Main Logo Multimedia and Securtiy
 UNI | FIN | ITI English
M E N Ü

Publikationen

  • Kun Qian, Maik Schott, Wenju Zheng, Jana Dittmann: A context-based approach of separating contactless captured high-resolution overlapped fingerprints, IET Biometrics, vol. 3, no. 2, pp. 101-112, June 2014, doi:10.1049/iet-bmt.2013.0057.
  • Kun Qian, Maik Schott, Jana Dittmann: Separation of Contactless Captured High-Resolution Overlapped Latent Fingerprints: Parameter Optimisation and Evaluation, International Workshop on Biometrics and Forensics, April 4th–5th, 2013, Lisbon, Portugal, doi:10.1109/IWBF.2013.6547316.
  • Maik Schott, Ronny Merkel and Jana Dittmann: Sequence Detection of Overlapping Latent Fingerprints Using a Short-term Aging Feature. IEEE International Workshop on Information Forensics and Security (WIFS), 2012, doi:10.1109/WIFS.2012.6412630.
  • Matthias Pocs, Maik Schott, Mario Hildebrandt: Legally compatible design of digital dactyloscopy in future surveillance scenarios, Proceedings of Optics, Photonics, and Digital Technologies for Multimedia Applications II, IS&T / SPIE Electronic Imaging Conference 8436, April 16th, 2012, Brussels, doi:10.1117/12.921352.
  • Kun Qian, Maik Schott, Werner Schöne, Mario Hildebrandt: Separation of High-Resolution Samples of Overlapping Latent Fingerprints Using Relaxation Labeling, Proceedings of Optics, Photonics, and Digital Technologies for Multimedia Applications II, IS&T / SPIE Electronic Imaging Conference 8436, April 16th, 2012, Brussels, doi:10.1117/12.922696.
  • Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann: Fingerprint Forensics Application Protocol: Semi-Automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. Proceedings of the 10th International Workshop on Digital-forensics and Watermarking, October 23th–26th, 2011, Atlantic City, NJ, USA, doi:10.1007/978-3-642-32205-1_26.
  • Kun Qian, Maik Schott, Christian Kraetzer, Matthias Hemmje: Contextualizing Security for Digital Long-term Preservation. Proceedings of the 13th ACM Workshop on Multimedia and Security (MM&Sec’11), September 29th–30th, 2011, Niagara Falls, NY, USA, doi:10.1145/2037252.2037274.
  • Kun Qian, Maik Schott, Christian Kraetzer, Matthias Hemmje, Jana Dittmann: A Security Contextualisation Framework for Digital Long-Term Preservation. Proceedings of the International Workshop on Semantic Digital Archives, (part of the 15th International Conference on Theory and Practice of Digital Libraries (TPDL)), September 29th, 2011, Berlin, Germany.
  • Maik Schott, Christian Krätzer, Kun Qian, Jana Dittmann: Kontextmodellierung und Policies für die Langzeitarchivierung. In: Peter Schartner, Jürgen Taeger (Eds.): D•A•CH Security 2011, September 20th–21th, 2011, Oldenburg, ISBN 978-3-00-034960-7.
  • Christian Kraetzer, Kun Qian, Maik Schott, Jana Dittmann: A Context Model for Microphone Forensics and its Application in Evaluations. Proceedings of Media Watermarking, Security, and Forensics XIII, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp (Eds.), IS&T / SPIE Electronic Imaging Conference 7880, January 24th–26th, 2011, San Francisco, CA, USA, doi:10.1117/12.871929.
  • Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann: Modelling Watermark Communication Protocols using the CASPER Modelling Language. Proceedings of the 12th ACM Workshop on Multimedia and Security (MM&Sec’10), September 9th–10th, 2010, Rome, Italy, ISBN 978-1-4503-0286-9, doi:10.1145/1854229.1854252.
  • Maik Schott, Christian Kraetzer, Norman Specht, Jana Dittmann, Claus Vielhauer: Ensuring Integrity and Authenticity for Images in Digital Long-Term Preservation. Proceedings of Optics, Photonics and Digital Technologies for Multimedia Applications, Conference 7723, SPIE Photonics Europe, Brussels, Belgium, April 12th–15th, 2010, doi:0.1117/12.853596.
  • Maik Schott, Christian Krätzer, Jana Dittmann, Claus Vielhauer: Extending the Clark-Wilson Security Model for Digital Long-Term Preservation Use-cases. Proceedings of Multimedia on Mobile Devices 2010, Electronic Imaging Conference 7542, IS&T/SPIE 22nd Annual Symposium, January 18th–19th, 2010, San Jose, CA, USA, doi:10.1117/12.839393.
