scispace - formally typeset
J

Jana Dittmann

Researcher at Otto-von-Guericke University Magdeburg

Publications -  311
Citations -  4788

Jana Dittmann is an academic researcher from Otto-von-Guericke University Magdeburg. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 32, co-authored 298 publications receiving 4426 citations. Previous affiliations of Jana Dittmann include Fraunhofer Society & Technische Universität Darmstadt.

Papers
More filters
Journal Article

Public automated web-based evaluation service for watermarking schemes: StirMark benchmark

TL;DR: This paper will present the architecture of a public automated evaluation service for still images, sound and video, and detail and justify the choice of evaluation profiles, that is the series of tests applied to different types of wa-termarking schemes.
Book ChapterDOI

Microphone Classification Using Fourier Coefficients

TL;DR: This work uses a Fourier coefficient histogram of near-silence segments of the recording as the feature vector and uses machine learning techniques for the classification, to determine the microphone model used to record a given audio sample.
Journal ArticleDOI

Combining digital watermarks and collusion secure fingerprints for digital images

TL;DR: The proposed technology for a maximal number d of pirates, puts enough information in the intersection of up to d fingerprints to uniquely identify all the pirates.
Proceedings ArticleDOI

Mel-cepstrum-based steganalysis for VoIP steganography

TL;DR: In this article, a Mel-cepstrum-based analysis known from speaker and speech recognition is used to perform a detection of embedded hidden messages in VoIP applications, which can detect information hiding in the field of hidden communication as well as for DRM applications.
Proceedings ArticleDOI

Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set

TL;DR: The overall objective of the paper is to evaluate existing audio steganography with a special focus on attacks in ad-hoc end-to-end media communications on the example of Voice over IP (VoIP) scenarios to understand operational requirements of recent steganographic techniques for VoIP applications.