default search action
Christian Krätzer
Person information
- affiliation: Otto von Guericke University of Magdeburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Dennis Siegel, Christian Kraetzer, Stefan Seidlitz, Jana Dittmann:
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection. J. Imaging 10(2): 46 (2024) - [c66]Jana Dittmann, Christian Kraetzer, Jost Alemann, Bernhard Birnbaum:
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification. IH&MMSec 2024: 101-112 - [c65]Meghana Rao Bangalore Narasimha Prasad, Andrey Makrushin, Matteo Ferrara, Christian Kraetzer, Jana Dittmann:
GAN-based Minutiae-driven Fingerprint Morphing. IH&MMSec 2024: 175-186 - [c64]Jana Dittmann, Christian Krätzer, Stefan Kiltz, Robert Altschaffel, Claus Vielhauer, Steffen Wendzel, Sandro Wefel, Holger Nitsch:
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). Sicherheit 2024: 265-269 - [c63]Christian Kraetzer, Mario Hildebrandt:
Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect. VISIGRAPP (4): VISAPP 2024: 585-592 - [e3]Fernando Pérez-González, Pedro Comesaña Alfaro, Christian Krätzer, Hong Vicky Zhao:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2024, Baiona, Spain, June 24-26, 2024. ACM 2024 [contents] - 2023
- [c62]Dennis Siegel, Stefan Seidlitz, Christian Krätzer, Jana Dittmann:
Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior. Media Watermarking, Security, and Forensics 2023: 1-6 - [c61]Christian Krätzer, Dennis Siegel, Stefan Seidlitz, Jana Dittmann:
Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models. Media Watermarking, Security, and Forensics 2023: 379-1 - 2022
- [j5]Christian Kraetzer, Dennis Siegel, Stefan Seidlitz, Jana Dittmann:
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection. Sensors 22(9): 3137 (2022) - [c60]Dennis Siegel, Christian Krätzer, Stefan Seidlitz, Jana Dittmann:
Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection. Media Watermarking, Security, and Forensics 2022: 1-6 - 2021
- [j4]Christian Kraetzer, Andrey Makrushin, Jana Dittmann, Mario Hildebrandt:
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks. EURASIP J. Inf. Secur. 2021(1): 9 (2021) - [j3]Dennis Siegel, Christian Kraetzer, Stefan Seidlitz, Jana Dittmann:
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features. J. Imaging 7(7): 108 (2021) - [c59]Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann:
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. ARES 2021: 61:1-61:8 - [c58]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. ARES 2021: 67:1-67:12 - [c57]Jonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann:
A Systematic Analysis of Covert Channels in the Network Time Protocol. ARES 2021: 69:1-69:11 - [c56]Tom Neubert, Claus Vielhauer, Christian Kraetzer:
Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks. ARES 2021: 70:1-70:9 - [c55]Andrey Makrushin, Christof Kauba, Simon Kirchgasser, Stefan Seidlitz, Christian Kraetzer, Andreas Uhl, Jana Dittmann:
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations. IH&MMSec 2021: 93-104 - [c54]Kevin Lamshöft, Tom Neubert, Christian Krätzer, Claus Vielhauer, Jana Dittmann:
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset. IH&MMSec 2021: 113-124 - [c53]Mario Hildebrandt, Aamir Shakir, Alexander Ziemke, Mohamed Abdelrazek, Hannes Stuetzer, Dominik Blut, Kevin Lamshöft, Salatiel Ezennaya-Gomez, Christian Kraetzer, Jana Dittmann:
AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions. Media Watermarking, Security, and Forensics 2021 - [c52]Stefan Seidlitz, Kris Jürgens, Andrey Makrushin, Christian Kraetzer, Jana Dittmann:
Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks. VISIGRAPP (4: VISAPP) 2021: 345-352 - [i1]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. CoRR abs/2106.08654 (2021)
2010 – 2019
- 2019
- [c51]Andrey Makrushin, Christian Kraetzer, Jana Dittmann, Clemens Seibold, Anna Hilsmann, Peter Eisert:
Dempster-Shafer Theory for Fusing Face Morphing Detectors. EUSIPCO 2019: 1-5 - [c50]Tom Neubert, Christian Kraetzer, Jana Dittmann:
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD. IH&MMSec 2019: 95-100 - [c49]Clemens Seibold, Anna Hilsmann, Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann, Peter Eisert:
Visual Feature Space Analyses of Face Morphing Detectors. WIFS 2019: 1-6 - 2018
