42 results on '"Dittmann, Jana"'
Search Results
2. GAN-based Minutiae-driven Fingerprint Morphing
3. Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification
4. Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers’ Perspective
5. Covert Channels in Network Time Security
6. Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics
7. A Revised Taxonomy of Steganography Embedding Patterns
8. A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis
9. A Systematic Analysis of Covert Channels in the Network Time Protocol
10. Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences
11. Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset
12. General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations
13. Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans
14. Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection
15. A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD
16. Special Session 1: Media Forensics -- Fake or Reality ?
17. Steganography by synthesis
18. Generalized Benford's Law for Blind Detection of Morphed Face Images
19. Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing
20. ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties
21. From StirMark to StirTrace
22. First investigation of latent fingerprints long-term aging using chromatic white light sensors
23. A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy
24. An evaluation of biometric fingerprint matchers in a forensic context using latent impressions
25. Statistical effects of selected noise characteristics on speaker recognition in automotive environments
26. Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor
27. Malicious fingerprint traces
28. The impact of ARTMAP to appearance-based face verification
29. Modelling watermark communication protocols using the CASPER modelling language
30. Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments
31. An exemplary attack scenario
32. Session details: Forensics
33. Vehicle systems
34. Impact of feature selection in classification for hidden channel detection on the example of audio data hiding
35. Transparency and complexity benchmarking of audio watermarking algorithms issues
36. WLAN steganography
37. Verifier-tuple for audio-forensic to determine speaker environment
38. Audio watermark attacks
39. Session details: Fingerprinting
40. Introduction to the ACM multimedia and security workshop
41. Session details: Steganography I
42. H204M — watermarking for media
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.