default search action
Martin Steinebach
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Martin Steinebach:
KI-generierte Abbildungen von Kindesmissbrauch. Datenschutz und Datensicherheit (dud) 48(5): 304-309 (2024) - [j23]Martin Steinebach:
Umgang mit GenAI und Deepfakes. Datenschutz und Datensicherheit (dud) 48(11): 714-720 (2024) - [j22]Martin Steinebach:
Robustness and Collision-Resistance of PhotoDNA. J. Cyber Secur. Mobil. 13(3): 541-564 (2024) - [c159]Martin Steinebach:
Natural Language Steganography by ChatGPT. ARES 2024: 81:1-81:9 - [c158]Shiying Fan, Paul Moritz Ranly, Lukas Graner, Inna Vogel, Martin Steinebach:
Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys. ARES 2024: 142:1-142:10 - [c157]Shiying Fan, Raphael Antonius Frick, Martin Steinebach:
FraunhoferSIT@EXIST2024: Leveraging Stacking Ensemble Learning for Sexism Detection. CLEF (Working Notes) 2024: 993-1002 - [c156]Raphael Antonius Frick, Martin Steinebach:
DiffSeg: Towards Detecting Diffusion-Based Inpainting Attacks Using Multi-Feature Segmentation. CVPR Workshops 2024: 3802-3808 - [c155]Raphael Antonius Frick, Martin Steinebach:
Improved identification of check-worthiness in social media data through multimodal analyses. ROMCIR@ECIR 2024: 31-40 - [c154]Inna Vogel, Pauline Möhle, Meghana Meghana, Martin Steinebach:
Adapter fusion for check-worthiness detection - combining a task adapter with a NER adapter. ROMCIR@ECIR 2024: 41-53 - [c153]Martin Steinebach, Julian Drechsler, Lilly Schröder:
KI-generierte Abbildungen von Kindesmissbrauch: Technische Grundlagen und rechtliche Einordnung. INFORMATIK 2024: 247-261 - [c152]Karla Schäfer, Jeong-Eun Choi, Martin Steinebach:
Comparative Analysis of Voice Conversion in German. ICPR (22) 2024: 387-402 - [c151]Raphael Antonius Frick, Martin Steinebach:
Fraunhofer SIT at WASSA 2024 Empathy and Personality Shared Task: Use of Sentiment Transformers and Data Augmentation With Fuzzy Labels to Predict Emotional Reactions in Conversations and Essays. WASSA 2024: 435-440 - [c150]Raphael Antonius Frick, Martin Steinebach:
A Photo and a Few Spoken Words Is All It Needs?! On the Challenges of Targeted Deepfake Attacks and Their Detection. WDC@AsiaCCS 2024 - [i1]Karla Schäfer, Jeong-Eun Choi, Inna Vogel, Martin Steinebach:
Unveiling the Potential of BERTopic for Multilingual Fake News Analysis - Use Case: Covid-19. CoRR abs/2407.08417 (2024) - 2023
- [j21]Raphael Antonius Frick, Martin Steinebach, Sascha Zmudzinski:
Deepfakes, Dall-E & Co. Datenschutz und Datensicherheit (dud) 47(4): 203-208 (2023) - [j20]Martin Steinebach:
Erkennung von Kindesmissbrauch in Medien. Datenschutz und Datensicherheit (dud) 47(4): 225-228 (2023) - [j19]Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Image Hashing Robust Against Cropping and Rotation. J. Cyber Secur. Mobil. 12(2): 129-160 (2023) - [j18]York Yannikos, Julian Heeger, Martin Steinebach:
Scraping and Analyzing Data of a Large Darknet Marketplace. J. Cyber Secur. Mobil. 12(2): 161-186 (2023) - [c149]Martin Steinebach:
An Analysis of PhotoDNA. ARES 2023: 44:1-44:8 - [c148]Fabian Oberthür, Martin Steinebach, Verena Battis:
Audio captcha breaking and consequences for human users. Media Watermarking, Security, and Forensics 2023: 373-1 - [c147]Marius Leon Hammann, Martin Steinebach, Huajian Liu, Niklas Bunzel:
Predicting positions of flipped bits in robust image hashes. Media Watermarking, Security, and Forensics 2023: 375-1 - [c146]Julian Heeger, Simon Bugert, Waldemar Berchtold, Alexander Gruler, Martin Steinebach:
Privacy preserving leak detection in peer-to-peer communication. Media Watermarking, Security, and Forensics 2023: 377-1 - [c145]Stephanie Blümer, Martin Steinebach, Raphael Antonius Frick, Niklas Bunzel:
Detection of deepfakes using background-matching. Media Watermarking, Security, and Forensics 2023: 381-1 - 2022
- [c144]Niklas Bunzel, Tobias Chen, Martin Steinebach:
