68 results on '"Dittmann, Jana"'
Search Results
2. On the application of semantic technologies to the domain of forensic investigations in financial crimes
3. Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners.
4. Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics.
5. User discrimination in automotive systems.
6. Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots.
7. FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology.
8. The impact of information fusion in steganalysis on the example of audio steganalysis.
9. Nested object watermarking.
10. WLAN steganography revisited.
11. Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth.
12. Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches.
13. Nested object watermarking: transparency and capacity evaluation.
14. Mel-cepstrum-based steganalysis for VoIP steganography.
15. Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking.
16. Digital watermarking of biometric speech references: impact to the EER system performance.
17. Sensometrics: identifying pen digitizers by statistical multimedia signal processing.
18. Profiles for evaluation: the usage of audio WET.
19. Transparency benchmarking on audio watermarks and steganography.
20. BlobContours: adapting Blobworld for supervised color- and texture-based image segmentation.
21. Multimodal audio guide for museums and exhibitions.
22. Application-oriented audio watermark benchmark service.
23. Finding meta data in speech and handwriting biometrics.
24. Illustration watermarking: an object-based approach for digital images.
25. Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set.
26. Malicious attacks on media authentication schemes based on invertible watermarks.
27. 3D watermarking design evaluation.
28. Capacity-optimized mp2 audio watermarking.
29. Invertible authentication for 3D meshes.
30. Watermarking protocols for authentication and ownership protection based on timestamps and holograms.
31. StirMark Benchmark: audio watermarking attacks based on lossy compression.
32. Content-fragile watermarking for image authentication.
33. Computer-aided visual model for ensuring video watermarking transparency.
34. Public automated web-based evaluation service for watermarking schemes: StirMark benchmark.
35. Advanced multimedia security solutions for data and owner authentication.
36. Combined video and audio watermarking: embedding content information in multimedia data.
37. New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP).
38. Combining digital watermarks and collusion-secure fingerprints for digital images.
39. A4SM: a framework for distributed digital video production.
40. Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence
41. Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes
42. Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms
43. Printing artificial sweat using ink jet printers for the test set generation in forensics: an image quality assessment of the reproducibility of the printing results
44. Advanced techniques for latent fingerprint detection and validation using a CWL device
45. General fusion approaches for the age determination of latent fingerprint traces: results for 2D and 3D binary pixel feature fusion
46. Design and evaluation of security multimedia warnings for children's smartphones
47. Extending a context model for microphone forensics
48. High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection
49. AR.Drone: security threat analysis and exemplary attack to track persons
50. Driver/passenger discrimination for the interaction with the dual-view touch screen integrated to the automobile centre console
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.