TUD Logo

TUD Home » ... » Privacy and Data Security » Staff » Dr. Rainer Böhme

Privacy and Data Security

against racism

Dr.-Ing. Rainer Böhme M.A.

Rainer Böhme (Photo: C. Mathea)

Research Interests

Economics of privacy and information security
Steganography and steganalysis
Multimedia forensics
Privacy-enhancing technologies

Curriculum Vitae

1998–2003 Studies of Communication Science, Economics, and Computer Science at TU Dresden and Université Paris XII, France
2003–2005
2007–2009
Scientific staff member at the Chair for Privacy and Security
2005–2007 Member of staff of the European Central Bank, Directorate General Economics, Frankfurt/Main
2008 Doctoral degree from TU Dresden's Faculty of Computer Science
2009–2010 Post-doctoral fellow at the International Computer Science Institute Berkeley, CA, USA
Sep 2010 Assistant Professor at the Department of Information Systems of the University of Münster, Germany

This website is no longer maintained. Please continue to my new homepage at the University of Münster.

Publications

Steganography, steganalysis and digital forensics

  • Advanced Statistical Steganalysis, Springer-Verlag, Berlin Heidelberg, 2010. [Publisher]
  • Information Hiding. 12th International Conference, IH 2010, Calgary, Canada, June 28–30, 2010. Revised Selected Papers, with P. W. Fong and R. Safavi-Naini (eds.), LNCS 6387, Springer-Verlag, Berlin Heidelberg, 2010.
  • The ‘Dresden Image Database’ for Benchmarking Digital Image Forensics, with T. Gloe, Proc. of ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 2010, vol. 2, 1585–1592. [Publisher]
  • Multimedia Forensics Is Not Computer Forensics, with F. C. Freiling, T. Gloe and M. Kirchner, in Z. Geradts et al. (eds.): International Workshop on Computational Forensics (IWCF 2009), LNCS 5718, Springer-Verlag, Berlin Heidelberg, 2009, 90–103. [PDF] [Publisher]
  • An Epistemological Approach to Steganography, in S. Katzenbeisser and A.-R. Sadeghi (eds.): Information Hiding, LNCS 5806, Springer-Verlag, Berlin Heidelberg, 2009, 15–30. [PDF] [Publisher]
  • Synthesis of Color Filter Array Pattern in Digital Images, with M. Kirchner, in E. J. Delp et al. (eds.): Media Forensics and Security XI (Proc. of SPIE 7254), San Jose, CA, 18–22 January 2009. [PDF] [Publisher]
  • Hiding Traces of Resampling in Digital Images, with M. Kirchner, IEEE Trans. on Information Forensics and Security 3 (4), 582–592, 2008. [IEEExplore]
  • Improved Statistical Steganalysis using Models of Heterogeneous Cover Signals, PhD thesis, Technische Universität Dresden, 2008.
  • Weighted Stego-Image Steganalysis for JPEG Covers, in K. Solanki et al. (eds.): Information Hiding, LNCS 5284, Springer-Verlag, Berlin Heidelberg, 2008, 178–194. [PDF] [Publisher]
  • Revisiting Weighted Stego-Image Steganalysis, with A. D. Ker, in E. J. Delp et al. (eds.): Security, Forensics, Steganography, and Watermarking of Multimedia Contents X X (Proc. of SPIE 6819), San Jose, CA, 27–31 January 2008. [PDF]
  • On the Security of "A Steganographic Scheme for Secure Communications Based on the Chaos and the Euler Theorem", with C. Keiler, IEEE Trans. on Multimedia 9 (6), 1325–1329, 2007. [IEEExplore]
  • Can We Trust Digital Image Forensics?, with T. Gloe, M. Kirchner and A. Winkler, in Proc. of ACM Multimedia, Augsburg, Germany, September 2007, 79–86. [Publisher]
  • Tamper Hiding: Defeating Image Forensics, with M. Kirchner, in T. Furon et al. (eds.): Information Hiding, LNCS 4567, Springer-Verlag, Berlin Heidelberg, 2007, 326–341. [Publisher]
  • A Two-Factor Error Model for Quantitative Steganalysis, with A. D. Ker, in E. J. Delp and P. W. Wong (eds.): Security, Steganography and Watermarking of Multimedia Contents VIII (Proc. of SPIE 6072), San Jose, CA, 16–19 January 2006, 59–74. [PDF]
  • Assessment of Steganalytic Methods Using Multiple Regression Models, in M. Barni et al. (eds.): Information Hiding, LNCS 3727, Springer-Verlag, Berlin Heidelberg, 2005, 278–295. [PDF] [Publisher]
  • Feature-based Encoder Classification of Compressed Audio Streams, with A. Westfeld, Multimedia Systems Journal 11 (2), 108–120, 2005. [Publisher]
  • Statistical Characterisation of MP3 Encoders for Steganalysis, with A. Westfeld, Proc. of the ACM Multimedia and Security Workshop, Magdeburg, Germany, September 2004, 25–34. [Publisher]
  • Exploiting Preserved Statistics for Steganalysis, with A. Westfeld, in J. Fridrich (ed.): Information Hiding, LNCS 3200, Springer-Verlag, Berlin Heidelberg, 2004, 82–96. [Publisher]
  • Breaking Cauchy Model-based JPEG Steganography with First Order Statistics, with A. Westfeld, in P. Samarati et al. (eds.): Computer Security (ESORICS 2004), LNCS 3193, Springer-Verlag, Berlin Heidelberg, 2004, 125–140. [PDF] [Publisher]

    In German

  • Multimedia-Forensik als Teildisziplin der digitalen Forensik [Multimedia Forensics as Subdiscipline of Digital Forensics], with F. C. Freiling, T. Gloe and M. Kirchner, in S. Fischer et al. (eds.): Informatik 2009 – Im Fokus das Leben, LNI 154, Gesellschaft für Informatik, Bonn, 2009, 1537–1551. [PDF] [Workshop]

Economics of privacy and information security

  • Towards Insurable Network Architectures, it - Information Technology 52 (5), 2010.
  • Optimal Information Security Investment with Penetration Testing, with M. Féleghyázi, Decision and Game Theory for Security (GameSec), Berlin, Germany, 2010. To appear in LNCS.
  • Modeling Cyber-Insurance: Towards a Unifying Framework, with G. Schwartz, Workshop on the Economics of Information Security (WEIS 2010), Harvard University, 7–8 June. [PDF]
  • The Role of Soft Information in Trust Building: Evidence from Online Social Lending, with S. Pötzsch, in A. Acquisti, S.W. Smith, and A.–R. Sadeghi (eds.): Proc. of International Conference on Trust and Trustworthy Computing (TRUST), LNCS 6101, Springer-Verlag, Berlin Heidelberg, 2010, 381–395. [PDF] [Publisher]
  • The Iterated Weakest Link, with T. Moore, IEEE Security & Privacy 9 (1), 53–55, 2010. [Publisher]
  • Privacy in Online Social Lending, with S. Pötzsch, Proc. of AAAI Spring Symposium on Intelligent Information Privacy Management, Stanford University, Palo Alto, CA, 23–25 March 2010. [PDF]
  • Valuating Privacy with Option Pricing Theory, with S. Berthold, Workshop on the Economics of Information Security (WEIS 2009), University College London, 24–25 June. [PDF] [PDF slides]
  • The Iterated Weakest Link – A Model of Adaptive Security Investment, with T. Moore, Workshop on the Economics of Information Security (WEIS 2009), University College London, 24–25 June. [PDF]
  • Security Economics and European Policy, with R. Anderson, R. Clayton and T. Moore, Workshop on the Economics of Information Security (WEIS 2008), Tuck School of Business, Dartmouth College, Hanover, NH, in M. E. Johnson (ed.): Managing Information Risk and the Economics of Security, Springer, New York, 2009, 55–80, and in N. Pohlmann et al. (eds.): ISSE 2008 - Securing Electronic Business Processes, Vieweg+Teubner, Wiesbaden, 2009, 57–76. [PDF]
  • Conformity or Diversity: Social Implications of Transparency in Personal Data Processing, Proc. of Workshop on the Economics of Information Security (WEIS 2008), Tuck School of Business, Dartmouth College, Hanover, NH, in M. E. Johnson (ed.): Managing Information Risk and the Economics of Security, Springer, New York, 2009, 291–312. [PDF]
  • Security Economics and The Internal Market, with R. Anderson, R. Clayton and T. Moore. Study commissioned by the European Network and Information Security Agency (ENISA), 2008. [PDF]
  • Economic Security Metrics, with T. Nowey, in I. Eusgeld et al. (eds.): Dependability Metrics, LNCS 4909, Springer-Verlag, Berlin Heidelberg, 2008, 176–187. [PDF] [Publisher]
  • On the Viability of Privacy-Enhancing Technologies in a Self-regulated Business-to-consumer Market: Will Privacy Remain a Luxury Good?, with S. Koble, Proc. of Workshop on the Economics of Information Security (WEIS), Carnegie Mellon University, Pittsburgh, PA, 7–8 June 2007. [PDF]
  • Pricing Strategies in Electronic Marketplaces with Privacy-Enhancing Technologies, with S. Koble, Wirtschaftsinformatik 49 (1), 16–25, 2007. [Publisher]
  • Models and Measures for Correlation in Cyber-Insurance, with G. Kataria, Proc. of Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK, 26–28 June 2006, and DIMACS Workshop on Information Security Economics, Rutgers University, NJ, 18–19 January 2007. [PDF]
  • The Effect of Stock Spam on Financial Markets, with T. Holz, Proc. of Workshop on the Economics of Information Security (WEIS), University of Cambridge, UK, 26–28 June 2006. [SSRN]
  • A Closer Look at Attack Clustering, with G. Kataria, Proc. of Workshop on the Economics of Securing the Information Infrastructure (WESII), Washington DC, 23–24 October 2006. [PDF]
  • On the Limits of Cyber-Insurance, with G. Kataria, in S. Fischer-Huebner et al. (eds.): Trust, Privacy and Security in Digital Business (sub-conference of DEXA 2006), Krakow, Poland, 5–8 September 2006, LNCS 4083, Springer-Verlag, Berlin Heidelberg, 31–40. [Publisher]
  • A Comparison of Market Approaches to Software Vulnerability Disclosure, in G. Müller (ed.): Proc. of ETRICS, Freiburg, 5–9 June 2006, LNCS 3995, Springer-Verlag, Berlin Heidelberg, 2006, 298–311. Received "Best Paper Award". [PDF] [Publisher]
  • Vulnerability Markets. What is the Economic Value of a Zero-Day Exploit?, Private Investigations (Proc. of 22nd Chaos Communication Congress), Berlin, 27–30 December 2005. [PDF]
  • Cyber-Insurance Revisited, Proc. of Workshop on the Economics of Information Security (WEIS), Kennedy School of Government, Harvard University, 2–3 June 2005. [PDF]
  • Economics of Identity Management – A Supply-side Perspective, with S. Koble, in G. Danezis und D. Martin (eds.): Privacy Enhancing Technologies (PET 2005), LNCS 3856, Springer-Verlag, Berlin Heidelberg, 2006, 259–272. [Publisher]

    In German

  • Social Lending aus der Perspektive des Datenschutzes [Privacy in Online Social Lending], with S. Pötzsch, accepted for ISSE/SICHERHEIT 2010, Berlin, Germany, 5–7 October.
  • IT-Risiken im Schadenversicherungsmodell: Implikationen der Marktstruktur [An Indemnity Insurance Model for IT Risks: Implications of Market Structure], in H. Federrath (ed.): SICHERHEIT 2005, LNI 62, Köllen Verlag, Bonn, 27–40. [PDF]

Privacy-enhancing technologies

  • Privacy-enhanced Event Scheduling, with B. Kellermann, IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2009), Vancouver, Canada, 29–31 August 2009. [PDF]
  • Data Retention and Anonymity Services – Introducing a New Class of Realistic Adversary Models, with S. Berthold and S. Köpsell, in V. Matyas et al. (eds.): The Future of Identity in the Information Socienty, Volume 298 of IFIP Advances in Information and Communication Technology, Springer-Verlag, Boston, 2009, 92–106. Received "Best Paper Award". [Publisher] [PDF]
  • Mix Cascades versus Peer-to-Peer: Is One Concept Superior?, with C. Diaz, G. Danezis, S. Köpsell and A. Pfitzmann, in D. Martin and A. Serjantov (eds.): Privacy Enhancing Technologies (PET 2004), LNCS 3424, Springer-Verlag, Berlin Heidelberg, 2005, 243–255. [PDF] [Publisher]

    In German

  • Digital Rights Management zum Schutz personenbezogener Daten? [Digital Rights Management for Personal Data Protection?], with A. Pfitzmann, Datenschutz und Datensicherheit 32 (5), 342–347, 2008. [Publisher]
  • Datenspuren beim Forschungskontakt: Wie die Vorratsdatenspeicherung empirische Sozialforschung verändern könnte [Data Traces of Research Contacts: How Data Retention Might Change Empirical Social Sciences], with A. Pfitzmann, Forschung & Lehre 14 (10), 610–611, 2007. [PDF]

Other topics

  • Trained to Accept? A Field Experiment on Consent Dialogs, with S. Köpsell, Proc. of Conference on Human Factors in Computing Systems (ACM CHI), Atlanta, GA, April 2010, 2403–2406. [PDF] [Publisher]
  • On Metrics and Measurements, with F. C. Freiling, in I. Eusgeld et al. (eds.): Dependability Metrics, LNCS 4909, Springer-Verlag, Berlin Heidelberg, 2008, 7–13. [Publisher]
  • Validation of Predictions with Measurements, with R. Reussner, in I. Eusgeld et al. (eds.): Dependability Metrics, LNCS 4909, Springer-Verlag, Berlin Heidelberg, 2008, 14–18. [Publisher]
  • Effekte von Informationsstand, Wissen und Einstellungsstärke von Befragten auf die Antwortstabilität in Online-Befragungen mit Selbstrekrutierung [Effects of Respondents' Level of Information, Knowledge, and Attitude Strength on Response Stability in Self-selected Online Surveys], with M. Kühne, ZUMA-Nachrichten 59, 42–71, 2006. [PDF]
  • The Effect of Motivating Elements in Online Surveys, in German Online Research (GOR) Conference, Duisburg, Germany, March 2004. [PDF slides]

    In German

  • Fragebogeneffekte bei Online-Befragungen [Questionnaire Effects of Online Surveys], Master Thesis. Technische Universität Dresden, Institute of Communication Science, September 2003. [Publisher]

Conferences I am affiliated with

  • WEIS 2010: 9th Workshop on the Economics of Information Security, Harvard University, 7–8 June 2010
  • IH 2010: 12th Information Hiding Conference, University of Calgary, Canada, 28–30 June 2010
  • PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk, and Trust, Minneapolis, MN, 20–22 August 2010
Last modified: 20th Dec 2011, 3.11 PM
Author: Dr.-Ing. Rainer Böhme