OvGU-Logo

This page is an expression of: https://omen.cs.uni-magdeburg.de/fz/contenido48/cms/front_content.php?lang=2&idart=93&idcat=75


Research Groups:


Biometrics & HCI Group

  • Biometric Algorithms and Combination with other Techniques
  • Algorithms for Biometrics and Crime Scene Forensics
  • Design of Applications of Biometrics for Citizens: e.g. Automotive Scenarios, HCI and Cognitive Systems such as Handwriting, Face and Speech Interaction
Protocol Group
  • Digital and Digitized Forensics: Design of new Methods for Computer, Network and Media Forensics
  • Protocols and Guidelines for Forensic Investigations
  • Combining Cryptography - Media Security – Forensics
Security Evaluation Group
  • Security in Applications: Security in Automotive and its Risk Management
  • Security Scans and Evaluations: Network and Operation System Security
Watermarking and Steganography Group
  • Classification of Algorithms (Applications, Parameters)
  • Algorithm Design and Evaluation: Copyright, Brand Protection, Manipulation recognition, Information Hiding, Steganography, Steganoanalysis, Forensics
  • New Business Models and Design Patterns

 

Selected research topic: IT-Security within the automotive domain

As part of the research activity concerning the automotive environment at the Otto-von-Guericke university Automotive OvG the »Multimedia and Security« research group »evaluation« is examining sections of the IT-system that is part of todays cars and the automotive infrastructure in general.

Scientific papers on IT-Security within the automotive domain

Selected research topic: Media-, Network- and Computer-Forensics

Within the framework of the research on protocols relevant to IT-security, the »protocol group« also focusses on forensic analyses besides working on steganographic and cryptographic protocols.
This forensic research covers all three subsets of IT-Forensics (Media-, Network- and Computer-Forensics). IT-Forensics, which has been given a high priority, will be looked at in a wholistic approach covering the entire forensic process. This includes the derivation and evalutation of measures to be taken in all of the three stages of the forensic process (preemptive, runtime and post-mortem measures).

As a result of the actual research in the field of Media-Forensics a first Microphone and Environment classification could be presented on ACM MM&Security Workshop 2007:

Furthermore a behaviour based framework for the classification of specific Trojan Horses was developed as a necessary step in the context of forensic evaluations.


ACM Copyright Notice: Copyright 2005/2006 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM, Inc., fax +1 (212) 869-0481, or permissions{at}acm.org