Using Telegram as a carrier for image steganography: Analysing Telegrams API limits. ARES 2022: 49:1-49:8 - [c143]York Yannikos, Julian Heeger, Martin Steinebach:
Data Acquisition on a Large Darknet Marketplace. ARES 2022: 53:1-53:6 - [c142]Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Towards Image Hashing Robust Against Cropping and Rotation. ARES 2022: 55:1-55:7 - [c141]Raphael Antonius Frick, Martin Steinebach:
Fraunhofer SIT@SMM4H'22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models. SMM4H@COLING 2022: 111-113 - [c140]Simon Bugert, Huajian Liu, Waldemar Berchtold, Martin Steinebach:
Cultural assets identification using transfer learning. Imaging and Multimedia Analytics at the Edge 2022: 1-4 - [c139]Waldemar Berchtold, Huajian Liu, Simon Bugert, York Yannikos, Jingcun Wang, Julian Heeger, Martin Steinebach, Marco Frühwein:
Recognition of objects from looted excavations by smartphone app and deep learning. MOBMU 2022: 1-4 - [c138]Inna Vogel, Tahireh Setz, Jeong-Eun Choi, Martin Steinebach:
Natural Language Processing (NLP) und der Datenschutz - Chancen und Risiken für den Schutz der Privatheit. GI-Jahrestagung 2022: 651-664 - [c137]Waldemar Berchtold, Dani El-Soufi, Martin Steinebach:
Smartphone-supported integrity verification of printed documents. Media Watermarking, Security, and Forensics 2022: 1-5 - [c136]Karol Gotkowski, Huajian Liu, Martin Steinebach:
NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches. Media Watermarking, Security, and Forensics 2022: 1-7 - [c135]Martin Steinebach, Tiberius Berwanger, Huajian Liu:
Image montage detection based on image segmentation and robust hashing techniques. Media Watermarking, Security, and Forensics 2022: 1-6 - [p3]Sandra Wittmer, Florian Platzer, Martin Steinebach, York Yannikos:
Deanonymisierung im Tor-Netzwerk - Technische Möglichkeiten und rechtliche Rahmenbedingungen. Selbstbestimmung, Privatheit und Datenschutz 2022: 151-169 - [p2]Martin Steinebach:
Ausprägungen von Uploadfiltern. Selbstbestimmung, Privatheit und Datenschutz 2022: 409-428 - 2021
- [j17]Martin Steinebach, Sascha Zenglein, Katharina Brandl:
Phishing detection on tor hidden services. Digit. Investig. 36 Supplement: 301117 (2021) - [j16]Niklas Bunzel, Martin Steinebach, Huajian Liu:
Cover-aware Steganalysis. J. Cyber Secur. Mobil. 10(1): 1-26 (2021) - [j15]Uwe Breidenbach, Martin Steinebach, Huajian Liu:
Privacy-Enhanced Robust Image Hashing with Bloom Filters. J. Cyber Secur. Mobil. 10(1): 97-132 (2021) - [j14]Florian Platzer, Marcel Schäfer, Martin Steinebach:
Critical Traffic Analysis on the Tor Network. J. Cyber Secur. Mobil. 10(1): 133-160 (2021) - [c134]Fabian Brenner, Florian Platzer, Martin Steinebach:
Discovery of Single-Vendor Marketplace Operators in the Tor-Network. ARES 2021: 76:1-76:10 - [c133]Julian Heeger, York Yannikos, Martin Steinebach:
exHide: Hiding Data within the exFAT File System. ARES 2021: 77:1-77:8 - [c132]Martin Steinebach:
Technische Herausforderungen bei der Umsetzung von Uploadfiltern. GI-Jahrestagung 2021: 1077-1089 - [c131]York Yannikos, Quang Anh Dang, Martin Steinebach:
Comparison of Cyber Attacks on Services in the Clearnet and Darknet. IFIP Int. Conf. Digital Forensics 2021: 39-61 - [c130]Waldemar Berchtold, Markus Sütter, Martin Steinebach:
Fingerprinting Blank Paper and Printed Material by Smartphones. Media Watermarking, Security, and Forensics 2021 - [c129]Raphael Antonius Frick, Sascha Zmudzinski, Martin Steinebach:
Detecting Deepfakes with Haralick's Texture Properties. Media Watermarking, Security, and Forensics 2021 - [c128]Erik Gelbing, Leon Würsching, Sascha Zmudzinski, Martin Steinebach:
Video Source Identification from MP4 Data Based on Field Values in Atom/Box Attributes. Media Watermarking, Security, and Forensics 2021 - [c127]Martin Steinebach:
