[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3137616acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
MPS '17: Proceedings of the 2017 on Multimedia Privacy and Security
ACM2017 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security Dallas Texas USA 30 October 2017
ISBN:
978-1-4503-5206-2
Published:
30 October 2017
Sponsors:
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 02 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 1st International Workshop on Multimedia Privacy and Security - MPS 2017. We are pleased to present this newly-established workshop that brings together researchers and practitioners in the fields of multimedia, data privacy, and cybersecurity. MPS 2017 highlights the important intersection of these fields that has been brought about by the emergence and widespread adoption of social media, Internet of Things (IoT), and other ubiquitous computing platforms. Indeed, with the rise of social media, mobile technologies, cloud services, and IoT, massive quantities of multimedia content are created and disseminated as users post updates that include personal information, video and audio data, and other analytical information. Multimedia has arguably expanded well beyond the scope of its original definition.

Our call for papers attracted submissions from North America, Central America, Asia, and Europe. We received seven submissions, of which three were selected as Full Papers (42%) and two were accepted as Short Papers after a double-blind review by our program committee. In addition to these presentations, we will feature an invited keynote address and discussion panel:

  • An NSF View of Multimedia Privacy and Security, Mr. Jeremy Epstein (Deputy Division Director, Computer and Network Systems, National Science Foundation)

  • Multimedia Security and Privacy with IoT and Social Networks, moderated by Kurt Rohloff and Roger Hallman

Skip Table Of Content Section
SESSION: Session 1: Privacy
research-article
Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks

The recent expansion of Internet of Things (IoT) and the grow- ing trends towards a healthier lifestyle, have been followed by a proliferation in the use of tness-trackers in our daily life. These wearable IoT devices combined with the extensive use by ...

short-paper
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures

Anonymization is one of the major processes to protect location-based services (LBS) from privacy leakage. However, there are many discussions about de-anonymization attacks to LBS and whether anonymization processing is a sufficient countermeasure for ...

SESSION: Session 2: Invited Talk: Mr. Jeremy Epstein, National Science Foundation
research-article
An NSF View of Multimedia Privacy and Security: Extended Abstract

Multimedia introduces whole new worlds of opportunities and challenges for security and privacy. The NSF Secure and Trustworthy Cyberspace (SaTC) program funds a wide range of research in the area, and welcomes proposals for additional areas. This ...

SESSION: Session 3: Image and Video Security
research-article
Public Access
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API

Due to the growth of video data on Internet, automatic video analysis has gained a lot of attention from academia as well as companies such as Facebook, Twitter and Google. In this paper, we examine the robustness of video analysis algorithms in ...

research-article
Public Access
Approximate Thumbnail Preserving Encryption

Thumbnail preserving encryption (TPE) was suggested by Wright et al. [Information Hiding & Multimedia Security Workshop 2015] as a way to balance privacy and usability for online image sharing. The idea is to encrypt a plaintext image into a ciphertext ...

SESSION: Session 4: Intrusion Detection and Prevention
short-paper
Detecting Spying and Fraud Browser Extensions: Short Paper

Due to the flaws in policy followed by web browsers for granting permissions to browser extensions and due to a lack of effective static and dynamic detection systems for identifying malicious extensions uploaded on the web stores, malicious browser ...

Contributors
  • Space and Naval Warfare Systems Center San Diego
  • New Jersey Institute of Technology
  • Aston Business School
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

MPS '17 Paper Acceptance Rate 3 of 7 submissions, 43%;
Overall Acceptance Rate 5 of 11 submissions, 45%
YearSubmittedAcceptedRate
MPS '184250%
MPS '177343%
Overall11545%