![]() | 2009 | |
---|---|---|
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Sandro Schulze, Mario Pukall, Gunter Saake, Tobias Hoppe, Jana Dittmann: On the Need of Data Management in Automotive Systems. BTW 2009: 217-226 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Scheidat, Michael Biermann, Jana Dittmann, Claus Vielhauer, Karl Kümmel: Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face. COST 2101/2102 Conference 2009: 220-227 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Sascha Schimke, Maik Schott, Claus Vielhauer, Jana Dittmann: Evaluation of Fusion for Similarity Searching in Online Handwritten Documents. ICDM 2009: 276-290 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Altschaffel, Stefan Kiltz, Jana Dittmann: From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. IMF 2009: 54-68 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert Buchholz, Christian Krätzer, Jana Dittmann: Microphone Classification Using Fourier Coefficients. Information Hiding 2009: 235-246 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Hoppe, Stefan Kiltz, Jana Dittmann: Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats. SAFECOMP 2009: 145-158 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Scheidat, Claus Vielhauer, Jana Dittmann: Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach. Image Vision Comput. 27(3): 269-278 (2009) |
2008 | ||
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrew D. Ker, Jana Dittmann, Jessica J. Fridrich: Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008 ACM 2008 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Scheidat, Claus Vielhauer, Jana Dittmann: Advanced Studies on Reproducibility of Biometric Hashes. BIOID 2008: 150-159 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Hoppe, Stefan Kiltz, Jana Dittmann: Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. IAS 2008: 295-298 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Krätzer, Jana Dittmann: Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. MM&Sec 2008: 159-166 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Biermann, Tobias Hoppe, Jana Dittmann, Claus Vielhauer: Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. MM&Sec 2008: 185-194 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann: Digital audio watermarking evaluation within the application field of perceptual hashing. SAC 2008: 1192-1196 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Hoppe, Stefan Kiltz, Jana Dittmann: Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. SAFECOMP 2008: 235-248 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrey Makrushin, Jana Dittmann, Stefan Kiltz, Tobias Hoppe: Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. Sicherheit 2008: 315-327 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Hoppe, Jana Dittmann: Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. Sicherheit 2008: 341-353 |
2007 | ||
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007 ACM 2007 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Scheidat, Claus Vielhauer, Jana Dittmann: Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. ICIP (2) 2007: 393-396 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Krätzer, Jana Dittmann: Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. Information Hiding 2007: 359-377 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang: Digital audio forensics: a first practical evaluation on microphone and environment classification. MM&Sec 2007: 63-74 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe: Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment. SAFECOMP 2007: 40-53 |
2006 | ||
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Sviatoslav Voloshynovskiy, Jana Dittmann, Jessica J. Fridrich: Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006 ACM 2006 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann: Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg GI 2006 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Oermann, Sandra Gebbensleben, Claus Vielhauer, Jana Dittmann: Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides. AXMEDIS 2006: 337-340 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Krätzer, Jana Dittmann, Thomas Vogel, Reyk Hillert: Design and evaluation of steganography for voice-over-IP. ISCAS 2006 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne: WLAN steganography: a first practical review. MM&Sec 2006: 17-22 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann: Transparency and complexity benchmarking of audio watermarking algorithms issues. MM&Sec 2006: 190-201 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Oermann, Tobias Scheidat, Claus Vielhauer, Jana Dittmann: Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing. MRCS 2006: 546-553 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas Vogel, Jana Dittmann, Reyk Hillert, Christian Krätzer: Design und Evaluierung von Steganographie für Voice-over-IP. Sicherheit 2006: 131-142 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Claus Villager, Jana Dittmann: Biometrics for User Authentication. Encyclopedia of Multimedia 2006 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Jana Dittmann, Erich J. Neuhold: Digital Watermarking. Encyclopedia of Multimedia 2006 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí: Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. T. Data Hiding and Multimedia Security: 1-40 (2006) |
2005 | ||
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmet M. Eskicioglu, Jessica J. Fridrich, Jana Dittmann: Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006 ACM 2005 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings Springer 2005 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Oermann, Jana Dittmann, Claus Vielhauer: Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. Communications and Multimedia Security 2005: 170-179 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Enrico Hauer, Jana Dittmann, Martin Steinebach: Digital Signatures Based on Invertible Watermarks for Video Authentication. Communications and Multimedia Security 2005: 277-279 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Jana Dittmann: Secure Production of Digital Media. From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments 2005: 79-86 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Tobias Scheidat, Claus Vielhauer, Jana Dittmann: Distance-Level Fusion Strategies for Online Signature Verification. ICME 2005: 1294-1297 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Oermann, Jana Dittmann: Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen. Leipziger Informatik-Tage 2005: 391-400 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann, Ryan Spring, Claus Vielhauer: Audio watermark attacks: from single to profile attacks. MM&Sec 2005: 39-50 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Andrea Oermann, Andreas Lang, Jana Dittmann: Verifier-tuple for audio-forensic to determine speaker environment. MM&Sec 2005: 57-62 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith: Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp: Application-oriented audio watermark benchmark service. Security, Steganography, and Watermarking of Multimedia Contents 2005: 275-286 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Claus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta: Finding meta data in speech and handwriting biometrics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 504-515 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas Vogel, Jana Dittmann: Illustration watermarking: an object-based approach for digital images. Security, Steganography, and Watermarking of Multimedia Contents 2005: 578-589 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Danny Hesse, Reyk Hillert: Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. Security, Steganography, and Watermarking of Multimedia Contents 2005: 607-618 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser: ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Sicherheit 2005: 189-192 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Claus Vielhauer, Jana Dittmann, Christian Helmholz, Marten Wenzel: Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen. Sicherheit 2005: 309-312 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Elke Franz, Antje Schneidewind: Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. Informatik Spektrum 28(6): 453-461 (2005) |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann: Editorial to the special issue about multimedia and security. Multimedia Syst. 11(2): 93-94 (2005) |
2004 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Jessica J. Fridrich: Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004 ACM 2004 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Claus Vielhauer: Introduction from Session Chairs: New Challenges in Media Security. EUROMICRO 2004: 448-448 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Danny Hesse, Jana Dittmann, Andreas Lang: Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. EUROMICRO 2004: 453-456 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach: A High-Capacity Block Based Video Watermark. EUROMICRO 2004: 457-460 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Sascha Schimke, Claus Vielhauer, Jana Dittmann: Using Adapted Levenshtein Distance for On-Line Signature Authentication. ICPR (2) 2004: 931-934 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Jessica J. Fridrich: Introduction to the ACM multimedia and security workshop. MM&Sec 2004: 1-3 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski: Advanced audio watermarking benchmarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 224-235 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Katzenbeisser, Jana Dittmann: Malicious attacks on media authentication schemes based on invertible watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 838-847 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Benoit M. Macq, Jana Dittmann, Edward J. Delp: Benchmarking of Image Watermarking Algorithms for Digital Rights Management. Proceedings of the IEEE 92(6): 971-984 (2004) |
2003 | ||
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Enrico Hauer, Jana Dittmann: Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 395-398 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Andreas Lang, Jana Dittmann, Martin Steinebach: Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 399-410 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thomas Strothotte: Illustration Watermarks for Vector Graphics. Pacific Conference on Computer Graphics and Applications 2003: 73-82 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon: Editorial. Multimedia Syst. 9(3): 215 (2003) |
2002 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Jana Dittmann, Eva Saar: Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. Communications and Multimedia Security 2002: 197-212 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Andreas Lang, Jana Dittmann, Christian Neubauer: Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. ITCC 2002: 100-105 |
2001 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf Steinmetz, Jana Dittmann, Martin Steinebach: Communications and Multimedia Security Issues of the New Century, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany Kluwer 2001 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Petra Wohlmacher, Ralf Ackermann: Conditional Access for Business and M-Commerce Applications using Annotation Watermarks. Communications and Multimedia Security 2001 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar: Customer Identification for MPEG Video Based on Digital Fingerprinting. IEEE Pacific Rim Conference on Multimedia 2001: 383-390 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Martin Steinebach, Jana Dittmann, Christian Seibel, Lucilla Croce Ferri, Fabien A. P. Petitcolas, Nazim Fatès, Caroline Fontaine, Frédéric Raynal: StirMark Benchmark: Audio Watermarking Attacks. ITCC 2001: 49-54 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Lucilla Croce Ferri, Claus Vielhauer: Hologram Watermarks for Document Authentications. ITCC 2001: 60-64 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt: Introduction to multimedia and security: protecting the media of the future - securing the future of the media. MM&Sec 2001: 1-2 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Martin Steinebach: PlataJanus: an audio annotation watermarking framework. MM&Sec 2001: 44-47 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt: Using Cryptographic and Watermarking Algorithms. IEEE MultiMedia 8(4): 54-65 (2001) |
2000 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Martin Steinebach, Thomas Kunkelmann, Ludwig Stoffels: H204M - watermarking for media: classification, quality evaluation, design improvements. ACM Multimedia Workshops 2000: 107-110 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Klara Nahrstedt, Jana Dittmann, Petra Wohlmacher: Approaches to Multimedia and Security. IEEE International Conference on Multimedia and Expo (III) 2000: 1275-1278 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Anirban Mukherjee, Martin Steinebach: Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication. ITCC 2000: 62-67 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Martin Steinebach: Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen. Datenschutz und Datensicherheit 24(10): (2000) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Frank Nack: Copyright-Copywrong. IEEE MultiMedia 7(4): 14-17 (2000) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Ralf Steinmetz: Digitale Wasserzeichen - Aktuelles Schlagwort. Informatik Spektrum 23(1): 47-50 (2000) |
1999 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann: Multimedia and Security Demo at IEEE Multimedia Systems '99. ICMCS, Vol. 2 1999: 1001-1002 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz: Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking. ICMCS, Vol. 2 1999: 209-213 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz: Content-Fragile Watermarking Based on Content-Based Digital Signatures. IDMS 1999: 259-272 |
1998 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Carsten Griwodz, Oliver Merkel, Jana Dittmann, Ralf Steinmetz: Protecting VoD the Easier Way. ACM Multimedia 1998: 21-28 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Mark Stabenau, Ralf Steinmetz: Robust MPEG Video Watermarking Technologies. ACM Multimedia 1998: 71-80 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Frank Nack, Arnd Steinmetz, Ralf Steinmetz: Interactive Watermarking Environments. ICMCS 1998: 286-294 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Frank Nack, Arnd Steinmetz, Jana Dittmann, Christian Wilk: A4SM: A Framework for Distributed Digital Video Production. SYBEN 1998: 466-475 |
1997 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Jana Dittmann, Arnd Steinmetz: Enabling Technology for the Trading of MPEG-encoded Video. ACISP 1997: 314-324 |