  • Christian Kraetzer, Maik Schott, Jana Dittmann: Unweighted Fusion in Microphone Forensics using a Decision Tree and Linear Logistic Regression Models. Proceedings of the 11th ACM Workshop on Multimedia and Security, September 7–8, 2009, Princeton, NJ, USA, doi:10.1145/1597817.1597827.
  • Maik Schott, Jana Dittmann, Claus Vielhauer: AnnoWaNO: An annotation watermarking framework. In: Proceedings of the 6th International Symposium Image and Signal Processing and Analysis, September 16–18, 2009, Salzburg, Austria, ISBN 978-953-184-135-1, pp. 483–488.
  • Sascha Schimke, Maik Schott, Claus Vielhauer, Jana Dittmann: Evaluation of Fusion for Similarity Searching in Online Handwritten Documents. In: Petra Perner (Ed.): Advances in Data Mining – Applications in Medicine, Web Mining, Marketing, Image and Signal Mining, lnai 4065, Springer Verlag, Heidelberg, 2009, S. 276–290, doi:10.1007/978-3-642-03067-3_22.
  • Andrey Makrushin, Mirko Langnickel, Maik Schott, Claus Vielhauer, Jana Dittmann, Katharina Seifert: Car-Seat Occupancy Detection Using a Monocular 360° NIR Camera and Advanced Template Matching. Proceedings of the 16th International Conference on Digital Signal Processing, July 5th–7th, 2009, Santorini, Greece, ISBN 978-1-4244-3297-4, doi:10.1109/ICDSP.2009.5201199.
  • Jens Adelmeier, Maik Schott, Claus Vielhauer: Migration zur Langzeitarchivierung von elektronischen Textdokumenten. In: Patric Horster, Peter Schartner (Eds.): D•A•CH Security 2009, May 19th–20th, 2009, Bochum, Germany, ISBN 978-3-00-027488-6.
  • Claus Vielhauer, Maik Schott, Jana Dittmann: Nested Object Watermarking. Proceedings of the 21st Annual IS&T/SPIE Symposium on Electronic Imaging, January 18th–22nd, 2009, San Jose, CA, USA, doi:10.1117/12.805862.
  • Maik Schott, Jana Dittmann, Claus Vielhauer, Christian Krätzer, Andreas Lang: Integrity and Authenticity for Digital Long-Term Preservation in iRods Grid Infrastructure. In: Rüdiger Grimm, Susanne Guth (Eds.): The 6th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods incorporating The 4th International ODRL Workshop, October 16th–18th, 2008, Poznań, Poland, Poznań University of Economics Publishing House, ISBN 978-83-7417-361-2. 
  • Claus Vielhauer, Maik Schott, Christian Krätzer, Jana Dittmann: Nested Object Watermarking: Transparency and Capacity Evaluation. In: Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, January 26th–31st, 2008, San Jose, CA, USA, doi:10.1117/12.766370.
  • Claus Vielhauer, Maik Schott: Nested Object Watermarking: From the Rectangular Constraint to Polygonal and Private Annotations. In: Proceedings of the ACM Multimedia and Security Workshop 2007, Dallas, Texas, USA, doi:10.1145/1288869.1288895.
  • Claus Vielhauer, Maik Schott: Image Annotation Watermarking: Nested Object Embedding using Hypergraph Model. In: Proceedings of the 8th ACM Workshop on Multimedia and Security, 2006, Geneve, Switzerland, doi:10.1145/1161366.1161399.
  • Claus Vielhauer, Tobias Scheidat, Andreas Lang, Maik Schott, Jana Dittmann, T.K. Basu, P.K. Dutta: Multimodal Speaker Authentication  Evaluation of Recognition Performance of Watermarked References. In: Second International Workshop on Multimodal User Authentification, May 11th–12th, 2006, Toulouse, France.

 

ACM Copyright Notice: Copyright © 2006–2007 by the Association for Computing Machinery, Inc. (ACM). Permission to make digital or hard copies of portions of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page in print or the first screen in digital media. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Send written requests for republication to ACM Publications, Copyright & Permissions at the address above or fax +1 (212) 869-0481 or email permissions@acm.org.

SPIE Copyright Notice: The paper/s is/are made available as an electronic reprint (preprint) with permission of SPIE. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.

 

Impressum | Haftungsausschluss | Webmaster