default search action
12th IH&MMSec 2024: Baiona, Spain
- Fernando Pérez-González, Pedro Comesaña Alfaro, Christian Krätzer, Hong Vicky Zhao:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2024, Baiona, Spain, June 24-26, 2024. ACM 2024
Keynote Talks
- Gwenaël J. Doërr:
Digital Flamenco with Video Pirates. 1-2 - Christian Riess:
Dreams and Drama of Applied Image Forensics. 3-4 - Jonathan W. Hak:
Image-Based Evidence in International Criminal Prosecutions: Charting a Path Forward. 5-6
Session 1: Steganography & Steganalysis
- Guorui Liao, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang:
Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media. 7-12 - Ivy K. Y. Woo, Sheung Yiu, Hoover H. F. Yin, Russell W. F. Lai:
Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography. 13-18 - Eli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich:
Improving Steganographic Security with Source Biasing. 19-30 - Antoine Mallet, Rémi Cogranne, Patrick Bas:
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis. 31-39
Session 2: Special Session Reliable Detectors in Multimedia Forensics and Steganalysis
- Mathias Ibsen, Robert Nichols, Christian Rathgeb, David J. Robertson, Josh P. Davis, Frøy Løvåsdal, Kiran B. Raja, Ryan E. Jenkins, Christoph Busch:
Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions. 41-46 - Lea Uhlenbrock, Davide Cozzolino, Denise Moussa, Luisa Verdoliva, Christian Riess:
Did You Note My Palette? Unveiling Synthetic Images Through Color Statistics. 47-52 - Edoardo Daniele Cannas, Sara Mandelli, Paolo Bestagini, Stefano Tubaro:
Investigating Translation Invariance and Shiftability in CNNs for Robust Multimedia Forensics: A JPEG Case Study. 53-63 - Nischay Purnekar, Lydia Abady, Benedetta Tondi, Mauro Barni:
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation. 65-73 - Martin Benes, Rainer Böhme:
Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis. 75-86 - Antoine Mallet, Patrick Bas, Rémi Cogranne:
Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch. 87-94
Session 3: Special Session Stego-Malware: Attribution, Analysis and Detection
- Sebastian Zillien, Denis Petrov, Pascal Ruffing, Friedrich Gross:
A Development Framework for TCP/IP Network Steganography Malware Detection. 95-100 - Jana Dittmann, Christian Kraetzer, Jost Alemann, Bernhard Birnbaum:
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification. 101-112 - Mandy Knöchel, Sebastian Karius:
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation. 113-124 - Stefan Kiltz, Jana Dittmann, Fabian Loewe, Christian Heidecke, Max John, Jonas Mädel, Fabian Preißler:
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets. 125-130
Session 4: Forensics
- Michael Häfner, Aleksandar Radovic, Moritz Langer, Stefan Findenig, Andreas Uhl:
Forensic Recognition of Codec-Specific Image Compression Artefacts. 131-136 - Andrea Montibeller, Roy Alia Asiku, Fernando Pérez-González, Giulia Boato:
Shedding Light on some Leaks in PRNU-based Source Attribution. 137-142 - Jan Butora, Patrick Bas:
The Adobe Hidden Feature and its Impact on Sensor Attribution. 143-148 - Yang Su, Shunquan Tan, Jiwu Huang:
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model. 149-158 - Wenhao Wang, Fangjun Huang:
Evading DeepFake Detectors via Conditional Diffusion Models. 159-164
Session 5: Challenges in Multimedia Security
- Zhitong Lu, Duohe Ma, Linna Fan, Zhen Xu, Kai Chen:
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion. 165-174 - Meghana Rao Bangalore Narasimha Prasad, Andrey Makrushin, Matteo Ferrara, Christian Kraetzer, Jana Dittmann:
GAN-based Minutiae-driven Fingerprint Morphing. 175-186 - Chenghua He, Deyang Wu, Xinpeng Zhang, Hanzhou Wu:
Watermarking Text Documents With Watermarked Fonts. 187-197 - Mahdi Rahimi:
CLAM: Client-Aware Routing in Mix Networks. 199-209 - Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. 211-222 - Li Zhang, Yong Liu, Xinpeng Zhang, Hanzhou Wu:
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing. 223-234
Session 6: Special Session Security and Privacy Challenges towards Trustworthy Federated Learning
- Pierre Jobic, Aurélien Mayoue, Sara Tucci Piergiovanni, François Terrier:
Extending the Scope of Gradient Reconstruction Attacks in Federated Averaging. 235-246 - Imane Taibi, Jan Ramon:
Honest Fraction Differential Privacy. 247-251 - Judith Sáinz-Pardo Díaz, Andrés Heredia Canales, Ignacio Heredia Cacha, Viet D. Tran, Giang T. Nguyen, Khadijeh Alibabaei, Marta Obregón Ruiz, Susana Rebolledo Ruiz, Álvaro López García:
Making Federated Learning Accessible to Scientists: The AI4EOSC Approach. 253-264 - Jaime Loureiro-Acuña, Xavier Martínez Luaña, Héctor Padín-Torrente, Gonzalo Jiménez-Balsa, Carlos García-Pagán, Ines Ortega-Fernandez:
Enhancing Privacy in Federated Learning: A Practical Assessment of Combined PETs in a Cross-Silo Setting. 265-270
Session 7: Special Session Unveiling Trends and Challenges in Audio Deepfake Detection
- Taiba Majid Wani, Syed Asif Ahmad Qadri, Danilo Comminiello, Irene Amerini:
Detecting Audio Deepfakes: Integrating CNN and BiLSTM with Multi-Feature Concatenation. 271-276 - Kratika Bhagtani, Amit Kumar Singh Yadav, Paolo Bestagini, Edward J. Delp:
Are Recent Deepfake Speech Generators Detectable? 277-282 - Hashim Ali, Surya Subramani, Shefali Sudhir, Raksha Varahamurthy, Hafiz Malik:
Is Audio Spoof Detection Robust to Laundering Attacks? 283-288 - Alessandro Pianese, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva:
Training-Free Deepfake Voice Recognition by Leveraging Large-Scale Pre-Trained Models. 289-294
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.