Search Results - "Dittmann, Jana"
-
1
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection
Published in Sensors (Basel, Switzerland) (20-04-2022)“…Academic research in media forensics mainly focuses on methods for the detection of the traces or artefacts left by media manipulations in media objects. While…”
Get full text
Journal Article -
2
A Survey on Synthetic Biometrics: Fingerprint, Face, Iris and Vascular Patterns
Published in IEEE access (2023)“…Synthetic biometric samples are created with an ultimate goal of getting around privacy concerns, mitigating biases in biometric datasets, and reducing the…”
Get full text
Journal Article -
3
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features
Published in Journal of imaging (01-07-2021)“…DeepFake detection is a novel task for media forensics and is currently receiving a lot of research attention due to the threat these targeted video…”
Get full text
Journal Article -
4
Privacy-Friendly Datasets of Synthetic Fingerprints for Evaluation of Biometric Algorithms
Published in Applied sciences (01-09-2023)“…The datasets of synthetic biometric samples are created having in mind two major objectives: bypassing privacy concerns and compensating for missing sample…”
Get full text
Journal Article -
5
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection
Published in Journal of imaging (01-02-2024)“…In recent discussions in the European Parliament, the need for regulations for so-called high-risk artificial intelligence (AI) systems was identified, which…”
Get full text
Journal Article -
6
Potential advantages and limitations of using information fusion in media forensics—a discussion on the example of detecting face morphing attacks
Published in EURASIP Journal on Information Security (29-07-2021)“…Information fusion, i.e., the combination of expert systems, has a huge potential to improve the accuracy of pattern recognition systems. During the last…”
Get full text
Journal Article -
7
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines
Published in EURASIP Journal on Information Security (21-02-2020)“…A feature of search engines is prediction and suggestion to complete or extend input query phrases, i.e. search suggestion functions (SSF). Given the immediate…”
Get full text
Journal Article -
8
Digitale Vertrauenskulturen
Published in MedienPädagogik (11-08-2017)“…Wie sich die Transformation moderner Gesellschaften in den nächsten Jahren fortsetzt, hängt ganz zentral von der Entwicklung, Implementierung und sozialen…”
Get full text
Journal Article -
9
Watermarking-Based Digital Audio Data Authentication
Published in EURASIP journal on advances in signal processing (08-09-2003)“…Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication,…”
Get full text
Journal Article -
10
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
Published in Progress in solid state chemistry (2011)“…The IT security of automotive systems is an evolving area of research. To analyse the current situation and the potentially growing tendency of arising threats…”
Get full text
Journal Article -
11
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection
Published in IEEE transactions on information forensics and security (01-04-2015)“…In this paper, we address the problem of assessing the overall quality of forgery detection approaches for artificial sweat printed latent fingerprints placed…”
Get full text
Journal Article -
12
Watermarking-Based Digital Audio Data Authentication
Published in EURASIP journal on advances in signal processing (08-09-2003)“…: Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication,…”
Get full text
Journal Article -
13
A Survey On Synthetic Biometrics
Published in IEEE access (28-02-2023)“…Synthetic biometric samples are created with an ultimate goal of getting around privacy concerns, mitigating biases in biometric datasets, and reducing the…”
Get full text
Journal Article -
14
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation
Published in IEEE transactions on information forensics and security (01-10-2017)“…The creation of publicly available image databases for the signal processing community is a very time-consuming, yet immensely valuable task, enabling…”
Get full text
Journal Article -
15
Defending Informational Sovereignty by Detecting Deepfakes?
Published in Weizenbaum journal of the digital society (01-09-2023)“…This paper investigates possible contributions that an AI-based detector for deepfakes could make to the challenge of responding to new forms of cyberthreats,…”
Get full text
Journal Article -
16
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources
Published in EURASIP journal on advances in signal processing (14-02-2002)“…: Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor…”
Get full text
Journal Article -
17
On non-invasive 2D and 3D Chromatic White Light image sensors for age determination of latent fingerprints
Published in Forensic science international (10-10-2012)“…Abstract The feasibility of 2D-intensity and 3D-topography images from a non-invasive Chromatic White Light (CWL) sensor for the age determination of latent…”
Get full text
Journal Article -
18
-
19
Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments
Published in 2017 International Carnahan Conference on Security Technology (ICCST) (01-10-2017)“…The term Internet of Things might be regarded as simultaneous occurrence of three important trends. First, the general change from isolated devices to…”
Get full text
Conference Proceeding -
20