
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

H204M - watermarking for media: classification, quality evaluation, design improvements.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Approaches to Multimedia and Security.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Digitale Wasserzeichen - Grundlagen, Verfahren, Anwendungsgebiete.
Xpert.press, Springer, ISBN: 978-3-642-56971-5, 2000

1999
Combining digital watermarks and collusion-secure fingerprints for digital images.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Content-Fragile Watermarking Based on Content-Based Digital Signatures.
Proceedings of the Interactive Distributed Multimedia Systems and Telecommunication Services, 1999

Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Multimedia and Security Demo at IEEE Multimedia Systems '99.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Sicherheit in Medienströmen: Digitale Wasserzeichen.
Proceedings of the Ausgezeichnete Informatikdissertationen 1999, 1999

Sicherheit in Medienströmen - digitale Wasserzeichen.
PhD thesis, 1999

1998
A4SM: A Framework for Distributed Digital Video Production.
Proceedings of the Broadband European Networks and Multimedia Services, 1998

Protecting VoD the Easier Way.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

Robust MPEG Video Watermarking Technologies.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

Interactive Watermarking Environments.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1998

1997
Enabling Technology for the Trading of MPEG-encoded Video.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video.
Proceedings of the Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld, 1997


  Loading...