Dipl.-Medien.-Inf. Stephan Escher
Employee
NameMr Dipl.-Medien.-Inf. Stephan Escher
Chair of privacy and security
Send encrypted email via the SecureMail portal (for TUD external users only).
RESEARCH INTERESTS
- Social Engineering
- Awareness / Media Competence
- Transparency Enhancing Technologies
- Multimedia forensics
PROJECTS
-
DIPCY - Disruptionen vernetzter Privatheit
- Designate - Disruption im Internet: Mehr Souveränität gegenüber Deceptive Technologies
-
AN.ON-Next - Next-generation Anonymity Online
- DFD - checking for Duplicates - Forensics on printed Documents
In cooperation with Dence GmbH
PUBLICATIONS
-
Jan Ludwig Reubold, Stephan Cornelius Escher, Christian Wresnegger, and Thorsten Strufe. How to protect the public opinion against new types of bots?. In International Conference on Big Data, 2022.
-
Jan Reubold, Stephan Escher, Johannes Pflugmacher, and Thorsten Strufe. Dissecting chirping patterns of invasive Tweeter flocks in the German Twitter forest. In Online Social Networks and Media (OSNEM), 2022.
-
Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan Köpsell, and Thorsten Strufe. Transparency for Bystanders in IoT regardingaudiovisual Recordings. In 6th International Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IoT) In conjunction with IEEE Percom 2022 (SPT 2022)
-
Stephan Escher, Markus Sontowski, Knut Berling, Stefan Köpsell and Thorsten Strufe. How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme. In IEEE 93rd Vehicular Technology Conference 2021 (VTC2021-Spring)
-
Stephan Escher, Patrick Teufert, Lukas Hain, and Thorsten Strufe. You've got nothing on me! Privacy Friendly Face Recognition Reloaded. In MPS 2020
-
Stephan Escher, Patrick Teufert, Robin Hermann, and Thorsten Strufe. Twizzle - A Multi-Purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs. In MPS 2020
-
Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe. The German-Speaking Twitter Community Reference Data Set. In HotPost 2020
-
Stephan Escher, Benjamin Weller, Stefan Köpsell, and Thorsten Strufe. Towards Transparency in the Internet of Things. In Annual Privacy Forum 2020 (APF2020)
-
Timo Richter* , Stephan Escher* , Dagmar Schönfeld, Thorsten Strufe. Forensic Analysis and Anonymisation of Printed Documents. In Proceedings of 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’18), 2018
-
Stephan C. Escher, Jan L. Reubold, Richard Kwasnicki, Joachim Scharloth, Lutz M. Hagen and Thorsten Strufe. Towards Automated Contextualization of News Articles. In MIS2: Misinformation and Misbehavior Mining on the Web, WSDM Workshops, 2018
-
Jan Reubold, Stephan Escher, and Thorsten Strufe: The Latent Behavior Space – A Vector Space for Time-Series Data, In Proceedings of the Workshop on Time-Series at the International Conference of Machine Learning (ICML), 2017.
- Stephan Escher, Thorsten Strufe. Robustness analysis of a passive printer identification scheme for halftone images. In IEEE International Conference on Image Processing (ICIP), 2017
- Stephan Escher, Stefan Köpsell. Durchführung eines integrierten Anti-Phishing-Trainings. In Sicherheit in vernetzen Systemen: 23. DFN-CERT Konferenz. DFN-CERT, 2016.
TALKS
- 5th European Technology Assessment Conference "Digital Future(s). TA in and for a Changing World" 2022 (ETAC): "Deepfakes & Co: Digital misinformation as a challenge for democratic societies"; Jahnel, J.; Hägle, O.; Hauser, C.; Escher, S.; Heil, R.; Nierling, L.
- 6. Kommunaler IT-Sicherheitskongress 2019 (DLTK): "Forensische Analyse von gedruckten Dokumenten"
- 12. IT-Security Stammtisch: „IT-Forensik – Auf den Spuren der digitalen Forensik“
- Tagung der Sektion „Medizin – und Wissenschaftsphotographie“ der Deutschen Gesellschaft für Photographie (DGPh) 2018: "Gerätespezifische Forensik"
- 46.ten Arbeitskreis IT der Leibniz-Gemeinschaft: "Security Awareness gegen Phishing"
- DFN-Cert Forum Mail 2016 "Durchführung eines integrierten Anti-Phishing-Trainings"
- Output 2017, 2018, 2022 / Lange Nacht der Wissenschaften (LNDW) 2019, 2022
MEDIA
SUPERVISED THESES
-
Automatic campaign classification of malicious emails (Pascal Scholz, INF-PM-FPA)
-
Anonymization and extraction of yellow dots in color laser print outs (Anita Fritzsche, Master)
-
Towards news contextualization in OSNs (Anne Trinkaus, Master)
-
Bringing Light into the Darkness of App Privacy – Conceptualization
and Development of a mobile Transparency Tool (Cornell Ziepell, Beleg) -
Design and implementation of a crowd-based phishing reporting
system (Tim Ole Christiansen, Bachelor) -
Shining a light on online-polls in news outlets (Dustin Gust, Bachelor)
-
Improving the extraction algorithm for yellow dots (Anita Fritzsche, INF-PM-FPA)
-
Design and implementation of a privacy preserving scooter sharing system (Mark Vehlow, Master)
-
Improving the extraction algorithm for yellow dots (Julius Wenzel, INF-D-960)
-
Exploring Contextualization of News in Social Media (Felix Kienhöfer, Diplom)
-
Design of an Audit TET for IoT (Max Maier, Beleg)
-
Design and analysis of a crowd-based reporting system for e-mail scam (Daniel Keller, Diplom)
-
Towards Privacy Preserving Bike Sharing (Mark Vehlow, INF-PM-FPA)
-
Designing a protocol for privacy preserving face comparisons (Patrick Teufert, INF-PM-FPA)
-
Design and Implementation of an Audit TET for Smartphone Apps (Adrian Jentzsch, Bachelor)
-
Design and Analysis of a TET approach for IoT (Benjamin Weller, Diplom)
-
Privacy awareness via technical understanding (Holger Kaul, Diplom)
- Step-Wise Document Similarity Search On a German News Article Corpus (Gregor Minuge, Bachelor)
- Detection of synthetic speech using CNNs trained on spectrograms (Dang Thanh An, Bachelor)
- Towards the Automated Identification of Framings Using Topic Models (Olaf Waterböhr, Studienarbeit)
- Analysis of the Privacy Paradox regarding Web Tracking (Thuy Nga Thi Pham, Bachelor)
-
Analysis of Media Usage and Political Spectrum of the German Twitter User Base (Johannes Pflugmacher, Master)
-
Analysis of the C-ITS pseudonym change in V2X regarding location based privacy and considering cam messages (Robert Bochmann, Bachelor)
-
Privacy Preserving Face Recognition (Anika Borchmann, Inf-D-960)
-
OCR on memes and analysis of correlation to political events (Franziska Müller, Bachelor)
-
Transparency in the Internet of Things (Benjamin Weller, D-960)
-
Video contextualization based on automatically created audio transcripts (Jan Engelmohr, Diplom)
-
Entwicklung eines modularen Benchmarking Systems für die Evaluation von Perceptual Image Hashing Verfahren (Robin Herrmann, PM-FPA)
-
Simulation of the pseudonymity change in V2X communication according to ETSI and analysis with regard to privacy (Richard Stosch, Diplom)
-
Contextualization of news articles in OSNs (Benjamin Weller, Beleg)
-
Social Engineering attacks based on speech synthesis: a pre-study (Nico Westerbeck, PM-FPA)
- Analysis of information diffusion in OSNs (Johannes Pflugmacher, PM-FPA)
- Robust image hashing vs. print-scan (Anika Borchmann, PM-FPA)
- Article Augmentation - A Journey Towards Wisdom (Richard Kwasnicki, Diplom)
- The whole bunch of social bots – Attacker analysis and modeling (Sven Mesecke, BSc)
- Print-Scan resistant Perceptual Image Hashing - An analysis with focus on cropping through the use of image segmentation (Robin Herrmann, BSc)
- Analysis and Anonymisation of Printed Documents (Timo Richter, Diplom)
- Evaluation of perceptual image hashing algorithms in terms of print-scan and rotation robustness (Sami Philip Hosni, BSc)
- Who determines my Facebook newsfeed? (Timo Richter - PM-FPA)
- Development of an image database for benchmarking printer forensics schemes (Christian Poppe, BSc)
- Analysis of social media usage and awareness towards social bots (Anna Baumgärtel, BSc)
- Analysis of printed documents for passive printer identification (Matthias Kemmerer, BSc)
SEMINAR TOPICS
- Contextualizing news in social networks
- Transparency for mobile users regarding network traffic
- The Relationship of IoT and Bystanders’ Privacy
- Simplifying Privacy Policies
- Using Topic Models to Enhance Performance of Event Extraction from News Articles
- Frame detection for a more diverse news diet
- Combating the Rise of Social Bots
- Attacker models for social bots
- The rise of social bots and their techniques
- How Social Networks can help Phishers and Spammers
- Social Spam Detection
- Privacy issues and challenges of augmented-reality systems in online social networks