Pascal Schöttle
Pascal Schöttle
Associate Professor, Department Digital Business & Software Engineering, MCI Innsbruck, Austria
Verifierad e-postadress på mci.edu - Startsida
Titel
Citeras av
Citeras av
År
A game-theoretic approach to content-adaptive steganography
P Schöttle, R Böhme
International Workshop on Information Hiding, 125-141, 2012
462012
Game theory and adaptive steganography
P Schöttle, R Böhme
IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015
402015
Weighted stego-image steganalysis for naive content-adaptive embedding
P Schöttle, S Korff, R Böhme
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Machine unlearning: Linear filtration for logit-based classifiers
T Baumhauer, P Schöttle, M Zeppelzauer
arXiv preprint arXiv:2002.02730, 2020
212020
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
International Conference on Decision and Game Theory for Security, 1-17, 2012
212012
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
142014
Forensics of high quality and nearly identical jpeg image recompression
C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
122016
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
122013
Detecting adversarial examples-a lesson from multimedia security
P Schöttle, A Schlögl, C Pasquini, R Böhme
2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018
102018
Mixing coins of different quality: A game-theoretic approach
S Abramova, P Schöttle, R Böhme
International Conference on Financial Cryptography and Data Security, 280-297, 2017
102017
Managing the weakest link
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
European Symposium on Research in Computer Security, 273-290, 2013
102013
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks
P Schottle, T Dreibholz, EP Rathgeb
2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008
92008
Forensics of high-quality JPEG images with color subsampling
M Carnein, P Schöttle, R Böhme
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
82015
Thinking beyond the block: block matching for copy-move forgery detection revisited
M Kirchner, P Schoettle, C Riess
Media Watermarking, Security, and Forensics 2015 9409, 940903, 2015
82015
Predictable rain? Steganalysis of public-key steganography using wet paper codes
M Carnein, P Schöttle, R Böhme
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
72014
Decoy Password Vaults: At Least as Hard as Steganography?
C Pasquini, P Schöttle, R Böhme
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
62017
Telltale watermarks for counting JPEG compressions
M Carnein, P Schöttle, R Böhme
Electronic Imaging 2016 (8), 1-10, 2016
62016
Bitspotting: Detecting optimal adaptive steganography
B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme
International Workshop on Digital Watermarking, 3-18, 2013
62013
Detecting adversarial examples-a lesson from multimedia forensics
P Schöttle, A Schlögl, C Pasquini, R Böhme
arXiv preprint arXiv:1803.03613, 2018
42018
Die totale Transparenz: Facebook, Cookies, RFID etc.
P Schöttle, R Böhme
Ethische Herausforderungen im Web 2.0, 11-32, 2014
32014
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20