Andreas Westfeld
Andreas Westfeld
HTW Dresden
Bestätigte E-Mail-Adresse bei htw-dresden.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
F5—a steganographic algorithm
A Westfeld
International workshop on information hiding, 289-302, 2001
1759*2001
Attacks on steganographic systems
A Westfeld, A Pfitzmann
International workshop on information hiding, 61-76, 1999
16601999
F5—a steganographic algorithm
A Westfeld
Information hiding, 289-302, 2001
13442001
Anonymity, unobservability, and pseudonymity—a proposal for terminology
A Pfitzmann, M Köhntopp
Designing privacy enhancing technologies, 1-9, 2001
11382001
Modeling the security of steganographic systems
J Zöllner, H Federrath, H Klimant, A Pfitzmann, R Piotraschke, A Westfeld, ...
International Workshop on Information Hiding, 344-354, 1998
3261998
Detecting low embedding rates
A Westfeld
International Workshop on Information Hiding, 324-339, 2002
2732002
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
2642005
Exploiting preserved statistics for steganalysis
R Böhme, A Westfeld
International Workshop on Information Hiding, 82-96, 2004
1942004
Breaking Cauchy model-based JPEG steganography with first order statistics
R Böhme, A Westfeld
European Symposium on Research in Computer Security, 125-140, 2004
1122004
Steganography in a video conferencing system
A Westfeld, G Wolf
International Workshop on Information Hiding, 32-47, 1998
761998
Statistical characterisation of MP3 encoders for steganalysis
R Böhme, A Westfeld
Proceedings of the 2004 workshop on Multimedia and security, 25-34, 2004
512004
Generalised category attack—improving histogram-based attack on JPEG LSB embedding
K Lee, A Westfeld, S Lee
International Workshop on Information Hiding, 378-391, 2007
412007
Category attack for LSB steganalysis of JPEG images
K Lee, A Westfeld, S Lee
International Workshop on Digital Watermarking, 35-48, 2006
352006
Weaknesses of MB2
C Ullerich, A Westfeld
International Workshop on Digital Watermarking, 127-142, 2007
292007
Two key estimation techniques for the broken arrows watermarking scheme
P Bas, A Westfeld
Proceedings of the 11th ACM workshop on Multimedia and security, 1-8, 2009
262009
Generic Adoption of Spatial Steganalysis to Transformed Domain.
A Westfeld
Information Hiding 5284, 161-177, 2008
212008
Space filling curves in steganalysis
A Westfeld
Security, Steganography, and Watermarking of Multimedia Contents VII 5681, 28-37, 2005
202005
Lessons from the BOWS contest
A Westfeld
Proceedings of the 8th Workshop on Multimedia and Security, 208-213, 2006
192006
A regression-based restoration technique for automated watermark removal
A Westfeld
Proceedings of the 10th ACM workshop on Multimedia and security, 215-220, 2008
182008
A Java-based distributed platform for multilateral security
A Pfitzmann, A Schill, A Westfeld, G Wicke, G Wolf, J Zöllner
Trends in Distributed Systems for Electronic Commerce, 52-64, 1998
171998
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20