Search the dblp DataBase
Jana Dittmann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jana Dittmann , Arnd Steinmetz Enabling Technology for the Trading of MPEG-encoded Video. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:314-324 [Conf ] Martin Steinebach , Jana Dittmann Secure Production of Digital Media. [Citation Graph (0, 0)][DBLP ] From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005, pp:79-86 [Conf ] Jana Dittmann , Petra Wohlmacher , Ralf Ackermann Conditional Access for Business and M-Commerce Applications using Annotation Watermarks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Enrico Hauer , Jana Dittmann , Martin Steinebach Digital Signatures Based on Invertible Watermarks for Video Authentication. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:277-279 [Conf ] Andrea Oermann , Jana Dittmann , Claus Vielhauer Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:170-179 [Conf ] Martin Steinebach , Jana Dittmann , Eva Saar Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:197-212 [Conf ] Jana Dittmann , Claus Vielhauer Introduction from Session Chairs: New Challenges in Media Security. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2004, pp:448-448 [Conf ] Danny Hesse , Jana Dittmann , Andreas Lang Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2004, pp:453-456 [Conf ] Stefan Thiemert , Thomas Vogel , Jana Dittmann , Martin Steinebach A High-Capacity Block Based Video Watermark. [Citation Graph (0, 0)][DBLP ] EUROMICRO, 2004, pp:457-460 [Conf ] Andreas Lang , Jana Dittmann , Martin Steinebach Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:399-410 [Conf ] Martin Steinebach , Enrico Hauer , Jana Dittmann Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt. [Citation Graph (0, 0)][DBLP ] GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:395-398 [Conf ] Jana Dittmann Multimedia and Security Demo at IEEE Multimedia Systems '99. [Citation Graph (0, 0)][DBLP ] ICMCS, Vol. 2, 1999, pp:1001-1002 [Conf ] Jana Dittmann , Frank Nack , Arnd Steinmetz , Ralf Steinmetz Interactive Watermarking Environments. [Citation Graph (0, 0)][DBLP ] ICMCS, 1998, pp:286-294 [Conf ] Jana Dittmann , Arnd Steinmetz , Ralf Steinmetz Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking. [Citation Graph (0, 0)][DBLP ] ICMCS, Vol. 2, 1999, pp:209-213 [Conf ] Klara Nahrstedt , Jana Dittmann , Petra Wohlmacher Approaches to Multimedia and Security. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (III), 2000, pp:1275-1278 [Conf ] Sascha Schimke , Claus Vielhauer , Jana Dittmann Using Adapted Levenshtein Distance for On-Line Signature Authentication. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2004, pp:931-934 [Conf ] Jana Dittmann , Arnd Steinmetz , Ralf Steinmetz Content-Fragile Watermarking Based on Content-Based Digital Signatures. [Citation Graph (0, 0)][DBLP ] IDMS, 1999, pp:259-272 [Conf ] Jana Dittmann , Lucilla Croce Ferri , Claus Vielhauer Hologram Watermarks for Document Authentications. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:60-64 [Conf ] Jana Dittmann , Anirban Mukherjee , Martin Steinebach Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication. [Citation Graph (0, 0)][DBLP ] ITCC, 2000, pp:62-67 [Conf ] Martin Steinebach , Jana Dittmann , Christian Seibel , Lucilla Croce Ferri , Fabien A. P. Petitcolas , Nazim Fatès , Caroline Fontaine , Frédéric Raynal StirMark Benchmark: Audio Watermarking Attacks. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:49-54 [Conf ] Martin Steinebach , Andreas Lang , Jana Dittmann , Christian Neubauer Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:100-105 [Conf ] Andrea Oermann , Jana Dittmann Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen. [Citation Graph (0, 0)][DBLP ] Leipziger Informatik-Tage, 2005, pp:391-400 [Conf ] Jana Dittmann , Martin Steinebach , Thomas Kunkelmann , Ludwig Stoffels H204M - watermarking for media: classification, quality evaluation, design improvements. [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:107-110 [Conf ] Jana Dittmann , Mark Stabenau , Ralf Steinmetz Robust MPEG Video Watermarking Technologies. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1998, pp:71-80 [Conf ] Carsten Griwodz , Oliver Merkel , Jana Dittmann , Ralf Steinmetz Protecting VoD the Easier Way. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 1998, pp:21-28 [Conf ] Andrea Oermann , Tobias Scheidat , Claus Vielhauer , Jana Dittmann Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing. [Citation Graph (0, 0)][DBLP ] MRCS, 2006, pp:546-553 [Conf ] Jana Dittmann , Enrico Hauer , Claus Vielhauer , Jörg Schwenk , Eva Saar Customer Identification for MPEG Video Based on Digital Fingerprinting. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2001, pp:383-390 [Conf ] Henry Sonnet , Tobias Isenberg , Jana Dittmann , Thomas Strothotte Illustration Watermarks for Vector Graphics. [Citation Graph (0, 0)][DBLP ] Pacific Conference on Computer Graphics and Applications, 2003, pp:73-82 [Conf ] Jana Dittmann , Stefan Katzenbeisser , Christian Schallhart , Helmut Veith Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:493-508 [Conf ] Claus Vielhauer , Jana Dittmann , Christian Helmholz , Marten Wenzel Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:309-312 [Conf ] Thomas Vogel , Jana Dittmann , Reyk Hillert , Christian Krätzer Design und Evaluierung von Steganographie für Voice-over-IP. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2006, pp:131-142 [Conf ] Jana Dittmann , Andreas Lang , Martin Steinebach , Stefan Katzenbeisser ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. [Citation Graph (0, 0)][DBLP ] Sicherheit, 2005, pp:189-192 [Conf ] Jana Dittmann , Martin Steinebach , Andreas Lang , Sascha Zmudzinski Advanced audio watermarking benchmarking. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:224-235 [Conf ] Jana Dittmann , Danny Hesse , Reyk Hillert Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:607-618 [Conf ] Stefan Katzenbeisser , Jana Dittmann Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf ] Claus Vielhauer , T. K. Basu , Jana Dittmann , Pranab K. Dutta Finding meta data in speech and handwriting biometrics. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:504-515 [Conf ] Andreas Lang , Jana Dittmann , Eugene T. Lin , Edward J. Delp Application-oriented audio watermark benchmark service. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:275-286 [Conf ] Thomas Vogel , Jana Dittmann Illustration watermarking: an object-based approach for digital images. [Citation Graph (0, 0)][DBLP ] Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:578-589 [Conf ] Frank Nack , Arnd Steinmetz , Jana Dittmann , Christian Wilk A4SM: A Framework for Distributed Digital Video Production. [Citation Graph (0, 0)][DBLP ] SYBEN, 1998, pp:466-475 [Conf ] Jana Dittmann , Martin Steinebach Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherheit, 2000, v:24, n:10, pp:- [Journal ] Jana Dittmann , Frank Nack Copyright-Copywrong. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2000, v:7, n:4, pp:14-17 [Journal ] Jana Dittmann , Petra Wohlmacher , Klara Nahrstedt Using Cryptographic and Watermarking Algorithms. [Citation Graph (0, 0)][DBLP ] IEEE MultiMedia, 2001, v:8, n:4, pp:54-65 [Journal ] Jana Dittmann , Elke Franz , Antje Schneidewind Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 2005, v:28, n:6, pp:453-461 [Journal ] Jana Dittmann , Ralf Steinmetz Digitale Wasserzeichen - Aktuelles Schlagwort. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 2000, v:23, n:1, pp:47-50 [Journal ] Jana Dittmann Editorial to the special issue about multimedia and security. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2005, v:11, n:2, pp:93-94 [Journal ] Jana Dittmann , Stefan Katzenbeisser , Nasir D. Memon Editorial. [Citation Graph (0, 0)][DBLP ] Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal ] Benoit M. Macq , Jana Dittmann , Edward J. Delp Benchmarking of Image Watermarking Algorithms for Digital Rights Management. [Citation Graph (0, 0)][DBLP ] Proceedings of the IEEE, 2004, v:92, n:6, pp:971-984 [Journal ] Jana Dittmann , David Megías , Andreas Lang , Jordi Herrera-Joancomartí Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. [Citation Graph (0, 0)][DBLP ] , 2006, v:, n:, pp:1-40 [Journal ] Christian Krätzer , Jana Dittmann , Thomas Vogel , Reyk Hillert Design and evaluation of steganography for voice-over-IP. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Andreas Lang , Jana Dittmann , Stefan Kiltz , Tobias Hoppe Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 2007, pp:40-53 [Conf ] Andrea Oermann , Sandra Gebbensleben , Claus Vielhauer , Jana Dittmann Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides. [Citation Graph (0, 0)][DBLP ] AXMEDIS, 2006, pp:337-340 [Conf ] Andreas Lang , Jana Dittmann , Ryan Spring , Claus Vielhauer Audio watermark attacks: from single to profile attacks. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:39-50 [Conf ] Andrea Oermann , Andreas Lang , Jana Dittmann Verifier-tuple for audio-forensic to determine speaker environment. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:57-62 [Conf ] Christian Krätzer , Andrea Oermann , Jana Dittmann , Andreas Lang Digital audio forensics: a first practical evaluation on microphone and environment classification. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:63-74 [Conf ] Jana Dittmann , Petra Wohlmacher , Klara Nahrstedt Introduction to multimedia and security: protecting the media of the future - securing the future of the media. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2001, pp:1-2 [Conf ] Jana Dittmann , Martin Steinebach PlataJanus: an audio annotation watermarking framework. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2001, pp:44-47 [Conf ] Christian Krätzer , Jana Dittmann , Andreas Lang , Tobias Kühne WLAN steganography: a first practical review. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:17-22 [Conf ] Andreas Lang , Jana Dittmann Transparency and complexity benchmarking of audio watermarking algorithms issues. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2006, pp:190-201 [Conf ] Jana Dittmann , Jessica J. Fridrich Introduction to the ACM multimedia and security workshop. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2004, pp:1-3 [Conf ] On the Need of Data Management in Automotive Systems. [Citation Graph (, )][DBLP ] Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. [Citation Graph (, )][DBLP ] Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. [Citation Graph (, )][DBLP ] Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face. [Citation Graph (, )][DBLP ] Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. [Citation Graph (, )][DBLP ] Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren. [Citation Graph (, )][DBLP ] Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. [Citation Graph (, )][DBLP ] Distance-Level Fusion Strategies for Online Signature Verification. [Citation Graph (, )][DBLP ] Microphone Classification Using Fourier Coefficients. [Citation Graph (, )][DBLP ] Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. [Citation Graph (, )][DBLP ] Evaluation of Fusion for Similarity Searching in Online Handwritten Documents. [Citation Graph (, )][DBLP ] Digital audio watermarking evaluation within the application field of perceptual hashing. [Citation Graph (, )][DBLP ] Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats. [Citation Graph (, )][DBLP ] Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. [Citation Graph (, )][DBLP ] Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. [Citation Graph (, )][DBLP ] Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. [Citation Graph (, )][DBLP ] Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. [Citation Graph (, )][DBLP ] Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. [Citation Graph (, )][DBLP ] From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. [Citation Graph (, )][DBLP ] Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. [Citation Graph (, )][DBLP ] Advanced Studies on Reproducibility of Biometric Hashes. [Citation Graph (, )][DBLP ] Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls. [Citation Graph (, )][DBLP ] The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection. [Citation Graph (, )][DBLP ] Nested object watermarking. [Citation Graph (, )][DBLP ] Audio annotation watermarking with robustness against DA/AD conversion. [Citation Graph (, )][DBLP ] The impact of information fusion in steganalysis on the example of audio steganalysis. [Citation Graph (, )][DBLP ] Search in 0.073secs, Finished in 0.076secs