Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elke Franz is active.

Publication


Featured researches published by Elke Franz.


information hiding | 1996

Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best

Elke Franz; Anja Jerichow; Steffen Möller; Andreas Pfitzmann; Ingo Stierand

In the future, messages, e.g. speech, text or pictures, will be transmitted digitally since this is cheaper, more perfect and more flexible. It is possible to hide messages, which are of necessity much shorter, nearly unrecognizable for outsiders in such digitized messages. In this article we describe how computer based steganography works and give a summary on the results of our implementation.


acm workshop on multimedia and security | 2004

Adaptive steganography based on dithering

Elke Franz; Antje Schneidewind

This paper investigates possibilities to develop adaptive steganographic algorithms in general and especially for images as possible cover data. We exploit dithering as a means to gain image information that can be used by adaptive steganographic algorithms. First, we point out general possibilities for using this process for steganography and discuss advantages and drawbacks. Since the original dither criteria is not sufficient for steganography, we modify it and develop further algorithms. Considerable tests confirm the improvements of the extensions. Finally, we point out possibilities for further research.


privacy enhancing technologies | 2005

Towards privacy-aware elearning

Katrin Borcea; Hilko Donker; Elke Franz; Andreas Pfitzmann; Hagen Wahrig

Acting in the digital world, such as browsing the Internet, always causes generation of data. However, the average user is not aware that his actions leave traces which might cause privacy risks. Within this paper, we discuss the need for privacy-enhancing application design considering eLearning as example. eLearning is an application area that comprises many use cases which are common in the digital world. Since an eLearning application aims at assisting users, they cannot act in full anonymity. We discuss a possible solution which uses privacy-enhancing identity management (PIM) in order to provide as much anonymity as possible while still enabling assistance.


information hiding | 1999

Steganography Secure against Cover-Stego-Attacks

Elke Franz; Andreas Pfitzmann

Steganography aims to secretly transmit messages by embedding them in cover data. The usual criterion each stegosystem must meet is to resist stego-only-attacks. An even stronger criterion is to resist cover-stego-attacks. The article introduces a stego paradigm which aims to meet this stronger requirement by simulating a “usual process” of data processing. The general realization of the paradigm is discussed. One possible realization is sketched.


digital identity management | 2005

Usable presentation of secure pseudonyms

Katrin Borcea-Pfitzmann; Elke Franz; Andreas Pfitzmann

Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we point out that conflicting requirements on privacy and usability cannot be sufficiently considered by a single type of representation of pseudonyms. Hence, a PIM system should generate digital pseudonyms which are used for communication, while users assign local mnemonics to these pseudonyms in order to simplify their use. We discuss possible solutions for the support of mnemonics and, thereby, propose some improvements to privacy-enhancing identity management tools.


information hiding | 2005

Pre-processing for adding noise steganography

Elke Franz; Antje Schneidewind

This paper introduces and discusses an idea for utilizing noise introduced by scanning for steganography. In contrast to known approaches, we suggest a pre-processing step in order to reduce noise before embedding. This step shall enable us to embed by adding a noise signal without increasing local variances. The paper describes characteristic features of noise and possibilities to measure and consider them. Furthermore, we introduce a method to generate a noise signal that adheres to our simplified description. For embedding this signal, we consider the use of existing methods. Practical test results confirm the suitability of our approach, even if one must be aware of general limitations.


Lecture Notes in Computer Science | 1998

A Payment Scheme for Mixes Providing Anonymity

Elke Franz; Anja Jerichow; Guntram Wicke

Mixes allow the users of electronic data networks to communicate with each other without identifying themselves or uncovering their relationship. Several security applications suggest the usage of mixes. However, such concepts are often not commercially used in practice. One reason may be that providers are only willing to offer anonymous communication if their payment is arranged.


computer aided modeling and design of communication links and networks | 2013

Physical layer security vs. network layer secrecy: Who wins on the untrusted two-way relay channel?

Johannes Richter; Elke Franz; Sabrina Engelmann; Stefan Pfennig; Eduard A. Jorswieck

We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.


Digital privacy | 2011

Collaborative E-learning

Katja Liesebach; Elke Franz; Anne-Katrin Stange; Andreas Juschka; Katrin Borcea-Pfitzmann; Alexander Böttcher; Hagen Wahrig

In the following chapter a short overview about the collaborative eLearning application prototype BluES’n is given. Starting by emphasising its need and potentials for PRIME, the integrated and realised privacy-enhancing components and functionalities are described. A summarising section points out lessons learnt when integrating PRIME into the application.


advanced visual interfaces | 2006

Privacy-aware user interfaces within collaborative environments

Elke Franz; Katja Liesebach; Katrin Borcea-Pfitzmann

The main focus of this paper is to discuss the representation of contextual information in advanced user interfaces supporting privacy awareness. Thereby, we especially consider collaborative environments which potentially provide information about users to everybody acting in the system. Users can apply Privacy-Enhancing Identity Management (PIM) in order to control which information they disclose to whom in which situation. However, since PIM must be done additionally to the actual tasks within the application, it is questionable whether users will reasonably utilize it. Therefore, a privacy-aware user interface is an important prerequisite for the broad acceptance and adequate use of PIM. We discuss which contextual information should be represented in a collaborative environment and suggest a possible representation of the selected information.

Collaboration


Dive into the Elke Franz's collaboration.

Top Co-Authors

Avatar

Stefan Pfennig

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andreas Pfitzmann

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Anja Jerichow

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Eduard A. Jorswieck

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Hagen Wahrig

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Katrin Borcea-Pfitzmann

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Ilsche

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wolfgang E. Nagel

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Christian Scheunert

Dresden University of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Springer

Dresden University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge