Author of the publication

Mel-cepstrum-based steganalysis for VoIP steganography.

, and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650505. SPIE, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mel-cepstrum-based steganalysis for VoIP steganography., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650505. SPIE, (2007)A semantic framework for a better understanding, investigation and prevention of organized financial crime., , , , , and . Sicherheit, volume P-256 of LNI, page 55-66. GI, (2016)Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190Y. SPIE, (2008)Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector., , and . EUSIPCO, page 1002-1006. IEEE, (2018)Generalized Benford's Law for Blind Detection of Morphed Face Images., , , and . IH&MMSec, page 49-54. ACM, (2018)Considerations on the benchmarking of media forensics., and . EUSIPCO, page 61-65. IEEE, (2015)WLAN steganography revisited., , and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 681903. SPIE, (2008)Extending a context model for microphone forensics., , and . Media Watermarking, Security, and Forensics, volume 8303 of SPIE Proceedings, page 83030S. SPIE, (2012)Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack., , , , , and . Communications and Multimedia Security, volume 8099 of Lecture Notes in Computer Science, page 85-94. Springer, (2013)A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD., , and . IH&MMSec, page 95-100. ACM, (2019)