The SCEAS System
Navigation Menu

Search the dblp DataBase


Andreas Westfeld: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Rainer Böhme, Andreas Westfeld
    Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:125-140 [Conf]
  2. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    A Java-Based Distributed Platform for Multilateral Security. [Citation Graph (0, 0)][DBLP]
    Trends in Distributed Systems for Electronic Commerce, 1998, pp:52-64 [Conf]
  3. Rainer Böhme, Andreas Westfeld
    Exploiting Preserved Statistics for Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:82-96 [Conf]
  4. Andreas Westfeld
    F5-A Steganographic Algorithm. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2001, pp:289-302 [Conf]
  5. Andreas Westfeld
    Detecting Low Embedding Rates. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:324-339 [Conf]
  6. Andreas Westfeld, Andreas Pfitzmann
    Attacks on Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:61-76 [Conf]
  7. Andreas Westfeld, Gritta Wolf
    Steganography in a Video Conferencing System. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:32-47 [Conf]
  8. Jan Zöllner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf
    Modeling the Security of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:344-354 [Conf]
  9. Kwangsoo Lee, Andreas Westfeld, Sangjin Lee
    Category Attack for LSB Steganalysis of JPEG Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:35-48 [Conf]
  10. Andreas Westfeld
    Steganalysis in the Presence of Weak Cryptography and Encoding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:19-34 [Conf]
  11. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    Flexible mehrseitige Sicherheit für verteilte Anwendungen. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen, 1999, pp:132-143 [Conf]
  12. Andreas Westfeld
    Nutzung der Nachbarkorrelation für Steganalyse mit erhöhter Zuverlässigkeit. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:53-64 [Conf]
  13. Andreas Westfeld
    Steganographie für den Amateurfunk. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:119-130 [Conf]
  14. Andreas Westfeld
    Space filling curves in steganalysis. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:28-37 [Conf]
  15. Andreas Pfitzmann, Alexander Schill, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner
    SSONET: Systemunterstützung für mehrseitige Sicherheit in offenen Datennetzen. [Citation Graph (0, 0)][DBLP]
    Inform., Forsch. Entwickl., 1999, v:14, n:2, pp:95-108 [Journal]
  16. Rainer Böhme, Andreas Westfeld
    Feature-based encoder classification of compressed audio streams. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:108-120 [Journal]
  17. Andreas Westfeld
    Steganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:201-215 [Conf]
  18. Andreas Westfeld
    Lessons from the BOWS contest. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:208-213 [Conf]
  19. Rainer Böhme, Andreas Westfeld
    Statistical characterisation of MP3 encoders for steganalysis. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:25-34 [Conf]

  20. Generic Adoption of Spatial Steganalysis to Transformed Domain. [Citation Graph (, )][DBLP]

  21. Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2. [Citation Graph (, )][DBLP]

  22. Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. [Citation Graph (, )][DBLP]

  23. Weaknesses of MB2. [Citation Graph (, )][DBLP]

  24. Von Bogenschützen und digitalen Wasserzeichen. [Citation Graph (, )][DBLP]

  25. Steganalyse von JPEG-Dateien. [Citation Graph (, )][DBLP]

  26. A regression-based restoration technique for automated watermark removal. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002