Lebenslauf


Dr. Pascal Schöttle
Hochschullektor
+ 43 512 2070 - 4332
pascal.schoettle@mci.edu




Dr. Pascal Schöttle


2018 - heute
Hochschullektor - Management Center Innsbruck, Österreich

2015 - 2018
Post-Doc - Universität Innsbruck, Österreich

2014 - 2015
Post-Doc - Westfälische Wilhelms-Universität Münster, Deutschland

2013
Austauschforscher - Pennsylvania State University, USA

2011 - 2014
Wissenschaftlicher Mitarbeiter (Doktorand) - Westfälische Wilhelms-Universität Münster, Deutschland

2010 - 2011
Wissenschaftliche Hilfskraft - Ruhr-Universität Bochum, Deutschland

2011 - 2014
Informatik - Westfälische Wilhelms-Universität Münster, Deutschland (Dr. rer. nat)

2008 - 2011
IT-Sicherheit / Netze und Systeme - Ruhr-Universität Bochum, Deutschland (Master of Science)

2003 - 2008
Mathematical Engineering - Universität Duisburg-Essen, Deutschland (Bachelor of Science)

Multimedia-Sicherheit - Westfälische Wilhelms-Universität Münster, Deutschland

Advanced Cryptology - Westfälische Wilhelms-Universität Münster, Deutschland

Einführung in die technische Informatik - Universität Innsbruck, Österreich

Rechnernetze und Internettechnik - Universität Innsbruck, Österreich

Information Security II - Universität Innsbruck, Österreich

Kommunikationstechnik und Rechnernetzwerke - Universität Innsbruck, Österreich

Logik & Berechenbarkeit - Management Center Innsbruck, Österreich

2012
IEEE International Workshop on Information Forensics and Security
Best Student Paper Award

2008
CAST - Competence Center for Applied Security Technology
2. Platz beim CAST Förderpreis IT-Sicherheit

2018
Programm Committee Co-Chair - ACM Information Hiding & Multimedia Security 2018

2018
Programmkomitteemitglied - IEEE International Conference on Acoustics, Speech, and Signal Processing

2016 - heute
Gutachter - IEEE Transactions of Information Forensics and Security

2015 - 2018
Programmkomitteemitglied - ACM Information Hiding & Multimedia Security

2015 - 2018
Programmkomitteemitglied - International Workshop on Digital-forensics and Watermarking

  • Pascal Schöttle and Rainer Böhme. "Game Theory and Adaptive Steganography". In: IEEE Transactions on Information Forensics and Security 11.4 (2016), pp. 760-773
  • Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, and Rainer Böhme. "Adaptive Steganography and Steganalysis with Fixed-Size Embedding". In: Transactions on Data Hiding and Multimedia Security 10 (2015), pp. 69-91
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, and Rainer Böhme. "Secure Team Composition to Thwart Insider Threats and Cyberespionage". In: ACM Transactions on Internet Technology 14.2-3 (2014), 19:1-22

  • Pascal Schöttle and Rainer Böhme. "Die totale Transparenz. Facebook, Cookies, RFID etc." In: Ethische Herausforderungen im Web 2.0. Ed. by Martin Dabrowski, Judith Wolf, and Karlies Abmeier. Paderborn: Schöningh, 2014, pp. 11-31

  • Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, and Rainer Böhme. "Detecting Adversarial Examples - A Lesson from Multimedia Security" In: 26th European Signal Processing Conference (EUSIPCO), 2018.
  • Cecilia Pasquini, Pascal Schöttle, and Rainer Böhme. "Decoy Password Vaults: At Least As Hard As Steganography?" In: Proceedings of 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC). 2017, pp. 327-340
  • Svetlana Abramova, Pascal Schöttle, and Rainer Böhme. "Mixing Coins of Different Quality: A Game-Theoretic Approach". In: 4th Workshop on Bitcoin and Blockchain Research, in assocation with Financial Cryptography and Data Security 2017. Malta, 2017
  • Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, and Fernando Pèrez- Gonzàlez. "Forensics of High Quality and Nearly Identical JPEG Image Recompression". In: ACM Information Hiding and Multimedia Security Workshop. Vigo, Galicia, Spain, 2016, pp. 11-21
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Telltale Watermarks for Counting JPEG Compressions". In: Proceedings of IS&T Electronic Imaging: Media Watermarking, Security, and Forensics 2016. San Francisco, CA, 2016
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Forensics of High-Quality JPEG Images with Color Subsampling". In: IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Rome, Italy, 2015
  • Matthias Kirchner, Pascal Schöttle, and Christian Riess. "Thinking beyond the block: block matching for copy-move forgery detection revisited." Media Watermarking, Security, and Forensics 2015. Vol. 9409. International Society for Optics and Photonics, 2015.
  • Matthias Carnein, Pascal Schöttle, and Rainer Böhme. "Predictable Rain? Steganalysis of Public-Key Steganography using Wet Paper Codes". In: ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 97-108
  • Erwin Quiring and Pascal Schöttle. "On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks". In: ACM Information Hiding and Multimedia Security Workshop. Salzburg, Austria, 2014, pp. 41-48
  • Aron Laszka, Benjamin Johnson, Pascal Schöttle, and Rainer Böhme. "Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats". In: Computer Security (ESORICS). Ed. by Jason Crampton, Sushil Jajodia, and Keith Mayes. Vol. 8134. Lecture Notes in Computer Science. Berlin Heidelberg: Springer, 2013, pp. 273- 290
  • Pascal Schöttle, Aron Laszka, Benjamin Johnson, Jens Grossklags, and Rainer Böhme. "A Game-Theoretic Analysis of Content-adaptive Steganography with Independent Embed- ding". In: 21st European Signal Processing Conference (EUSIPCO). Marrakech, Morocco: IEEE, 2013, pp. 1-5
  • Pascal Schöttle, Stefan Korff, and Rainer Böhme. "Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding". In: IEEE International Workshop on Information Forensics and Security (IEEE WIFS). Best paper award. Tenerife, Spain, 2012, pp. 193- 198
  • Pascal Schöttle and Rainer Böhme. "A Game-Theoretic Approach to Content-Adaptive Steganography". In: Information Hiding (14th International Conference). Ed. by Matthias Kirchner and Dipak Ghosal. Vol. 7692. Lecture Notes in Computer Science. Berlin Heidel- berg: Springer, 2012, pp. 125-141
  • Benjamin Johnson, Pascal Schöttle, and Rainer Böhme. "Where to Hide the Bits?" In: Decision and Game Theory for Security. Ed. by Jens Grossklags and Jean Walrand. Vol. 7638. Lecture Notes in Computer Science. Berlin Heidelberg: Springer, 2012, pp. 1-17

2019 - 2021
Projektleitung - Game Over Eva(sion): Sicheres Deep Learning mit Spieltheorie Keywords: Deep Learning, Security, Game Theory, Evasion Attacks - FWF - Der Wissenschaftsfonds

2017 - 2019
Projektleitung - "Forensic Analysis of Scanned Text Documents" (FASTDoc). - Forschungsförderungsmittel der Nachwuchsförderung 2017 (Universität Innsbruck)

2015
FFG Relocation Förderung -

2013
ONR Visiting Researcher Förderung -



Cookies erleichtern die Bereitstellung unserer Dienste. Mit der Nutzung unserer Dienste erklären Sie sich damit einverstanden, dass wir Cookies verwenden.
Datenschutz