Author of the publication

Audio captcha breaking and consequences for human users.

, , and . Media Watermarking, Security, and Forensics, page 373-1. Society for Imaging Science and Technology, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing detection on tor hidden services., , and . Digit. Investig., (2021)The digital watermarking container: secure and efficient embedding., , and . MM&Sec, page 199-205. ACM, (2004)Leakage detection and tracing for databases., , and . IH&MMSec, page 29-34. ACM, (2013)exHide: Hiding Data within the exFAT File System., , and . ARES, page 77:1-77:8. ACM, (2021)Privacy and Robust Hashes., , and . ARES, page 70:1-70:8. ACM, (2019)Fraunhofer SIT@SMM4H'22: Learning to Predict Stances and Premises in Tweets related to COVID-19 Health Orders Using Generative Models., and . SMM4H@COLING, page 111-113. Association for Computational Linguistics, (2022)Suche nach Urheberrechtsverletzungen in Internet-Tauschbörsen mittels digitaler Wasserzeichen., , , and . GI Jahrestagung (1), volume P-93 of LNI, page 34-41. GI, (2006)Automatisierte Analyse Radikaler Inhalte im Internet., , and . GI-Jahrestagung, volume P-294 of LNI, page 233-245. GI, (2019)FixBit-Container: Effizienter Urheberschutz durch Wasserzeichen entlang der Medien-Wertschöpfungskette., and . Sicherheit, volume P-195 of LNI, page 175-185. GI, (2012)Robustheit digitaler Adiowasserzeichen gegen Pitch-Shifting., and . Sicherheit, volume P-77 of LNI, page 143-154. GI, (2006)