Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio watermarking and partial encryption., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 779-788. SPIE, (2005)Towards Imperceptible Natural Language Watermarking for German., , and . IH&MMSec, page 93-98. ACM, (2017)Discovery of Single-Vendor Marketplace Operators in the Tor-Network., , and . ARES, page 76:1-76:10. ACM, (2021)Data Acquisition on a Large Darknet Marketplace., , and . ARES, page 53:1-53:6. ACM, (2022)NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches., , and . Media Watermarking, Security, and Forensics, page 1-7. Society for Imaging Science and Technology, (2022)A Close Look at Robust Hash Flip Positions.. Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)Collusion-Secure Fingerprint Watermarking for Real World Applications., , , , , and . Sicherheit, volume P-170 of LNI, page 129-140. GI, (2010)Detection and Analysis of Tor Onion Services., , , , and . ARES, page 66:1-66:10. ACM, (2019)The digital watermarking container: secure and efficient embedding., , and . MM&Sec, page 199-205. ACM, (2004)Leakage detection and tracing for databases., , and . IH&MMSec, page 29-34. ACM, (2013)