Jana Dittmann

Learn More
In this paper we will briefly present the architecture of a public automated evaluation service we are developing for still images, sound and video. We will also detail new tests that will be included in this platform. The set of tests is related to audio data and addresses the usual equalisation and normalisation but also time stretching, pitch shifting(More)
One of the main problems, which darkens the future of digital watermarking technologies, is the lack of detailed evaluation of existing marking schemes. This lack of benchmarking of current algorithms is blatant and confuses rights holders as well as software and hardware manufacturers and prevents them from using the solution appropriate to their needs.(More)
Steganography and steganalysis in VoIP applications are important research topics as speech data is an appropriate cover to hide messages or comprehensive documents. In our paper we introduce a Mel-cepstrum based analysis known from speaker and speech recognition to perform a detection of embedded hidden messages. In particular we combine known and(More)
The development of new multimedia services and environments requires new concepts both to support the new working process and to protect the multimedia data during the production and distribution. This article addresses imagehideo authentication and copyright protection as major security demands in digital marketplaces. First we present a content-based(More)
The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats we performed several practical tests on recent automotive technology. With a focus on automotive systems based on CAN bus technology, this article summarises the results of four selected tests(More)
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Embedding of unique customer identification as a watermark into data is called fingerprinting to(More)
According to former results from [1] in this paper we summarize the design principles from the general approach and introduce extended experimental test results of a Voice-over-IP (VoIP) framework including a steganographic channel based on [1], [13], [15] and [16]. We show that using this framework it is largely secure to transmit hidden messages during a(More)
MPEG-Audio has become a standard in the area of audio compression. It is used for a wide range of applications like online music distribution or in the audio parts of MPEG-Videos. In this paper we show how to secure the audio stream by watermarking without conversion to PCM-WaveData and without encoding the MPEG-Data in a special way. The original MPEG-file(More)
Intrusion detection systems (IDS) provide security for network systems. They are used in computer networks to detect violations against security policies or unusual events that could lead towards a security thread. Telephone networks based on the internet protocol (IP) called IP telephony (IPT) are a recent development in network usage and will become a(More)