Author of the publication

Design und Evaluierung von Steganographie für Voice-over-IP.

, , , and . Sicherheit, volume P-77 of LNI, page 131-142. GI, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen, , and . Informatik-Spektrum, 28 (6): 453--461 (2005/12//)Virtual Communities: Trust, Identity, Participation, and Technology, , and . Computational Visualistics, Media Informatics, and Virtual Communities, volume 11 of Bildwissenschaft, Deutscher Universitätsverlag, Wiesbaden, (2003)Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video., and . Verläßliche IT-Systeme, Vieweg+Teubner Verlag, (1997)Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities., , , and . MM&Sec, page 185-194. ACM, (2008)Introduction to multimedia and security: protecting the media of the future - securing the future of the media., , and . MM&Sec, page 1-2. ACM, (2001)ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties., , , and . IH&MMSec, page 91-96. ACM, (2015)Design and evaluation of security multimedia warnings for children's smartphones., , , , and . Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems, volume 8304 of SPIE Proceedings, page 83040B. SPIE, (2012)Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario., , , , and . MM&Sec, page 93-102. ACM, (2011)Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles., , , and . MM&Sec, page 33-40. ACM, (2011)FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology., , , and . Intelligent Robots and Computer Vision: Algorithms and Techniques, volume 7878 of SPIE Proceedings, page 78780D. SPIE, (2011)