- [j2]Tom Neubert, Andrey Makrushin, Mario Hildebrandt, Christian Kraetzer, Jana Dittmann:
Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images. IET Biom. 7(4): 325-332 (2018) - [c48]Christian Kraetzer, Jana Dittmann:
Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? ARES 2018: 11:1-11:8 - [c47]Tom Neubert, Christian Kraetzer, Jana Dittmann:
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector. EUSIPCO 2018: 1002-1006 - [c46]Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann:
Generalized Benford's Law for Blind Detection of Morphed Face Images. IH&MMSec 2018: 49-54 - 2017
- [c45]Christian Kraetzer, Andrey Makrushin, Tom Neubert, Mario Hildebrandt, Jana Dittmann:
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing. IH&MMSec 2017: 21-32 - [e2]Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim:
Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10431, Springer 2017, ISBN 978-3-319-64184-3 [contents] - 2016
- [c44]Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann:
A semantic framework for a better understanding, investigation and prevention of organized financial crime. Sicherheit 2016: 55-66 - 2015
- [c43]Maik Schott, Claus Vielhauer, Christian Krätzer:
Using different encryption schemes for secure deletion while supporting queries. BTW Workshops 2015: 37-45 - [c42]Christian Kraetzer, Jana Dittmann:
Considerations on the benchmarking of media forensics. EUSIPCO 2015: 61-65 - 2014
- [c41]Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz:
A Hierarchical Model for the Description of Internet-Based Communication. IMF 2014: 85-94 - 2013
- [b1]Christian Krätzer:
Statistical pattern recognition for audio-forensics : empirical investigations on the application scenarios audio steganalysis and microphone forensics. Otto von Guericke University Magdeburg, 2013 - [c40]Andreas Hasselberg, René Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, Karl Kümmel:
Security of Features Describing the Visual Appearance of Handwriting Samples Using the Bio-hash Algorithm of Vielhauer against an Evolutionary Algorithm Attack. Communications and Multimedia Security 2013: 85-94 - [c39]Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. IMF 2013: 113-121 - [e1]Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer:
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings. Lecture Notes in Computer Science 8099, Springer 2013, ISBN 978-3-642-40778-9 [contents] - 2012
- [j1]Christian Kraetzer, Jana Dittmann:
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis. Trans. Data Hiding Multim. Secur. 8: 80-101 (2012) - [c38]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of security multimedia warnings for children's smartphones. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2012: 83040B - [c37]Christian Kraetzer, Kun Qian, Jana Dittmann:
Extending a context model for microphone forensics. Media Watermarking, Security, and Forensics 2012: 83030S - [c36]Eric Clausing, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy. MM&Sec 2012: 47-56 - [c35]Christian Arndt, Christian Kraetzer, Claus Vielhauer:
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope. MM&Sec 2012: 57-66 - [c34]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Krätzer, Jana Dittmann:
Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones. Sicherheit 2012: 211-221 - 2011
- [c33]Marcus Leich, Stefan Kiltz, Christian Krätzer, Jana Dittmann, Claus Vielhauer:
Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners. Three-Dimensional Imaging, Interaction, and Measurement 2011: 786412 - [c32]Sven Tuchscheerer, Christian Krätzer, Jana Dittmann, Tobias Hoppe:
Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation. AutomotiveUI 2011: 63-70 - [c31]Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots. Intelligent Robots and Computer Vision: Algorithms and Techniques 2011: 78780K - [c30]Sven Tuchscheerer, Tobias Hoppe, Christian Krätzer, Jana Dittmann:
FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology. Intelligent Robots and Computer Vision: Algorithms and Techniques 2011: 78780D - [c29]Tobias Scheidat, Juliane Heinze, Claus Vielhauer, Jana Dittmann, Christian Kraetzer:
Comparative review of studies on aging effects in context of biometric authentication. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2011: 788110 - [c28]Kun Qian, Maik Schott, Christian Kraetzer, Matthias L. Hemmje, Holger Brocks, Jana Dittmann:
A Security Contextualisation Framework for Digital Long-Term Preservation. SDA 2011: 131-142 - [c27]Ronny Merkel, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches. DSP 2011: 1-6 - [c26]Stefan Kiltz, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer, Christian Kraetzer:
Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics. IQSP 2011: 78670U - [c25]Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. IWDW 2011: 321-335 - [c24]Christian Kraetzer, Kun Qian, Maik Schott, Jana Dittmann:
A context model for microphone forensics and its application in evaluations. Media Forensics and Security 2011: 78800P - [c23]Ronny Merkel, Anja Bräutigam, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor. MM&Sec 2011: 41-50 - [c22]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann:
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. MM&Sec 2011: 93-102 - [c21]Kun Qian, Maik Schott, Christian Kraetzer, Matthias L. Hemmje:
Contextualizing security for digital long-term preservation. MM&Sec 2011: 115-120 - 2010
- [c20]Ronny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann:
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. Communications and Multimedia Security 2010: 93-105 - [c19]Enrico Herrmann, Andrey Makrushin, Jana Dittmann, Claus Vielhauer, Mirko Langnickel, Christian Krätzer:
Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls. Image Processing: Algorithms and Systems 2010: 75320 - [c18]Andrey Makrushin, Jana Dittmann, Claus Vielhauer, Mirko Langnickel, Christian Krätzer:
The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection. Image Processing: Algorithms and Systems 2010: 75320 - [c17]Kun Qian, Christian Krätzer, Michael Biermann, Jana Dittmann:
Audio annotation watermarking with robustness against DA/AD conversion. Media Forensics and Security 2010: 75410W - [c16]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Modelling watermark communication protocols using the CASPER modelling language. MM&Sec 2010: 107-116
2000 – 2009
- 2009
- [c15]Christian Krätzer, Jana Dittmann:
Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren. GI Jahrestagung 2009: 1604-1618 - [c14]Robert Buchholz, Christian Krätzer, Jana Dittmann:
Microphone Classification Using Fourier Coefficients. Information Hiding 2009: 235-246 - [c13]Christian Krätzer, Jana Dittmann:
The impact of information fusion in steganalysis on the example of audio steganalysis. Media Forensics and Security 2009: 725409 - [c12]Christian Kraetzer, Maik Schott, Jana Dittmann:
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models. MM&Sec 2009: 49-56 - 2008
- [c11]Christian Krätzer, Jana Dittmann:
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. MM&Sec 2008: 159-166 - [c10]Christian Kraetzer, Jana Dittmann:
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190Y - [c9]Christian Kraetzer, Jana Dittmann, Ronny Merkel:
WLAN steganography revisited. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681903 - [c8]Claus Vielhauer, Maik Schott, Christian Krätzer, Jana Dittmann:
Nested object watermarking: transparency and capacity evaluation. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681918 - 2007
- [c7]Christian Krätzer, Jana Dittmann:
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. Information Hiding 2007: 359-377 - [c6]Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang:
Digital audio forensics: a first practical evaluation on microphone and environment classification. MM&Sec 2007: 63-74 - [c5]Christian Kraetzer, Jana Dittmann:
Mel-cepstrum-based steganalysis for VoIP steganography. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650505 - 2006
- [c4]Christian Krätzer, Jana Dittmann, Thomas Vogel, Reyk Hillert:
Design and evaluation of steganography for voice-over-IP. ISCAS 2006 - [c3]Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne:
WLAN steganography: a first practical review. MM&Sec 2006: 17-22 - [c2]Thomas Vogel, Jana Dittmann, Reyk Hillert, Christian Krätzer:
Design und Evaluierung von Steganographie für Voice-over-IP. Sicherheit 2006: 131-142 - [c1]Christian Kraetzer, Jana Dittmann, Andreas Lang:
Transparency benchmarking on audio watermarks and steganography. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721L
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint