default search action
7th IH&MMSec 2019: Paris, France
- Rémi Cogranne, Luisa Verdoliva, Siwei Lyu, Juan Ramón Troncoso-Pastoriza, Xinpeng Zhang:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2019, Paris, France, July 3-5, 2019. ACM 2019, ISBN 978-1-4503-6821-6
Keynote Presentation #1
- Jean-Michel Morel:
Reverse Engineering: What Can We Learn From a Digital Image About Its Own History ? 1
Session: Video & Audio Steganography
- Chen Gong, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position. 2-13 - Yunzhao Yang, Yuntao Wang, Xiaowei Yi, Xianfeng Zhao, Yi Ma:
Defining Joint Embedding Distortion for Adaptive MP3 Steganography. 14-24 - Pei Xie, Hong Zhang, Weike You, Xianfeng Zhao, Jianchang Yu, Yi Ma:
Adaptive VP8 Steganography Based on Deblocking Filtering. 25-30 - Nikolay Matyunin, Yujue Wang, Stefan Katzenbeisser:
Vibrational Covert Channels using Low-Frequency Acoustic Signals. 31-36
Session: Image Steganography
- Jianhua Yang, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Towards Automatic Embedding Cost Learning for JPEG Steganography. 37-46 - Jan Butora, Jessica J. Fridrich:
Effect of JPEG Quality on Steganographic Security. 47-56 - Théo Taburet, Patrick Bas, Jessica J. Fridrich, Wadih Sawaya:
Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain. 57-62 - Bolin Chen, Weiqi Luo, Peijia Zheng:
Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference. 63-68
Session: Forensics & Anti-forensics
- Morteza Darvish Morshedi Hosseini, Miroslav Goljan:
Camera Identification from HDR Images. 69-76 - Rohit Yadav, Iuliia Tkachenko, Alain Trémeau, Thierry Fournel:
Estimation of Copy-sensitive Codes Using a Neural Approach. 77-82 - Yuezun Li, Siwei Lyu:
De-identification Without Losing Faces. 83-88 - Majd Abazid, Nesma Houmani, Sonia Garcia-Salicetti:
Impact of Spatial Constraints when Signing in Uncontrolled Mobile Conditions. 89-94
Special Session 1: Media Forensics -- Fake or Reality ?
- Tom Neubert, Christian Kraetzer, Jana Dittmann:
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD. 95-100 - Benedikt Lorch, Christian Riess:
Image Forensics from Chroma Subsampling of High-Quality JPEG Images. 101-106 - Ivan Castillo Camacho, Kai Wang:
A Simple and Effective Initialization of CNN for Forensics of Image Processing Operations. 107-112 - Xin Yang, Yuezun Li, Honggang Qi, Siwei Lyu:
Exposing GAN-synthesized Faces Using Landmark Locations. 113-118 - Chang Liu, Matthias Kirchner:
CNN-based Rescaling Factor Estimation. 119-124
Special Session 2: ALASKA steganalysis challenge 'Into the wild'
- Rémi Cogranne, Quentin Giboulot, Patrick Bas:
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis. 125-137 - Yassine Yousfi, Jan Butora, Jessica J. Fridrich, Quentin Giboulot:
Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain. 138-149
Keynote Presentation #2
- Reza Shokri:
Trusting Machine Learning: Privacy, Robustness, and Transparency Challenges. 150
Session: Watermarking and Applied Crypto
- Karthik Nandakumar, Nalini K. Ratha, Sharathchandra Pankanti:
Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain. 151-160 - Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Revisiting Multivariate Lattices for Encrypted Signal Processing. 161-172 - Teddy Furon:
Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector. 173-181 - Thijs Laarhoven:
Nearest Neighbor Decoding for Tardos Fingerprinting Codes. 182-187
Session: Deep Learning & Audio Steganalysis
- Mo Chen, Mehdi Boroumand, Jessica J. Fridrich:
Reference Channels for Steganalysis of Images with Convolutional Neural Networks. 188-197 - Junwen Huang, Jiangqun Ni, Linhong Wan, Jingwen Yan:
A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis. 198-203 - Hao Yang, Zhongliang Yang, Yongfeng Huang:
Steganalysis of VoIP Streams with CNN-LSTM Network. 204-209 - Yuzhen Lin, Rangding Wang, Diqun Yan, Li Dong, Xueyuan Zhang:
Audio Steganalysis with Improved Convolutional Neural Network. 210-215
Session: Methods for Steganography and Steganalysis
- Solène Bernard, Tomás Pevný, Patrick Bas, John Klein:
Exploiting Adversarial Embeddings for Better Steganography. 216-221 - Daniel Lerch-Hostalot, David Megías:
Detection of Classifier Inconsistencies in Image Steganalysis. 222-229 - Xiaoqing Deng, Bolin Chen, Weiqi Luo, Da Luo:
Fast and Effective Global Covariance Pooling Network for Image Steganalysis. 230-234 - Boris Ryabko, Andrey Fionov:
Linear Hash Functions as a Means of Distortion-Rate Optimization in Data Embedding. 235-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.