BibTeX records: Andreas Westfeld

download as .bib file

@inproceedings{DBLP:conf/sicherheit/Westfeld14,
  author       = {Andreas Westfeld},
  editor       = {Stefan Katzenbeisser and
                  Volkmar Lotz and
                  Edgar R. Weippl},
  title        = {Angriffe auf eine Spreizspektrummethode f{\"{u}}r Audio-Steganographie},
  booktitle    = {Sicherheit 2014: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 7. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.V. (GI), 19.-21. M{\"{a}}rz
                  2014, Wien, {\"{O}}sterreich},
  series       = {{LNI}},
  volume       = {{P-228}},
  pages        = {217--227},
  publisher    = {{GI}},
  year         = {2014},
  url          = {https://dl.gi.de/handle/20.500.12116/20044},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/WestfeldWFP13,
  author       = {Andreas Westfeld and
                  J{\"{u}}rgen Wurzer and
                  Christian Fabian and
                  Ernst Piller},
  editor       = {Bart De Decker and
                  Jana Dittmann and
                  Christian Kraetzer and
                  Claus Vielhauer},
  title        = {Pit Stop for an Audio Steganography Algorithm},
  booktitle    = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2013, Magdeburg, Germany, September
                  25-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8099},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40779-6\_10},
  doi          = {10.1007/978-3-642-40779-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/WestfeldWFP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/GoljanW09,
  author       = {Miroslav Goljan and
                  Andreas Westfeld},
  title        = {Secure Steganography in Multimedia Content},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2009},
  year         = {2009},
  url          = {https://doi.org/10.1155/2009/257131},
  doi          = {10.1155/2009/257131},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/GoljanW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld09,
  author       = {Andreas Westfeld},
  editor       = {Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Fast Determination of Sensitivity in the Presence of Countermeasures
                  in {BOWS-2}},
  booktitle    = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt,
                  Germany, June 8-10, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5806},
  pages        = {89--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04431-1\_7},
  doi          = {10.1007/978-3-642-04431-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BasW09,
  author       = {Patrick Bas and
                  Andreas Westfeld},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Two key estimation techniques for the broken arrows watermarking scheme},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597819},
  doi          = {10.1145/1597817.1597819},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BasW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Generic Adoption of Spatial Steganalysis to Transformed Domain},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_12},
  doi          = {10.1007/978-3-540-88961-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A regression-based restoration technique for automated watermark removal},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {215--220},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411364},
  doi          = {10.1145/1411328.1411364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Steganalyse von JPEG-Dateien},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {219--232},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21478},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld08a,
  author       = {Andreas Westfeld},
  editor       = {Ammar Alkassar and
                  J{\"{o}}rg H. Siekmann},
  title        = {Von Bogensch{\"{u}}tzen und digitalen Wasserzeichen},
  booktitle    = {Sicherheit 2008: Sicherheit, Schutz und Zuverl{\"{a}}ssigkeit.
                  Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der
                  Gesellschaft f{\"{u}}r Informatik e.V. (GI), 2.-4. April 2008
                  im Saarbr{\"{u}}cker Schloss},
  series       = {{LNI}},
  volume       = {{P-128}},
  pages        = {595--599},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21516},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/Westfeld07,
  author       = {Andreas Westfeld},
  title        = {A Workbench for the {BOWS} Contest},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2007},
  year         = {2007},
  url          = {https://doi.org/10.1155/2007/64521},
  doi          = {10.1155/2007/64521},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/Westfeld07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeeWL07,
  author       = {Kwangsoo Lee and
                  Andreas Westfeld and
                  Sangjin Lee},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Generalised Category Attack - Improving Histogram-Based Attack on
                  {JPEG} {LSB} Embedding},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {378--391},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_25},
  doi          = {10.1007/978-3-540-77370-2\_25},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeeWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/UllerichW07,
  author       = {Christian Ullerich and
                  Andreas Westfeld},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Weaknesses of {MB2}},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_11},
  doi          = {10.1007/978-3-540-92238-4\_11},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/UllerichW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/Westfeld07,
  author       = {Andreas Westfeld},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Tackling {BOWS} with the sensitivity attack},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents IX,
                  San Jose, CA, USA, January 28, 2007},
  series       = {{SPIE} Proceedings},
  volume       = {6505},
  pages        = {65051A},
  publisher    = {{SPIE}},
  year         = {2007},
  url          = {https://doi.org/10.1117/12.704706},
  doi          = {10.1117/12.704706},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/Westfeld07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {Steganography for Radio Amateurs - {A} {DSSS} Based Approach for Slow
                  Scan Television},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_14},
  doi          = {10.1007/978-3-540-74124-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Steganalysis in the Presence of Weak Cryptography and Encoding},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_3},
  doi          = {10.1007/11922841\_3},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LeeWL06,
  author       = {Kwangsoo Lee and
                  Andreas Westfeld and
                  Sangjin Lee},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Category Attack for {LSB} Steganalysis of {JPEG} Images},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_4},
  doi          = {10.1007/11922841\_4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LeeWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Lessons from the {BOWS} contest},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {208--213},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161403},
  doi          = {10.1145/1161366.1161403},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Jana Dittmann},
  title        = {Steganographie f{\"{u}}r den Amateurfunk},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {119--130},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24764},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/BohmeW05,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  title        = {Feature-based encoder classification of compressed audio streams},
  journal      = {Multim. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {108--120},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00530-005-0195-2},
  doi          = {10.1007/S00530-005-0195-2},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mms/BohmeW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/Westfeld05,
  author       = {Andreas Westfeld},
  editor       = {Hannes Federrath},
  title        = {Nutzung der Nachbarkorrelation f{\"{u}}r Steganalyse mit erh{\"{o}}hter
                  Zuverl{\"{a}}ssigkeit},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {53--64},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28400},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/Westfeld05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/Westfeld05,
  author       = {Andreas Westfeld},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Space filling curves in steganalysis},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents VII,
                  San Jose, California, USA, January 17-20, 2005, Proceedings},
  series       = {Proceedings of {SPIE}},
  volume       = {5681},
  pages        = {28--37},
  publisher    = {{SPIE}},
  year         = {2005},
  url          = {https://doi.org/10.1117/12.587280},
  doi          = {10.1117/12.587280},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/Westfeld05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BohmeW04,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Breaking Cauchy Model-Based {JPEG} Steganography with First Order
                  Statistics},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_8},
  doi          = {10.1007/978-3-540-30108-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BohmeW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BohmeW04,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  editor       = {Jessica J. Fridrich},
  title        = {Exploiting Preserved Statistics for Steganalysis},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_7},
  doi          = {10.1007/978-3-540-30114-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BohmeW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BohmeW04,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Statistical characterisation of {MP3} encoders for steganalysis},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022437},
  doi          = {10.1145/1022431.1022437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BohmeW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld02,
  author       = {Andreas Westfeld},
  editor       = {Fabien A. P. Petitcolas},
  title        = {Detecting Low Embedding Rates},
  booktitle    = {Information Hiding, 5th International Workshop, {IH} 2002, Noordwijkerhout,
                  The Netherlands, October 7-9, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2578},
  pages        = {324--339},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36415-3\_21},
  doi          = {10.1007/3-540-36415-3\_21},
  timestamp    = {Sun, 02 Oct 2022 16:07:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Westfeld01,
  author       = {Andreas Westfeld},
  editor       = {Ira S. Moskowitz},
  title        = {{F5-A} Steganographic Algorithm},
  booktitle    = {Information Hiding, 4th International Workshop, {IHW} 2001, Pittsburgh,
                  PA, USA, April 25-27, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2137},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45496-9\_21},
  doi          = {10.1007/3-540-45496-9\_21},
  timestamp    = {Wed, 16 Mar 2022 23:55:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Westfeld01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/LehmannW01,
  author       = {Sebastian Lehmann and
                  Andreas Westfeld},
  editor       = {Dirk Fox and
                  Marit K{\"{o}}hntopp and
                  Andreas Pfitzmann},
  title        = {Kapselung ausf{\"{u}}hrbarer Bin{\"{a}}rdateien slcaps:
                  Implementierung von Capabilitys f{\"{u}}r Linux},
  booktitle    = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen,
                  Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel},
  pages        = {19--35},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-663-05918-9\_2},
  doi          = {10.1007/978-3-663-05918-9\_2},
