The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jana Dittmann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jana Dittmann, Arnd Steinmetz
    Enabling Technology for the Trading of MPEG-encoded Video. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:314-324 [Conf]
  2. Martin Steinebach, Jana Dittmann
    Secure Production of Digital Media. [Citation Graph (0, 0)][DBLP]
    From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, 2005, pp:79-86 [Conf]
  3. Jana Dittmann, Petra Wohlmacher, Ralf Ackermann
    Conditional Access for Business and M-Commerce Applications using Annotation Watermarks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. Enrico Hauer, Jana Dittmann, Martin Steinebach
    Digital Signatures Based on Invertible Watermarks for Video Authentication. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:277-279 [Conf]
  5. Andrea Oermann, Jana Dittmann, Claus Vielhauer
    Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:170-179 [Conf]
  6. Martin Steinebach, Jana Dittmann, Eva Saar
    Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:197-212 [Conf]
  7. Jana Dittmann, Claus Vielhauer
    Introduction from Session Chairs: New Challenges in Media Security. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2004, pp:448-448 [Conf]
  8. Danny Hesse, Jana Dittmann, Andreas Lang
    Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2004, pp:453-456 [Conf]
  9. Stefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach
    A High-Capacity Block Based Video Watermark. [Citation Graph (0, 0)][DBLP]
    EUROMICRO, 2004, pp:457-460 [Conf]
  10. Andreas Lang, Jana Dittmann, Martin Steinebach
    Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:399-410 [Conf]
  11. Martin Steinebach, Enrico Hauer, Jana Dittmann
    Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"), 2003, pp:395-398 [Conf]
  12. Jana Dittmann
    Multimedia and Security Demo at IEEE Multimedia Systems '99. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:1001-1002 [Conf]
  13. Jana Dittmann, Frank Nack, Arnd Steinmetz, Ralf Steinmetz
    Interactive Watermarking Environments. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1998, pp:286-294 [Conf]
  14. Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz
    Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:209-213 [Conf]
  15. Klara Nahrstedt, Jana Dittmann, Petra Wohlmacher
    Approaches to Multimedia and Security. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (III), 2000, pp:1275-1278 [Conf]
  16. Sascha Schimke, Claus Vielhauer, Jana Dittmann
    Using Adapted Levenshtein Distance for On-Line Signature Authentication. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2004, pp:931-934 [Conf]
  17. Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz
    Content-Fragile Watermarking Based on Content-Based Digital Signatures. [Citation Graph (0, 0)][DBLP]
    IDMS, 1999, pp:259-272 [Conf]
  18. Jana Dittmann, Lucilla Croce Ferri, Claus Vielhauer
    Hologram Watermarks for Document Authentications. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:60-64 [Conf]
  19. Jana Dittmann, Anirban Mukherjee, Martin Steinebach
    Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication. [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:62-67 [Conf]
  20. Martin Steinebach, Jana Dittmann, Christian Seibel, Lucilla Croce Ferri, Fabien A. P. Petitcolas, Nazim Fatès, Caroline Fontaine, Frédéric Raynal
    StirMark Benchmark: Audio Watermarking Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:49-54 [Conf]
  21. Martin Steinebach, Andreas Lang, Jana Dittmann, Christian Neubauer
    Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:100-105 [Conf]
  22. Andrea Oermann, Jana Dittmann
    Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen. [Citation Graph (0, 0)][DBLP]
    Leipziger Informatik-Tage, 2005, pp:391-400 [Conf]
  23. Jana Dittmann, Martin Steinebach, Thomas Kunkelmann, Ludwig Stoffels
    H204M - watermarking for media: classification, quality evaluation, design improvements. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:107-110 [Conf]
  24. Jana Dittmann, Mark Stabenau, Ralf Steinmetz
    Robust MPEG Video Watermarking Technologies. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1998, pp:71-80 [Conf]
  25. Carsten Griwodz, Oliver Merkel, Jana Dittmann, Ralf Steinmetz
    Protecting VoD the Easier Way. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1998, pp:21-28 [Conf]
  26. Andrea Oermann, Tobias Scheidat, Claus Vielhauer, Jana Dittmann
    Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing. [Citation Graph (0, 0)][DBLP]
    MRCS, 2006, pp:546-553 [Conf]
  27. Jana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar
    Customer Identification for MPEG Video Based on Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:383-390 [Conf]
  28. Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thomas Strothotte
    Illustration Watermarks for Vector Graphics. [Citation Graph (0, 0)][DBLP]
    Pacific Conference on Computer Graphics and Applications, 2003, pp:73-82 [Conf]
  29. Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith
    Ensuring Media Integrity on Third-Party Infrastructures. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:493-508 [Conf]
  30. Claus Vielhauer, Jana Dittmann, Christian Helmholz, Marten Wenzel
    Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:309-312 [Conf]
  31. Thomas Vogel, Jana Dittmann, Reyk Hillert, Christian Krätzer
    Design und Evaluierung von Steganographie für Voice-over-IP. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2006, pp:131-142 [Conf]
  32. Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser
    ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. [Citation Graph (0, 0)][DBLP]
    Sicherheit, 2005, pp:189-192 [Conf]
  33. Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski
    Advanced audio watermarking benchmarking. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:224-235 [Conf]
  34. Jana Dittmann, Danny Hesse, Reyk Hillert
    Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:607-618 [Conf]
  35. Stefan Katzenbeisser, Jana Dittmann
    Malicious attacks on media authentication schemes based on invertible watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:838-847 [Conf]
  36. Claus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta
    Finding meta data in speech and handwriting biometrics. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:504-515 [Conf]
  37. Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp
    Application-oriented audio watermark benchmark service. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:275-286 [Conf]
  38. Thomas Vogel, Jana Dittmann
    Illustration watermarking: an object-based approach for digital images. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:578-589 [Conf]
  39. Frank Nack, Arnd Steinmetz, Jana Dittmann, Christian Wilk
    A4SM: A Framework for Distributed Digital Video Production. [Citation Graph (0, 0)][DBLP]
    SYBEN, 1998, pp:466-475 [Conf]
  40. Jana Dittmann, Martin Steinebach
    Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:10, pp:- [Journal]
  41. Jana Dittmann, Frank Nack
    Copyright-Copywrong. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2000, v:7, n:4, pp:14-17 [Journal]
  42. Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt
    Using Cryptographic and Watermarking Algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2001, v:8, n:4, pp:54-65 [Journal]
  43. Jana Dittmann, Elke Franz, Antje Schneidewind
    Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2005, v:28, n:6, pp:453-461 [Journal]
  44. Jana Dittmann, Ralf Steinmetz
    Digitale Wasserzeichen - Aktuelles Schlagwort. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2000, v:23, n:1, pp:47-50 [Journal]
  45. Jana Dittmann
    Editorial to the special issue about multimedia and security. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2005, v:11, n:2, pp:93-94 [Journal]
  46. Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon
    Editorial. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2003, v:9, n:3, pp:215- [Journal]
  47. Benoit M. Macq, Jana Dittmann, Edward J. Delp
    Benchmarking of Image Watermarking Algorithms for Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Proceedings of the IEEE, 2004, v:92, n:6, pp:971-984 [Journal]
  48. Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí
    Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:1-40 [Journal]
  49. Christian Krätzer, Jana Dittmann, Thomas Vogel, Reyk Hillert
    Design and evaluation of steganography for voice-over-IP. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  50. Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe
    Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2007, pp:40-53 [Conf]
  51. Andrea Oermann, Sandra Gebbensleben, Claus Vielhauer, Jana Dittmann
    Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides. [Citation Graph (0, 0)][DBLP]
    AXMEDIS, 2006, pp:337-340 [Conf]
  52. Andreas Lang, Jana Dittmann, Ryan Spring, Claus Vielhauer
    Audio watermark attacks: from single to profile attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:39-50 [Conf]
  53. Andrea Oermann, Andreas Lang, Jana Dittmann
    Verifier-tuple for audio-forensic to determine speaker environment. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:57-62 [Conf]
  54. Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang
    Digital audio forensics: a first practical evaluation on microphone and environment classification. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:63-74 [Conf]
  55. Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt
    Introduction to multimedia and security: protecting the media of the future - securing the future of the media. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:1-2 [Conf]
  56. Jana Dittmann, Martin Steinebach
    PlataJanus: an audio annotation watermarking framework. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2001, pp:44-47 [Conf]
  57. Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne
    WLAN steganography: a first practical review. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:17-22 [Conf]
  58. Andreas Lang, Jana Dittmann
    Transparency and complexity benchmarking of audio watermarking algorithms issues. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:190-201 [Conf]
  59. Jana Dittmann, Jessica J. Fridrich
    Introduction to the ACM multimedia and security workshop. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2004, pp:1-3 [Conf]

