26 results on '"Dittmann, Jana"'
Search Results
2. From StirMark to StirTrace.
3. Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario.
4. Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor.
5. Malicious fingerprint traces.
6. Modelling watermark communication protocols using the CASPER modelling language.
7. The impact of ARTMAP to appearance-based face verification.
8. Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments.
9. An exemplary attack scenario.
10. Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments.
11. An exemplary attack scenario.
12. Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models.
13. Vehicle systems.
14. Impact of feature selection in classification for hidden channel detection on the example of audio data hiding.
15. Digital audio forensics.
16. Transparency and complexity benchmarking of audio watermarking algorithms issues.
17. WLAN steganography.
18. Verifier-tuple for audio-forensic to determine speaker environment.
19. Audio watermark attacks.
20. PlataJanus.
21. H204M — watermarking for media.
22. H204M — watermarking for media.
23. Robust MPEG video watermarking technologies.
24. Protecting VoD the easier way.
25. Introduction to the ACM multimedia and security workshop.
26. Introduction to multimedia and security.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.