  timestamp    = {Thu, 17 Nov 2022 13:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/LehmannW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/Westfeld01,
  author       = {Andreas Westfeld},
  editor       = {Dirk Fox and
                  Marit K{\"{o}}hntopp and
                  Andreas Pfitzmann},
  title        = {{F5} - ein steganographischer Algorithmus Hohe Kapazit{\"{a}}t
                  trotz verbesserter Angriffe},
  booktitle    = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen,
                  Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel},
  pages        = {241--255},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-663-05918-9\_17},
  doi          = {10.1007/978-3-663-05918-9\_17},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vis/Westfeld01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Westfeld00,
  author       = {Andreas Westfeld},
  title        = {Prinzipien sicherer Steganographie},
  school       = {Dresden University of Technology, Germany},
  year         = {2000},
  url          = {https://d-nb.info/960393439},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Westfeld00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ife/PfitzmannSWWWZ99,
  author       = {Andreas Pfitzmann and
                  Alexander Schill and
                  Andreas Westfeld and
                  Guntram Wicke and
                  Gritta Wolf and
                  Jan Z{\"{o}}llner},
  title        = {{SSONET:} Systemunterst{\"{u}}tzung f{\"{u}}r mehrseitige
                  Sicherheit in offenen Datennetzen},
  journal      = {Inform. Forsch. Entwickl.},
  volume       = {14},
  number       = {2},
  pages        = {95--108},
  year         = {1999},
  url          = {https://doi.org/10.1007/s004500050129},
  doi          = {10.1007/S004500050129},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ife/PfitzmannSWWWZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WestfeldP99,
  author       = {Andreas Westfeld and
                  Andreas Pfitzmann},
  editor       = {Andreas Pfitzmann},
  title        = {Attacks on Steganographic Systems},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_5},
  doi          = {10.1007/10719724\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WestfeldP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/PfitzmannSWWWZ99,
  author       = {Andreas Pfitzmann and
                  Alexander Schill and
                  Andreas Westfeld and
                  Guntram Wicke and
                  Gritta Wolf and
                  Jan Z{\"{o}}llner},
  editor       = {Ralf Steinmetz},
  title        = {Flexible mehrseitige Sicherheit f{\"{u}}r verteilte Anwendungen},
  booktitle    = {Kommunikation in Verteilten Systemen, ITG/GI-Fachtagung, Darmstadt,
                  2.-5. M{\"{a}}rz 1999},
  series       = {Informatik Aktuell},
  pages        = {132--143},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-642-60111-8\_13},
  doi          = {10.1007/978-3-642-60111-8\_13},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kivs/PfitzmannSWWWZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/PfitzmannSWWWZ98,
  author       = {Andreas Pfitzmann and
                  Alexander Schill and
                  Andreas Westfeld and
                  Guntram Wicke and
                  Gritta Wolf and
                  Jan Z{\"{o}}llner},
  editor       = {Winfried Lamersdorf and
                  Michael Merz},
  title        = {A Java-Based Distributed Platform for Multilateral Security},
  booktitle    = {Trends in Distributed Systems for Electronic Commerce, International
                  {IFIP/GI} Working Conference, TREC'98, Hamburg, Germany, June 3-5,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1402},
  pages        = {52--64},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053401},
  doi          = {10.1007/BFB0053401},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/PfitzmannSWWWZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WestfeldW98,
  author       = {Andreas Westfeld and
                  Gritta Wolf},
  editor       = {David Aucsmith},
  title        = {Steganography in a Video Conferencing System},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_3},
  doi          = {10.1007/3-540-49380-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WestfeldW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZollnerFKPPWWW98,
  author       = {Jan Z{\"{o}}llner and
                  Hannes Federrath and
                  Herbert Klimant and
                  Andreas Pfitzmann and
                  Rudi Piotraschke and
                  Andreas Westfeld and
                  Guntram Wicke and
                  Gritta Wolf},
  editor       = {David Aucsmith},
  title        = {Modeling the Security of Steganographic Systems},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {344--354},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_24},
  doi          = {10.1007/3-540-49380-8\_24},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ZollnerFKPPWWW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/vi/97/0002FPWWW97,
  author       = {Jan Z{\"{o}}llner and
                  Hannes Federrath and
                  Andreas Pfitzmann and
                  Andreas Westfeld and
                  Guntram Wicke and
                  Gritta Wolf},
  editor       = {G{\"{u}}nter M{\"{u}}ller and
                  Kai Rannenberg and
                  Manfred Reitenspie{\ss} and
                  Helmut Stiegler},
  title        = {{\"{U}}ber die Modellierung steganographischer Systeme},
  booktitle    = {Verl{\"{a}}{\ss}liche IT-Systeme - Zwischen Key Escrow und elektronischem
                  Geld},
  series       = {DuD-Fachbeitr{\"{a}}ge},
  pages        = {211--223},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {1997},
  url          = {https://doi.org/10.1007/978-3-322-86842-8\_15},
  doi          = {10.1007/978-3-322-86842-8\_15},
  timestamp    = {Fri, 15 May 2020 14:07:09 +0200},
  biburl       = {https://dblp.org/rec/books/vi/97/0002FPWWW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics