Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio watermarking and partial encryption., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 779-788. SPIE, (2005)Towards Imperceptible Natural Language Watermarking for German., , and . IH&MMSec, page 93-98. ACM, (2017)Discovery of Single-Vendor Marketplace Operators in the Tor-Network., , and . ARES, page 76:1-76:10. ACM, (2021)Data Acquisition on a Large Darknet Marketplace., , and . ARES, page 53:1-53:6. ACM, (2022)A Close Look at Robust Hash Flip Positions.. Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches., , and . Media Watermarking, Security, and Forensics, page 1-7. Society for Imaging Science and Technology, (2022)Collusion-Secure Fingerprint Watermarking for Real World Applications., , , , , and . Sicherheit, volume P-170 of LNI, page 129-140. GI, (2010)Detection and Analysis of Tor Onion Services., , , , and . ARES, page 66:1-66:10. ACM, (2019)Unveiling the Potential of BERTopic for Multilingual Fake News Analysis - Use Case: Covid-19., , , and . CoRR, (2024)Privacy and Robust Hashes., , and . ARES, page 70:1-70:8. ACM, (2019)