Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collusion-Secure Fingerprint Watermarking for Real World Applications., , , , , and . Sicherheit, volume P-170 of LNI, page 129-140. GI, (2010)Detection and Analysis of Tor Onion Services., , , , and . ARES, page 66:1-66:10. ACM, (2019)Discovery of Single-Vendor Marketplace Operators in the Tor-Network., , and . ARES, page 76:1-76:10. ACM, (2021)Data Acquisition on a Large Darknet Marketplace., , and . ARES, page 53:1-53:6. ACM, (2022)Towards Imperceptible Natural Language Watermarking for German., , and . IH&MMSec, page 93-98. ACM, (2017)Audio watermarking and partial encryption., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 779-788. SPIE, (2005)A Close Look at Robust Hash Flip Positions.. Media Watermarking, Security, and Forensics, Society for Imaging Science and Technology, (2021)NoiseSeg: An image splicing localization fusion CNN with noise extraction and error level analysis branches., , and . Media Watermarking, Security, and Forensics, page 1-7. Society for Imaging Science and Technology, (2022)Unveiling the Potential of BERTopic for Multilingual Fake News Analysis - Use Case: Covid-19., , , and . CoRR, (2024)The digital watermarking container: secure and efficient embedding., , and . MM&Sec, page 199-205. ACM, (2004)