Martin Steinebach

According to our database1, Martin Steinebach authored at least 128 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet.
Proceedings of the INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik, 2019

Automatisierte Analyse Radikaler Inhalte im Internet.
Proceedings of the INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik, 2019

Detection and Analysis of Tor Onion Services.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Privacy and Robust Hashes.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Fake News Detection by Image Montage Recognition.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improved Manipulation Detection with Convolutional Neural Network for JPEG Images.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Digitale Wasserzeichen in der Kriminalistik.
Datenschutz und Datensicherheit, 2018

Transfer Learning for Data Triage Applications.
Proceedings of the Visual Information Processing and Communication IX, Burlingame, CA, USA, 28 January 2018, 2018

Hybrid Image Encryption.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Privacy Preserving Forensics for JPEG Images.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

Double Embedding Steganalysis: Steganalysis with Low False Positive Rate.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

Monitoring Product Sales in Darknet Shops.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

New authentication concept using certificates for big data analytic tools.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Channel Steganalysis.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Benefits of combining forensic image creation and file carving.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

MP3 Partial Encryption for DRM.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Towards Imperceptible Natural Language Watermarking for German.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Secure communication protocol for a low-bandwidth audio channel.
Proceedings of the 25th European Signal Processing Conference, 2017

Forensic Image Inspection Assisted by Deep Learning.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Datenschutz und Datenanalyse.
Datenschutz und Datensicherheit, 2016

A Novel Attack Model for Collusion Secure Fingerprinting Codes.
Proceedings of the Media Watermarking, 2016

Quality Metric for 2D Textures on 3D Objects.
Proceedings of the Media Watermarking, 2016

Maximal stable extremal regions for robust video watermarking.
Proceedings of the Media Watermarking, 2016

2015
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A novel image secret sharing scheme with meaningful shares.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

A ROI-based self-embedding method with high recovery capability.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Autorschaftsanalyse - die Illusion der Anonymität.
Wirtschaftsinformatik & Management, 2014

Fast indexing strategies for robust image hashes.
Digital Investigation, 2014

Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen?
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Watermarking textures in video games.
Proceedings of the Media Watermarking, 2014

Robust hashing for 3D models.
Proceedings of the Media Watermarking, 2014

Data Corpora for Digital Forensics Education and Research.
Proceedings of the Advances in Digital Forensics X, 2014

A new method for image reconstruction using self-embedding.
Proceedings of the IEEE International Conference on Acoustics, 2014

VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

Efficient Cropping-Resistant Robust Image Hashing.
Proceedings of the Ninth International Conference on Availability, 2014

An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning.
Proceedings of the Ninth International Conference on Availability, 2014

2013
3D watermarking in the context of video games.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013


Natural language watermarking for german texts.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Leakage detection and tracing for databases.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Hash-Based File Content Identification Using Distributed Systems.
Proceedings of the Advances in Digital Forensics IX, 2013

Automating Video File Carving and Content Identification.
Proceedings of the Advances in Digital Forensics IX, 2013

FaceHash: Face Detection and Robust Hashing.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Towards a Process Model for Hash Functions in Digital Forensics.
Proceedings of the Digital Forensics and Cyber Crime - Fifth International Conference, 2013

Robust Hash Algorithms for Text.
Proceedings of the Communications and Multimedia Security, 2013

Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion.
Proceedings of the Communications and Multimedia Security, 2013

Authorship Verification via k-Nearest Neighbor Estimation Notebook for PAN at CLEF 2013.
Proceedings of the Working Notes for CLEF 2013 Conference , 2013

2012
Watermark Embedding Using Audio Fingerprinting.
Trans. Data Hiding and Multimedia Security, 2012

FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

Digital audio authentication by robust feature embedding.
Proceedings of the Media Watermarking, 2012

Forensic audio watermark detection.
Proceedings of the Media Watermarking, 2012

ForBild: efficient robust image hashing.
Proceedings of the Media Watermarking, 2012

Ranking search for probabilistic fingerprinting codes.
Proceedings of the Media Watermarking, 2012

Robust image obfuscation for privacy protection in Web 2.0 applications.
Proceedings of the Media Watermarking, 2012

Improved Fourier domain patchwork and template embedding using spatial masking.
Proceedings of the Media Watermarking, 2012

2011
Rihamark: perceptual image hash benchmarking.
Proceedings of the Media Forensics and Security III, 2011

Re-synchronizing audio watermarking after non-linear time stretching.
Proceedings of the Media Forensics and Security III, 2011

Collusion-secure patchwork embedding for transaction watermarking.
Proceedings of the Media Forensics and Security III, 2011

Robust Hashing for Efficient Forensic Analysis of Image Sets.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes.
Proceedings of the 11th ACM Workshop on Digital Rights Management, 2011

2010
Challenges and Solutions in Multimedia Document Authentication.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Collusion-Secure Fingerprint Watermarking for Real World Applications.
Proceedings of the Sicherheit 2010: Sicherheit, 2010

Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search.
Proceedings of the Multimedia and Security Workshop, 2010

Audio watermarking forensics: detecting malicious re-embedding.
Proceedings of the Media Forensics and Security II, 2010

SIFT features in semi-fragile video watermarks.
Proceedings of the Media Forensics and Security II, 2010

Watermark-Based Authentication and Key Exchange in Teleconferencing Systems.
Proceedings of the Communications and Multimedia Security, 2010

2009
Security of robust audio hashes.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Perception-based authentication watermarking for digital audio data.
Proceedings of the Media Forensics and Security I, 2009

Digital watermarking for digital cinema.
Proceedings of the Media Forensics and Security I, 2009

Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain.
Proceedings of the Information Hiding, 11th International Workshop, 2009

On the Reliability of Cell Phone Camera Fingerprint Recognition.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2nd Ed., 2008

Robust audio hashing for audio authentication watermarking.
Proceedings of the Security, 2008

The video watermarking container: efficient real-time transaction watermarking.
Proceedings of the Security, 2008

Evaluation of robustness and transparency of multiple audio watermark embedding.
Proceedings of the Security, 2008

Content-based Message Authentication Coding for Audio Data.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Bildforensische Verfahren zur Unterstützung von Wasserzeichendetektion.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

Psycho-acoustic model-based message authentication coding for audio data.
Proceedings of the 10th workshop on Multimedia & Security, 2008

Content-Based Authentication Watermarking with Improved Audio Content Feature Extraction.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Complementing DRM with digital watermarking: mark, search, retrieve.
Online Information Review, 2007

Robust message authentication code algorithm for digital audio recordings.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Joint forensics and watermarking approach for video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Blind audio watermark synchronization by passive audio fingerprinting.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Framework for combined video frame synchronization and watermark detection.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Digital Watermarking.
Proceedings of the Encyclopedia of Multimedia, 2006

Using entropy for image and video authentication watermarks.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Countermeasure for collusion attacks against digital watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Temporal synchronization of marked MPEG video frames based on image hash system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Robust-audio-hash Synchronized Audio Watermarking.
Proceedings of the Security in Information Systems, 2006

Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting.
Proceedings of the Sicherheit 2006: Sicherheit, 2006

A digital watermark for vector-based fonts.
Proceedings of the 8th workshop on Multimedia & Security, 2006

Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Digital Watermarking for Image Authentication with Localization.
Proceedings of the International Conference on Image Processing, 2006

Suche nach Urheberrechtsverletzungen in Internet-Tauschbörsen mittels digitaler Wasserzeichen.
Proceedings of the Informatik 2006, 2006

Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability.
Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, 2006

2005
Applying interest operators in semi-fragile video watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Audio watermarking and partial encryption.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Robust digital watermark solution for intercoded frames of MPEG video data.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Vertrauenswürdigkeit von Audiodaten - Digitale Wasserzeichen und Verifikation der semantischen Integrität.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten.
Proceedings of the Sicherheit 2005: Sicherheit, 2005

Semantically Extended Digital Watermarking Model for Multimedia Content.
Proceedings of the Communications and Multimedia Security, 2005

Digital Signatures Based on Invertible Watermarks for Video Authentication.
Proceedings of the Communications and Multimedia Security, 2005

Secure Production of Digital Media.
Proceedings of the From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005

2004
Digitale Wasserzeichen für Audiodaten.
PhD thesis, 2004

Advanced audio watermarking benchmarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Feature-based watermarking scheme for MPEG-I/II video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

The digital watermarking container: secure and efficient embedding.
Proceedings of the 6th workshop on Multimedia & Security, 2004

A High-Capacity Block Based Video Watermark.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

2003
Watermarking-Based Digital Audio Data Authentication.
EURASIP J. Adv. Sig. Proc., 2003

Capacity-optimized mp2 audio watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Robustness evaluation of transactional audio watermarking systems.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt.
Proceedings of the INFORMATIK 2003 - Mit Sicherheit Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", 29. September, 2003

Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung.
Proceedings of the INFORMATIK 2003 - Mit Sicherheit Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", 29. September, 2003

2002
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources.
EURASIP J. Adv. Sig. Proc., 2002

StirMark Benchmark: audio watermarking attacks based on lossy compression.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Computer-aided visual model for ensuring video watermarking transparency.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Joint watermarking of audio-visual data.
Proceedings of the Fourth IEEE Workshop on Multimedia Signal Processing, 2001

PlataJanus: an audio annotation watermarking framework.
Proceedings of the 4th workshop on Multimedia & Security: New Challenges, 2001

StirMark Benchmark: Audio Watermarking Attacks.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

2000
Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen.
Datenschutz und Datensicherheit, 2000

Combined video and audio watermarking: embedding content information in multimedia data.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

H204M - watermarking for media: classification, quality evaluation, design improvements.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000


  Loading...