What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jana Dittmann
Google Scholar
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ih
Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor.
Jana Dittmann
Stefan Kiltz
Robert Altschaffel
Judith Antal
2024
conf/ih
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets.
Stefan Kiltz
Jana Dittmann
Fabian Loewe
Christian Heidecke
Max John
Jonas Mädel
Fabian Preißler
2024
conf/ih
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification.
Jana Dittmann
Christian Kraetzer
Jost Alemann
Bernhard Birnbaum
2024
conf/ih
GAN-based Minutiae-driven Fingerprint Morphing.
Meghana Rao Bangalore Narasimha Prasad
Andrey Makrushin
Matteo Ferrara
Christian Kraetzer
Jana Dittmann
2022
conf/ih
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics.
Stefan Kiltz
Robert Altschaffel
Jana Dittmann
2022
conf/ih
Covert Channels in Network Time Security.
Kevin Lamshöft
Jana Dittmann
2021
conf/ih
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset.
Kevin Lamshöft
Tom Neubert
Christian Krätzer
Claus Vielhauer
Jana Dittmann
2021
conf/ih
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations.
Andrey Makrushin
Christof Kauba
Simon Kirchgasser
Stefan Seidlitz
Christian Kraetzer
Andreas Uhl
Jana Dittmann
2021
conf/ih
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences.
Robert Altschaffel
Jonas Hielscher
Stefan Kiltz
Jana Dittmann
2021
conf/esorics
A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper).
Salatiel Ezennaya-Gomez
Claus Vielhauer
Jana Dittmann
2020
conf/ih
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection.
Mario Hildebrandt
Kevin Lamshöft
Jana Dittmann
Tom Neubert
Claus Vielhauer
2020
conf/ih
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans.
Andrey Makrushin
Dennis Siegel
Jana Dittmann
2019
conf/ih
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD.
Tom Neubert
Christian Kraetzer
Jana Dittmann
2018
conf/ih
Generalized Benford's Law for Blind Detection of Morphed Face Images.
Andrey Makrushin
Christian Kraetzer
Tom Neubert
Jana Dittmann
2017
journals/tifs
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation.
Ronny Merkel
Jana Dittmann
Claus Vielhauer
2017
conf/ih
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing.
Christian Kraetzer
Andrey Makrushin
Tom Neubert
Mario Hildebrandt
Jana Dittmann
2015
journals/tifs
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection.
Mario Hildebrandt
Jana Dittmann
2015
conf/ih
ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties.
Christian Arndt
Stefan Kiltz
Jana Dittmann
Robert Fischer
2014
conf/ih
From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection.
Mario Hildebrandt
Jana Dittmann
2013
conf/ih
First investigation of latent fingerprints long-term aging using chromatic white light sensors.
Ronny Merkel
Karen Otte
Robert Clausing
Jana Dittmann
Claus Vielhauer
Anja Bräutigam
2012
conf/esorics
Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany.
Ronny Merkel
Matthias Pocs
Jana Dittmann
Claus Vielhauer
2009
conf/ih
Microphone Classification Using Fourier Coefficients.
Robert Buchholz
Christian Krätzer
Jana Dittmann
2007
conf/ih
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification.
Christian Krätzer
Jana Dittmann
2005
conf/sec
Ensuring Media Integrity on Third-Party Infrastructures.
Jana Dittmann
Stefan Katzenbeisser
Christian Schallhart
Helmut Veith
1997
conf/acisp
Enabling Technology for the Trading of MPEG-encoded Video.
Jana Dittmann
Arnd Steinmetz
Coauthors
Andreas Uhl
(1)
Andrey Makrushin
(5)
Anja Bräutigam
(1)
Arnd Steinmetz
(1)
Bernhard Birnbaum
(1)
Christian Arndt
(1)
Christian Heidecke
(1)
Christian Kraetzer
(6)
Christian Krätzer
(3)
Christian Schallhart
(1)
Christof Kauba
(1)
Claus Vielhauer
(6)
Dennis Siegel
(1)
Fabian Loewe
(1)
Fabian Preißler
(1)
Helmut Veith
(1)
Jana Dittmann
(25)
Jonas Hielscher
(1)
Jonas Mädel
(1)
Jost Alemann
(1)
Judith Antal
(1)
Karen Otte
(1)
Kevin Lamshöft
(3)
Mario Hildebrandt
(4)
Matteo Ferrara
(1)
Matthias Pocs
(1)
Max John
(1)
Meghana Rao Bangalore Narasimha Prasad
(1)
Robert Altschaffel
(3)
Robert Buchholz
(1)
Robert Clausing
(1)
Robert Fischer
(1)
Ronny Merkel
(3)
Salatiel Ezennaya-Gomez
(1)
Simon Kirchgasser
(1)
Stefan Katzenbeisser
(1)
Stefan Kiltz
(5)
Stefan Seidlitz
(1)
Tom Neubert
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to