  60. On the Need of Data Management in Automotive Systems. [Citation Graph (, )][DBLP]


  61. Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. [Citation Graph (, )][DBLP]


  62. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. [Citation Graph (, )][DBLP]


  63. Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face. [Citation Graph (, )][DBLP]


  64. Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. [Citation Graph (, )][DBLP]


  65. Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren. [Citation Graph (, )][DBLP]


  66. Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. [Citation Graph (, )][DBLP]


  67. Distance-Level Fusion Strategies for Online Signature Verification. [Citation Graph (, )][DBLP]


  68. Microphone Classification Using Fourier Coefficients. [Citation Graph (, )][DBLP]


  69. Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. [Citation Graph (, )][DBLP]


  70. Evaluation of Fusion for Similarity Searching in Online Handwritten Documents. [Citation Graph (, )][DBLP]


  71. Digital audio watermarking evaluation within the application field of perceptual hashing. [Citation Graph (, )][DBLP]


  72. Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats. [Citation Graph (, )][DBLP]


  73. Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. [Citation Graph (, )][DBLP]


  74. Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. [Citation Graph (, )][DBLP]


  75. Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. [Citation Graph (, )][DBLP]


  76. Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. [Citation Graph (, )][DBLP]


  77. Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. [Citation Graph (, )][DBLP]


  78. From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. [Citation Graph (, )][DBLP]


  79. Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. [Citation Graph (, )][DBLP]


  80. Advanced Studies on Reproducibility of Biometric Hashes. [Citation Graph (, )][DBLP]


  81. Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls. [Citation Graph (, )][DBLP]


  82. The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection. [Citation Graph (, )][DBLP]


  83. Nested object watermarking. [Citation Graph (, )][DBLP]


  84. Audio annotation watermarking with robustness against DA/AD conversion. [Citation Graph (, )][DBLP]


  85. The impact of information fusion in steganalysis on the example of audio steganalysis. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.611secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002