Pascal Schöttle

According to our database1, Pascal Schöttle authored at least 20 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Detecting Adversarial Examples - A Lesson from Multimedia Forensics.
CoRR, 2018

2017
Decoy Password Vaults: At Least as Hard as Steganography?
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Mixing Coins of Different Quality: A Game-Theoretic Approach.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Game Theory and Adaptive Steganography.
IEEE Trans. Information Forensics and Security, 2016

Telltale Watermarks for Counting JPEG Compressions.
Proceedings of the Media Watermarking, 2016

Forensics of High Quality and Nearly Identical JPEG Image Recompression.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Adaptive Steganography and Steganalysis with Fixed-Size Embedding.
Trans. Data Hiding and Multimedia Security, 2015

Forensics of high-quality JPEG images with color subsampling.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Thinking beyond the block: block matching for copy-move forgery detection revisited.
Proceedings of the Media Watermarking, 2015

2014
Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
ACM Trans. Internet Techn., 2014

On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Predictable rain?: steganalysis of public-key steganography using wet paper codes.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

The role of side information in steganography.
PhD thesis, 2014

2013
Bitspotting: Detecting Optimal Adaptive Steganography.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Weighted stego-image steganalysis for naive content-adaptive embedding.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

A Game-Theoretic Approach to Content-Adaptive Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

Where to Hide the Bits ?
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

2008
On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacks.
Proceedings of the LCN 2008, 2008


  Loading...