Share This Author
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
Content-based digital signature for motion pictures authentication and content-fragile watermarking
- J. Dittmann, A. Steinmetz, R. Steinmetz
- Computer ScienceProceedings IEEE International Conference on…
- 7 June 1999
This work presents a content-based signature technique for image and video authenticity and integrity, introduces a tool for interactive video authentication and proposes content-fragile watermarking, a concept which combines water marking and content- based digital signatures to ensure copyright protection and detection of integrity violation.
Automatic Generation and Detection of Visually Faultless Facial Morphs
An approach to automatic generation of visually faultless facial morphs along with a proposal on how such morphs can be automatically detected are introduced and results indicate that facial morphing is a serious threat to access control systems aided by AFR and establish the need for morph detection approaches.
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity…
Digital audio forensics: a first practical evaluation on microphone and environment classification
The results show, that for the test set, the used classification techniques and selected steganalysis features, microphones can be better classified than environments.
StirMark benchmark: audio watermarking attacks
- M. Steinebach, J. Dittmann, F. Raynal
- Computer ScienceProceedings International Conference on…
- 2 April 2001
The architecture of a public automated evaluation service for still images, sound and video and the set of tests is related to audio data and addresses the usual equalisation and normalisation but also time stretching, pitch shifting and specially designed audio attack algorithms.
Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images
- T. Neubert, A. Makrushin, M. Hildebrandt, Christian Krätzer, J. Dittmann
- Computer ScienceIET Biom.
- 9 February 2018
It is shown that the impact of StirTrace post- processing operations on the biometric quality of morphed face images is negligible, the impact on the forensic quality depends on the type of post-processing, and the new FMF realisation outperforms the previously considered ones.
Mel-cepstrum-based steganalysis for VoIP steganography
This paper introduces a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages and shows how general forensic approaches can detect information hiding techniques in the field of hidden communication as well as for DRM applications.
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark
- F. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann, C. Fontaine, Nazim Fatès
- Computer ScienceIS&T/SPIE Electronic Imaging
- 1 August 2001
This paper will present the architecture of a public automated evaluation service for still images, sound and video, and detail and justify the choice of evaluation profiles, that is the series of tests applied to different types of wa-termarking schemes.
Design and evaluation of steganography for voice-over-IP
- Christian Krätzer, J. Dittmann, Thomas Vogel, Reyk Hillert
- Computer ScienceIEEE International Symposium on Circuits and…
- 21 May 2006
It is shown that using this framework it is largely secure to transmit hidden messages during a VoIP session and demonstrate results with respect to perceptibility for music and speech data.