Follow
Pascal Schöttle
Pascal Schöttle
Associate Professor, Department Digital Business & Software Engineering, MCI Innsbruck, Austria
Verified email at mci.edu - Homepage
Title
Cited by
Cited by
Year
Where to hide the bits?
B Johnson, P Schöttle, R Böhme
International Conference on Decision and Game Theory for Security, 1-17, 2012
772012
A game-theoretic approach to content-adaptive steganography
P Schöttle, R Böhme
International Workshop on Information Hiding, 125-141, 2012
472012
Game theory and adaptive steganography
P Schöttle, R Böhme
IEEE Transactions on Information Forensics and Security 11 (4), 760-773, 2015
462015
Machine unlearning: Linear filtration for logit-based classifiers
T Baumhauer, P Schöttle, M Zeppelzauer
Machine Learning, 1-24, 2022
412022
Weighted stego-image steganalysis for naive content-adaptive embedding
P Schöttle, S Korff, R Böhme
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
252012
Detecting adversarial examples-a lesson from multimedia security
P Schöttle, A Schlögl, C Pasquini, R Böhme
2018 26th European Signal Processing Conference (EUSIPCO), 947-951, 2018
172018
Secure team composition to thwart insider threats and cyber-espionage
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
ACM Transactions on Internet Technology (TOIT) 14 (2-3), 1-22, 2014
152014
Forensics of high quality and nearly identical jpeg image recompression
C Pasquini, P Schöttle, R Böhme, G Boato, F Perez-Gonzalez
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
142016
Mixing coins of different quality: A game-theoretic approach
S Abramova, P Schöttle, R Böhme
International Conference on Financial Cryptography and Data Security, 280-297, 2017
122017
A game-theoretic analysis of content-adaptive steganography with independent embedding
P Schöttle, A Laszka, B Johnson, J Grossklags, R Böhme
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
112013
Managing the weakest link
A Laszka, B Johnson, P Schöttle, J Grossklags, R Böhme
European Symposium on Research in Computer Security, 273-290, 2013
102013
Forensics of high-quality JPEG images with color subsampling
M Carnein, P Schöttle, R Böhme
2015 IEEE International Workshop on Information Forensics and Security (WIFS …, 2015
92015
Thinking beyond the block: block matching for copy-move forgery detection revisited
M Kirchner, P Schoettle, C Riess
Media Watermarking, Security, and Forensics 2015 9409, 11-22, 2015
92015
On the application of anomaly detection in reliable server pooling systems for improved robustness against denial of service attacks
P Schottle, T Dreibholz, EP Rathgeb
2008 33rd IEEE Conference on Local Computer Networks (LCN), 207-214, 2008
92008
Predictable rain? Steganalysis of public-key steganography using wet paper codes
M Carnein, P Schöttle, R Böhme
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
72014
Bitspotting: Detecting optimal adaptive steganography
B Johnson, P Schöttle, A Laszka, J Grossklags, R Böhme
International Workshop on Digital Watermarking, 3-18, 2013
72013
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the
T Dilger, C Ploder, W Haas, P Schöttle, R Bernsteiner
Proceedings of the 21st Annual Conference on Information Technology …, 2020
62020
Detecting adversarial examples-a lesson from multimedia forensics
P Schöttle, A Schlögl, C Pasquini, R Böhme
arXiv preprint arXiv:1803.03613, 2018
62018
Decoy password vaults: at least as hard as steganography?
C Pasquini, P Schöttle, R Böhme
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
62017
Telltale watermarks for counting JPEG compressions
M Carnein, P Schöttle, R Böhme
Electronic Imaging 2016 (8), 1-10, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20