A Close Look at Robust Hash Flip Positions. Media Watermarking, Security, and Forensics 2021 - [c126]Kyra Wittorf, Martin Steinebach, Huajian Liu:
Automated Image Metadata Verification. Media Watermarking, Security, and Forensics 2021 - 2020
- [j13]Martin Steinebach, Sebastian Lutz, Huajian Liu:
Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification. J. Cyber Secur. Mobil. 9(1): 111-140 (2020) - [j12]Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl:
Detection and Analysis of Tor Onion Services. J. Cyber Secur. Mobil. 9(1): 141-174 (2020) - [j11]Martin Steinebach, Huajian Liu, Karol Gotkowski:
Fake News Detection by Image Montage Recognition. J. Cyber Secur. Mobil. 9(2): 175-202 (2020) - [c125]Raphael Antonius Frick, Huajian Liu, Martin Steinebach:
Detecting double compression and splicing using benfords first digit law. ARES 2020: 47:1-47:9 - [c124]Uwe Breidenbach, Martin Steinebach, Huajian Liu:
Privacy-enhanced robust image hashing with bloom filters. ARES 2020: 56:1-56:10 - [c123]Niklas Bunzel, Martin Steinebach, Huajian Liu:
Non-blind steganalysis. ARES 2020: 71:1-71:7 - [c122]Florian Platzer, Marcel Schäfer, Martin Steinebach:
Critical traffic analysis on the tor network. ARES 2020: 77:1-77:10 - [c121]Waldemar Berchtold, Huajian Liu, Martin Steinebach, Dominik Klein, Tobias Senger, Nicolas Thenée:
JAB Code - A Versatile Polychrome 2D Barcode. MOBMU 2020: 1-7 - [c120]Raphael Antonius Frick, Sascha Zmudzinski, Martin Steinebach:
Detecting "DeepFakes" in H.264 Video Data Using Compression Ghost Artifacts. Media Watermarking, Security, and Forensics 2020 - [c119]Huajian Liu, Sebastian Fach, Martin Steinebach:
Motion Vector based Robust Video Hash. Media Watermarking, Security, and Forensics 2020 - [c118]Martin Steinebach, Sebastian Jörg, Huajian Liu:
Checking the Integrity of Images with Signed Thumbnail Images. Media Watermarking, Security, and Forensics 2020
2010 – 2019
- 2019
- [j10]Martin Steinebach, Huajian Liu, Andre Ester:
The Need for Steganalysis in ImageDistribution Channels. J. Cyber Secur. Mobil. 8(3): 365-392 (2019) - [c117]Huajian Liu, Martin Steinebach, Kathrin Schölei:
Improved Manipulation Detection with Convolutional Neural Network for JPEG Images. ARES 2019: 39:1-39:6 - [c116]Martin Steinebach, Karol Gotkowski, Huajian Liu:
Fake News Detection by Image Montage Recognition. ARES 2019: 55:1-55:9 - [c115]Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos:
Detection and Analysis of Tor Onion Services. ARES 2019: 66:1-66:10 - [c114]Martin Steinebach, Sebastian Lutz, Huajian Liu:
Privacy and Robust Hashes. ARES 2019: 70:1-70:8 - [c113]Inna Vogel, Roey Regev, Martin Steinebach:
Automatisierte Analyse Radikaler Inhalte im Internet. GI-Jahrestagung 2019: 233-245 - [c112]Sandra Wittmer, Martin Steinebach:
Verwendung computergenerierter Kinderpornografie zu Ermittlungszwecken im Darknet. GI-Jahrestagung 2019: 381-392 - 2018
- [j9]Michael Waschetzki, Martin Steinebach:
Digitale Wasserzeichen in der Kriminalistik. Datenschutz und Datensicherheit 42(2): 69-73 (2018) - [c111]Martin Steinebach, Andre Ester, Huajian Liu:
Channel Steganalysis. ARES 2018: 9:1-9:8 - [c110]Paul J. E. Velthuis, Marcel Schäfer, Martin Steinebach:
New authentication concept using certificates for big data analytic tools. ARES 2018: 40:1-40:7 - [c109]York Yannikos, Annika Schäfer, Martin Steinebach:
Monitoring Product Sales in Darknet Shops. ARES 2018: 59:1-59:7 - [c108]Martin Steinebach, Andre Ester, Huajian Liu, Sascha Zmuzinksi:
Double Embedding Steganalysis: Steganalysis with Low False Positive Rate. MPS@CCS 2018: 38-47 - [c107]Huajian Liu, Martin Steinebach, Richard Stein, Felix Mayer:
Privacy Preserving Forensics for JPEG Images. Media Watermarking, Security, and Forensics 2018 - [c106]Martin Steinebach, Huajian Liu, Richard Stein, Felix Mayer:
Hybrid Image Encryption. Media Watermarking, Security, and Forensics 2018 - [c105]Felix Mayer, Marcel Schäfer, Martin Steinebach:
Transfer Learning for Data Triage Applications. Visual Information Processing and Communication 2018 - 2017
- [c104]Felix Mayer, Martin Steinebach:
Forensic Image Inspection Assisted by Deep Learning. ARES 2017: 53:1-53:9 - [c103]Waldemar Berchtold, Patrick Lieb, Martin Steinebach:
Secure communication protocol for a low-bandwidth audio channel. EUSIPCO 2017: 2206-2210 - [c102]Oren Halvani, Martin Steinebach, Lukas Graner:
Towards Imperceptible Natural Language Watermarking for German. IH&MMSec 2017: 93-98 - [c101]York Yannikos, Martin Steinebach, Michael Rettig:
Benefits of combining forensic image creation and file carving. Media Watermarking, Security, and Forensics 2017: 22-27 - [c100]Martin Steinebach, Waldemar Berchtold:
MP3 Partial Encryption for DRM. Media Watermarking, Security, and Forensics 2017: 28-35 - 2016
- [j8]Martin Steinebach, Erik Krempel, Christian Jung, Mario Hoffmann:
Datenschutz und Datenanalyse. Datenschutz und Datensicherheit 40(7): 440-445 (2016) - [c99]Waldemar Berchtold, Marcel Schäfer, Martin Steinebach:
Maximal stable extremal regions for robust video watermarking. Media Watermarking, Security, and Forensics 2016: 1-8 - [c98]Waldemar Berchtold, Marcel Schäfer, Sascha Wombacher, Martin Steinebach:
Quality Metric for 2D Textures on 3D Objects. Media Watermarking, Security, and Forensics 2016: 1-6 - [c97]Marcel Schäfer, Waldemar Berchtold, Teetje Stark, Nils Reimers, Martin Steinebach:
A Novel Attack Model for Collusion Secure Fingerprinting Codes. Media Watermarking, Security, and Forensics 2016: 1-11 - 2015
- [c96]Hongliang Cai, Huajian Liu, Martin Steinebach, Xiaojing Wang:
A ROI-based self-embedding method with high recovery capability. ICASSP 2015: 1722-1726 - [c95]Hongliang Cai, Huajian Liu, Qizhao Yuan, Martin Steinebach, Xiaojing Wang:
A novel image secret sharing scheme with meaningful shares. ICASSP 2015: 1767-1771 - [c94]Marcel Schäfer, Sebastian Mair, Waldemar Berchtold, Martin Steinebach:
Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models. IH&MMSec 2015: 109-114 - 2014
- [j7]Christian Winter, Martin Steinebach, York Yannikos:
Fast indexing strategies for robust image hashes. Digit. Investig. 11(Supplement 1): S27-S35 (2014) - [j6]Oren Halvani, Martin Steinebach:
Autorschaftsanalyse - die Illusion der Anonymität. Wirtschaftsinformatik Manag. 6(5): 33-43 (2014) - [c93]Oren Halvani, Martin Steinebach:
An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning. ARES 2014: 571-578 - [c92]Martin Steinebach, Huajian Liu, York Yannikos:
Efficient Cropping-Resistant Robust Image Hashing. ARES 2014: 579-585 - [c91]Oren Halvani, Martin Steinebach:
VEBAV - A Simple, Scalable and Fast Authorship Verification Scheme. CLEF (Working Notes) 2014: 1049-1062 - [c90]Hongliang Cai, Huajian Liu, Martin Steinebach, Xiaojing Wang:
A new method for image reconstruction using self-embedding. ICASSP 2014: 7430-7434 - [c89]York Yannikos, Lukas Graner, Martin Steinebach, Christian Winter:
Data Corpora for Digital Forensics Education and Research. IFIP Int. Conf. Digital Forensics 2014: 309-325 - [c88]Waldemar Berchtold, Marcel Schäfer, Michael Rettig, Martin Steinebach:
Robust hashing for 3D models. Media Watermarking, Security, and Forensics 2014: 90280R - [c87]Huajian Liu, Waldemar Berchtold, Marcel Schäfer, Patrick Lieb, Martin Steinebach:
Watermarking textures in video games. Media Watermarking, Security, and Forensics 2014: 90280G - [c86]Oren Halvani, Martin Steinebach, Svenja Neitzel:
Lässt sich der Schreibstil verfälschen um die eigene Anonymität in Textdokumenten zu schützen? Sicherheit 2014: 229-241 - 2013
- [c85]Oren Halvani, Martin Steinebach, Ralf Zimmermann:
Authorship Verification via k-Nearest Neighbor Estimation Notebook for PAN at CLEF 2013. CLEF (Working Notes) 2013 - [c84]Huajian Liu, Yiyao Li, Martin Steinebach:
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion. Communications and Multimedia Security 2013: 95-104 - [c83]Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf:
Robust Hash Algorithms for Text. Communications and Multimedia Security 2013: 135-144 - [c82]Martin Steinebach, Huajian Liu, York Yannikos:
FaceHash: Face Detection and Robust Hashing. ICDF2C 2013: 102-115 - [c81]Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, Martin Steinebach:
Towards a Process Model for Hash Functions in Digital Forensics. ICDF2C 2013: 170-186 - [c80]York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi:
Hash-Based File Content Identification Using Distributed Systems. IFIP Int. Conf. Digital Forensics 2013: 119-134 - [c79]York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter:
Automating Video File Carving and Content Identification. IFIP Int. Conf. Digital Forensics 2013: 195-212 - [c78]Waldemar Berchtold, Marcel Schäfer, Martin Steinebach:
Leakage detection and tracing for databases. IH&MMSec 2013: 29-34 - [c77]Oren Halvani, Martin Steinebach, Patrick Wolf, Ralf Zimmermann:
Natural language watermarking for german texts. IH&MMSec 2013: 193-202 - [c76]Waldemar Berchtold, Marcel Schäfer, Huajian Liu, Fábio Touceira Takahashi, André Schmitz, Sascha Zmudzinski, Martin Steinebach, Jonas Wieneke:
Video game watermarking. Media Watermarking, Security, and Forensics 2013: 866506 - [c75]Daniel Trick, Waldemar Berchtold, Marcel Schäfer, Martin Steinebach:
3D watermarking in the context of video games. MMSP 2013: 418-423 - 2012
- [j5]Sascha Zmudzinski, Martin Steinebach, Moazzam Butt:
Watermark Embedding Using Audio Fingerprinting. Trans. Data Hiding Multim. Secur. 8: 63-79 (2012) - [c74]Martin Steinebach, Huajian Liu, York Yannikos:
ForBild: efficient robust image hashing. Media Watermarking, Security, and Forensics 2012: 83030O - [c73]Martin Steinebach, Sascha Zmudzinski, Dirk Petrautzki:
Forensic audio watermark detection. Media Watermarking, Security, and Forensics 2012: 83030G - [c72]Sascha Zmudzinski, Badar Munir, Martin Steinebach:
Digital audio authentication by robust feature embedding. Media Watermarking, Security, and Forensics 2012: 83030I - [c71]Andreas Poller, Martin Steinebach, Huajian Liu:
Robust image obfuscation for privacy protection in Web 2.0 applications. Media Watermarking, Security, and Forensics 2012: 830304 - [c70]Huajian Liu, Martin Steinebach:
Improved Fourier domain patchwork and template embedding using spatial masking. Media Watermarking, Security, and Forensics 2012: 830305 - [c69]Marcel Schäfer, Waldemar Berchtold, Martin Steinebach:
Ranking search for probabilistic fingerprinting codes. Media Watermarking, Security, and Forensics 2012: 830306 - [c68]Patrick Wolf, Martin Steinebach:
FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette. Sicherheit 2012: 175-185 - 2011
- [c67]Marcel Schäfer, Waldemar Berchtold, Martin Steinebach:
Fast and adaptive tracing strategies for 3-secure fingerprint watermarking codes. Digital Rights Management Workshop 2011: 41-50 - [c66]Martin Steinebach:
Robust Hashing for Efficient Forensic Analysis of Image Sets. ICDF2C 2011: 180-187 - [c65]Waldemar Berchtold, Sascha Zmudzinski, Marcel Schäfer, Martin Steinebach:
Collusion-secure patchwork embedding for transaction watermarking. Media Forensics and Security 2011: 78800V - [c64]Martin Steinebach, Sascha Zmudzinski, Stefan Nürnberger:
Re-synchronizing audio watermarking after non-linear time stretching. Media Forensics and Security 2011: 78800I - [c63]Christoph Zauner, Martin Steinebach, Eckehard Hermann:
Rihamark: perceptual image hash benchmarking. Media Forensics and Security 2011: 78800X - 2010
- [c62]Ulrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski:
Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. Communications and Multimedia Security 2010: 75-80 - [c61]Stefan Thiemert, Martin Steinebach:
SIFT features in semi-fragile video watermarks. Media Forensics and Security 2010: 75410B - [c60]Sascha Zmudzinski, Martin Steinebach, Stefan Katzenbeisser, Ulrich Rührmair:
Audio watermarking forensics: detecting malicious re-embedding. Media Forensics and Security 2010: 75410G - [c59]Marcel Schäfer, Waldemar Berchtold, Sascha Zmudzinski, Martin Steinebach:
Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search. MM&Sec 2010: 169-174 - [c58]Marcel Schäfer, Waldemar Berchtold, Martin Steinebach, Sascha Zmudzinski, Margareta Heilmann, Stefan Katzenbeisser:
Collusion-Secure Fingerprint Watermarking for Real World Applications. Sicherheit 2010: 129-140 - [p1]Stefan Katzenbeisser, Huajian Liu, Martin Steinebach:
Challenges and Solutions in Multimedia Document Authentication. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 155-175
2000 – 2009
- 2009
- [c57]Martin Steinebach, Mohamed El Ouariachi, Huajian Liu, Stefan Katzenbeisser:
On the Reliability of Cell Phone Camera Fingerprint Recognition. ICDF2C 2009: 69-76 - [c56]Sascha Zmudzinski, Martin Steinebach:
Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain. Information Hiding 2009: 146-160 - [c55]Stefan Thiemert, Martin Steinebach, Huajian Liu:
Digital watermarking for digital cinema. Media Forensics and Security 2009: 72540V - [c54]Sascha Zmudzinski, Martin Steinebach:
Perception-based authentication watermarking for digital audio data. Media Forensics and Security 2009: 725414 - [c53]Stefan Thiemert, Stefan Nürnberger, Martin Steinebach, Sascha Zmudzinski:
Security of robust audio hashes. WIFS 2009: 126-130 - 2008
- [c52]Michael Gulbis, Erika Müller, Martin Steinebach:
Content-Based Authentication Watermarking with Improved Audio Content Feature Extraction. IIH-MSP 2008: 620-623 - [c51]Sascha Zmudzinski, Martin Steinebach:
Psycho-acoustic model-based message authentication coding for audio data. MM&Sec 2008: 75-84 - [c50]Martin Steinebach, Christoph Moebius, Huajian Liu:
Bildforensische Verfahren zur Unterstützung von Wasserzeichendetektion. Sicherheit 2008: 205-217 - [c49]Sascha Zmudzinski, Martin Steinebach:
Content-based Message Authentication Coding for Audio Data. Sicherheit 2008: 233-247 - [c48]Martin Steinebach, Sascha Zmudzinski:
Evaluation of robustness and transparency of multiple audio watermark embedding. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190Z - [c47]Patrick Wolf, Enrico Hauer, Martin Steinebach:
The video watermarking container: efficient real-time transaction watermarking. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190K - [c46]Sascha Zmudzinski, Martin Steinebach:
Robust audio hashing for audio authentication watermarking. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190L - [r2]Martin Steinebach, Jana Dittmann, Erich J. Neuhold:
Digital Watermarking. Encyclopedia of Multimedia 2008: 181-186 - 2007
- [j4]Patrick Wolf, Martin Steinebach, Konstantin Diener:
Complementing DRM with digital watermarking: mark, search, retrieve. Online Inf. Rev. 31(1): 10-21 (2007) - [c45]Michael Gulbis, Erika Müller, Martin Steinebach:
Combining Multilevel Manipulation Estimation with Content-Based Authentication Watermarking. IIH-MSP 2007: 461-464 - [c44]Stefan Thiemert, Huajian Liu, Martin Steinebach, Lucilla Croce Ferri:
Joint forensics and watermarking approach for video authentication. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050Q - [c43]Enrico Hauer, Torsten Bölke, Martin Steinebach:
Framework for combined video frame synchronization and watermark detection. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051F - [c42]Sascha Zmudzinski, Martin Steinebach:
Robust message authentication code algorithm for digital audio recordings. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650508 - [c41]Martin Steinebach, Sascha Zmudzinski:
Blind audio watermark synchronization by passive audio fingerprinting. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650509 - 2006
- [c40]Huajian Liu, Martin Steinebach:
Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability. AXMEDIS 2006: 143-152 - [c39]Konstantin Diener, Patrick Wolf, Martin Steinebach, Hans-Peter Wiedling:
Suche nach Urheberrechtsverletzungen in Internet-Tauschbörsen mittels digitaler Wasserzeichen. GI Jahrestagung (1) 2006: 34-41 - [c38]Huajian Liu, Martin Steinebach:
Digital Watermarking for Image Authentication with Localization. ICIP 2006: 1973-1976 - [c37]Michael Gulbis, Erika Müller, Martin Steinebach:
Audio Integrity Protection and Falsification Estimation by Embedding Multiple Watermarks. IIH-MSP 2006: 469-472 - [c36]Stefan Thiemert, Martin Steinebach, Patrick Wolf:
A digital watermark for vector-based fonts. MM&Sec 2006: 120-123 - [c35]Martin Steinebach, Sascha Zmudzinski:
Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting. Sicherheit 2006: 143-154 - [c34]Martin Steinebach, Sascha Zmudzinski, Sergey Neichtadt:
Robust-audio-hash Synchronized Audio Watermarking. WOSIS 2006: 58-66 - [c33]Martin Steinebach, Sascha Zmudzinski:
Countermeasure for collusion attacks against digital watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720D - [c32]Stefan Thiemert, Hichem Sahbi, Martin Steinebach:
Using entropy for image and video authentication watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607218 - [c31]Enrico Hauer, Martin Steinebach:
Temporal synchronization of marked MPEG video frames based on image hash system. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607219 - [r1]Martin Steinebach, Jana Dittmann, Erich J. Neuhold:
Digital Watermarking. Encyclopedia of Multimedia 2006 - 2005
- [c30]Martin Steinebach, Jana Dittmann:
Secure Production of Digital Media. From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments 2005: 79-86 - [c29]Enrico Hauer, Jana Dittmann, Martin Steinebach:
Digital Signatures Based on Invertible Watermarks for Video Authentication. Communications and Multimedia Security 2005: 277-279 - [c28]Huajian Liu, Lucilla Croce Ferri, Martin Steinebach:
Semantically Extended Digital Watermarking Model for Multimedia Content. Communications and Multimedia Security 2005: 282-283 - [c27]Sascha Zmudzinski, Martin Steinebach:
Vertrauenswürdigkeit von Audiodaten - Digitale Wasserzeichen und Verifikation der semantischen Integrität. Sicherheit 2005: 65-76 - [c26]Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser:
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Sicherheit 2005: 189-192 - [c25]Stefan Thiemert, Hichem Sahbi, Martin Steinebach:
Applying interest operators in semi-fragile video watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2005: 353-362 - [c24]Enrico Hauer, Martin Steinebach:
Robust digital watermark solution for intercoded frames of MPEG video data. Security, Steganography, and Watermarking of Multimedia Contents 2005: 381-390 - [c23]Martin Steinebach, Sascha Zmudzinski, Torsten Bölke:
Audio watermarking and partial encryption. Security, Steganography, and Watermarking of Multimedia Contents 2005: 779-788 - 2004
- [b1]Martin Steinebach:
Digitale Wasserzeichen für Audiodaten. Darmstadt University of Technology, 2004, ISBN 3-8322-2507-2, pp. 1-154 - [c22]Stefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach:
A High-Capacity Block Based Video Watermark. EUROMICRO 2004: 457-460 - [c21]Martin Steinebach, Sascha Zmudzinski, Fan Chen:
The digital watermarking container: secure and efficient embedding. MM&Sec 2004: 199-205 - [c20]Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski:
Advanced audio watermarking benchmarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 224-235 - [c19]Yuewei Dai, Stefan Thiemert, Martin Steinebach:
Feature-based watermarking scheme for MPEG-I/II video authentication. Security, Steganography, and Watermarking of Multimedia Contents 2004: 325-335 - 2003
- [j3]Martin Steinebach, Jana Dittmann:
Watermarking-Based Digital Audio Data Authentication. EURASIP J. Adv. Signal Process. 2003(10): 1001-1015 (2003) - [c18]Martin Steinebach, Enrico Hauer, Jana Dittmann:
Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 395-398 - [c17]Andreas Lang, Jana Dittmann, Martin Steinebach:
Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 399-410 - [c16]Christian Neubauer, Martin Steinebach, Frank Siebenhaar, Joerg Pickel:
Robustness evaluation of transactional audio watermarking systems. Security and Watermarking of Multimedia Contents 2003: 12-20 - [c15]Martin Steinebach, Jana Dittmann:
Capacity-optimized mp2 audio watermarking. Security and Watermarking of Multimedia Contents 2003: 44-54 - 2002
- [j2]Jana Dittmann, Martin Steinebach, Petra Wohlmacher, Ralf Ackermann:
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources. EURASIP J. Adv. Signal Process. 2002(2): 174-184 (2002) - [c14]Martin Steinebach, Jana Dittmann, Eva Saar:
Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. Communications and Multimedia Security 2002: 197-212 - [c13]Martin Steinebach, Andreas Lang, Jana Dittmann, Christian Neubauer:
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. ITCC 2002: 100-105 - [c12]Martin Steinebach, Andreas Lang, Jana Dittmann:
StirMark Benchmark: audio watermarking attacks based on lossy compression. Security and Watermarking of Multimedia Contents 2002: 79-90 - [c11]Jana Dittmann, Martin Steinebach, Lucilla Croce Ferri:
Watermarking protocols for authentication and ownership protection based on timestamps and holograms. Security and Watermarking of Multimedia Contents 2002: 240-251 - 2001
- [c10]Martin Steinebach, Jana Dittmann, Christian Seibel, Lucilla Croce Ferri, Fabien A. P. Petitcolas, Nazim Fatès, Caroline Fontaine, Frédéric Raynal:
StirMark Benchmark: Audio Watermarking Attacks. ITCC 2001: 49-54 - [c9]Jana Dittmann, Martin Steinebach:
PlataJanus: an audio annotation watermarking framework. MM&Sec 2001: 44-47 - [c8]Jana Dittmann, Martin Steinebach:
Joint watermarking of audio-visual data. MMSP 2001: 601-606 - [c7]Jana Dittmann, Anirban Mukherjee, Martin Steinebach:
Computer-aided visual model for ensuring video watermarking transparency. Security and Watermarking of Multimedia Contents 2001: 45-54 - [c6]Fabien A. P. Petitcolas, Martin Steinebach, Frédéric Raynal, Jana Dittmann, Caroline Fontaine, Nazim Fatès:
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark. Security and Watermarking of Multimedia Contents 2001: 575-584 - [c5]Jana Dittmann, Martin Steinebach, Ralf Steinmetz:
Merkmale digitaler Audiodaten zur Verwendung in inhaltsfragilen digitalen Wasserzeichen. VIS 2001: 193-207 - [c4]Artur Dappa, Jana Dittmann, Martin Steinebach, Claus Vielhauer:
Eine Sicherheitsarchitektur auf Basis digitaler Wasserzeichen und kryptographischer Ansätze. VIS 2001: 209-224 - [e1]Ralf Steinmetz, Jana Dittmann, Martin Steinebach:
Communications and Multimedia Security Issues of the New Century, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany. IFIP Conference Proceedings 192, Kluwer 2001, ISBN 0-7923-7365-0 [contents] - 2000
- [j1]Jana Dittmann, Martin Steinebach:
Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen. Datenschutz und Datensicherheit 24(10) (2000) - [c3]Jana Dittmann, Anirban Mukherjee, Martin Steinebach:
Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication. ITCC 2000: 62-67 - [c2]Jana Dittmann, Martin Steinebach, Thomas Kunkelmann, Ludwig Stoffels:
H204M - watermarking for media: classification, quality evaluation, design improvements. ACM Multimedia Workshops 2000: 107-110 - [c1]Jana Dittmann, Martin Steinebach, Ivica Rimac, Stephan Fischer, Ralf Steinmetz:
Combined video and audio watermarking: embedding content information in multimedia data. Security and Watermarking of Multimedia Contents 2000: 455-464
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-04 03:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint