Dipl.-Medien.-Inf. Stephan Escher

Employee
NameMr Dipl.-Medien.-Inf. Stephan Escher
Chair of privacy and security
Send encrypted mail via the SecureMail portal (for TUD external users only).
RESEARCH INTERESTS
- Social Engineering
- Awareness / Media Competence
- Transparency Enhancing Technologies
- Multimedia forensics
PROJECTS
-
AN.ON-Next - Next-generation Anonymity Online
- DFD - checking for Duplicates - Forensics on printed Documents
In cooperation with Dence GmbH
PUBLICATIONS
-
Stephan Escher, Katrin Etzrodt, Benjamin Weller, Stefan K ̈opsell, and Thorsten Strufe. Transparency for Bystanders in IoT regardingaudiovisual Recordings. In 6th International Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IoT) In conjunction with IEEE Percom 2022 (SPT 2022)
-
Stephan Escher, Markus Sontowski, Knut Berling, Stefan Köpsell and Thorsten Strufe. How well can your car be tracked: Analysis of the European C-ITS pseudonym scheme. In IEEE 93rd Vehicular Technology Conference 2021 (VTC2021-Spring)
-
Stephan Escher, Patrick Teufert, Lukas Hain, and Thorsten Strufe. You've got nothing on me! Privacy Friendly Face Recognition Reloaded. In MPS 2020
-
Stephan Escher, Patrick Teufert, Robin Hermann, and Thorsten Strufe. Twizzle - A Multi-Purpose Benchmarking Framework for Semantic Comparisons of Multimedia Object Pairs. In MPS 2020
-
Johannes Pflugmacher, Stephan Escher, Jan Reubold, Thorsten Strufe. The German-Speaking Twitter Community Reference Data Set. In HotPost 2020
-
Stephan Escher, Benjamin Weller, Stefan Köpsell, and Thorsten Strufe. Towards Transparency in the Internet of Things. In Annual Privacy Forum 2020 (APF2020)
-
Timo Richter* , Stephan Escher* , Dagmar Schönfeld, Thorsten Strufe. Forensic Analysis and Anonymisation of Printed Documents. In Proceedings of 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ’18), 2018
-
Stephan C. Escher, Jan L. Reubold, Richard Kwasnicki, Joachim Scharloth, Lutz M. Hagen and Thorsten Strufe. Towards Automated Contextualization of News Articles. In MIS2: Misinformation and Misbehavior Mining on the Web, WSDM Workshops, 2018
-
Jan Reubold, Stephan Escher, and Thorsten Strufe: The Latent Behavior Space – A Vector Space for Time-Series Data, In Proceedings of the Workshop on Time-Series at the International Conference of Machine Learning (ICML), 2017.
- Stephan Escher, Thorsten Strufe. Robustness analysis of a passive printer identification scheme for halftone images. In IEEE International Conference on Image Processing (ICIP), 2017
- Stephan Escher, Stefan Köpsell. Durchführung eines integrierten Anti-Phishing-Trainings. In Sicherheit in vernetzen Systemen: 23. DFN-CERT Konferenz. DFN-CERT, 2016.
TALKS
- 6. Kommunaler IT-Sicherheitskongress 2019 (DLTK): "Forensische Analyse von gedruckten Dokumenten"
- 12. IT-Security Stammtisch: „IT-Forensik – Auf den Spuren der digitalen Forensik“
- Tagung der Sektion „Medizin – und Wissenschaftsphotographie“ der Deutschen Gesellschaft für Photographie (DGPh) 2018: "Gerätespezifische Forensik"
- 46.ten Arbeitskreis IT der Leibniz-Gemeinschaft: "Security Awareness gegen Phishing"
- DFN-Cert Forum Mail 2016 "Durchführung eines integrierten Anti-Phishing-Trainings"
- Output 2017, 2018 / Lange Nacht der Wissenschaften (LNDW) 2019
MEDIA
SUPERVISED THESES
-
Shining a light on online-polls in news outlets (Dustin Gust, Bachelor)
-
Improving the extraction algorithm for yellow dots (Anita Fritzsche, INF-PM-FPA)
-
Design and implementation of a privacy preserving scooter sharing system (Mark Vehlow, Master)
-
Improving the extraction algorithm for yellow dots (Julius Wenzel, INF-D-960)
-
Exploring Contextualization of News in Social Media (Felix Kienhöfer, Diplom)
-
Design of an Audit TET for IoT (Max Maier, Beleg)
-
Design and analysis of a crowd-based reporting system for e-mail scam (Daniel Keller, Diplom)
-
Towards Privacy Preserving Bike Sharing (Mark Vehlow, INF-PM-FPA)
-
Designing a protocol for privacy preserving face comparisons (Patrick Teufert, INF-PM-FPA)
-
Design and Implementation of an Audit TET for Smartphone Apps (Adrian Jentzsch, Bachelor)
-
Design and Analysis of a TET approach for IoT (Benjamin Weller, Diplom)
-
Privacy awareness via technical understanding (Holger Kaul, Diplom)
- Step-Wise Document Similarity Search On a German News Article Corpus (Gregor Minuge, Bachelor)
- Detection of synthetic speech using CNNs trained on spectrograms (Dang Thanh An, Bachelor)
- Towards the Automated Identification of Framings Using Topic Models (Olaf Waterböhr, Studienarbeit)
- Analysis of the Privacy Paradox regarding Web Tracking (Thuy Nga Thi Pham, Bachelor)
-
Analysis of Media Usage and Political Spectrum of the German Twitter User Base (Johannes Pflugmacher, Master)
-
Analysis of the C-ITS pseudonym change in V2X regarding location based privacy and considering cam messages (Robert Bochmann, Bachelor)
-
Privacy Preserving Face Recognition (Anika Borchmann, Inf-D-960)
-
OCR on memes and analysis of correlation to political events (Franziska Müller, Bachelor)
-
Transparency in the Internet of Things (Benjamin Weller, D-960)
-
Video contextualization based on automatically created audio transcripts (Jan Engelmohr, Diplom)
-
Entwicklung eines modularen Benchmarking Systems für die Evaluation von Perceptual Image Hashing Verfahren (Robin Herrmann, PM-FPA)
-
Simulation of the pseudonymity change in V2X communication according to ETSI and analysis with regard to privacy (Richard Stosch, Diplom)
-
Contextualization of news articles in OSNs (Benjamin Weller, Beleg)
-
Social Engineering attacks based on speech synthesis: a pre-study (Nico Westerbeck, PM-FPA)
- Analysis of information diffusion in OSNs (Johannes Pflugmacher, PM-FPA)
- Robust image hashing vs. print-scan (Anika Borchmann, PM-FPA)
- Article Augmentation - A Journey Towards Wisdom (Richard Kwasnicki, Diplom)
- The whole bunch of social bots – Attacker analysis and modeling (Sven Mesecke, BSc)
- Print-Scan resistant Perceptual Image Hashing - An analysis with focus on cropping through the use of image segmentation (Robin Herrmann, BSc)
- Analysis and Anonymisation of Printed Documents (Timo Richter, Diplom)
- Evaluation of perceptual image hashing algorithms in terms of print-scan and rotation robustness (Sami Philip Hosni, BSc)
- Who determines my Facebook newsfeed? (Timo Richter - PM-FPA)
- Development of an image database for benchmarking printer forensics schemes (Christian Poppe, BSc)
- Analysis of social media usage and awareness towards social bots (Anna Baumgärtel, BSc)
- Analysis of printed documents for passive printer identification (Matthias Kemmerer, BSc)
SEMINAR TOPICS
- Contextualizing news in social networks
- Transparency for mobile users regarding network traffic
- The Relationship of IoT and Bystanders’ Privacy
- Simplifying Privacy Policies
- Using Topic Models to Enhance Performance of Event Extraction from News Articles
- Frame detection for a more diverse news diet
- Combating the Rise of Social Bots
- Attacker models for social bots
- The rise of social bots and their techniques
- How Social Networks can help Phishers and Spammers
- Social Spam Detection
- Privacy issues and challenges of augmented-reality systems in online social networks