default search action
8th IH&MMSec 2020: Denver, CO, USA
- Christian Riess, Franziska Schirrmacher, Irene Amerini, Paolo Bestagini, Tomás Pevný:
IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020. ACM 2020, ISBN 978-1-4503-7050-9 - Min Wu:
Exploiting Micro-Signals for Physiological Forensics. 1 - Christopher Kiekintveld:
Game-Theoretic Perspectives and Algorithms for Cybersecurity. 3 - Hao Yang, YongJian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang, Saimei Jiao:
Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid. 5-10 - Daewon Lee, Tae-Woo Oh, Kibom Kim:
Deep Audio Steganalysis in Time Domain. 11-21 - Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi:
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis. 23-32 - Haneol Jang, Tae-Woo Oh, Kibom Kim:
Feature Aggregation Networks for Image Steganalysis. 33-38 - Mehdi Yedroudj, Marc Chaumont, Frédéric Comby, Ahmed Oulad Amara, Patrick Bas:
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis. 39-48 - Chen Wang, Jingjing Mu, Long Huang:
Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand. 49-54 - Benoît Bonnet, Teddy Furon, Patrick Bas:
What if Adversarial Samples were Digital Images? 55-66 - Hashim Abu-gellban, Long Hoang Nguyen, Mahdi Moghadasi, Zhenhe Pan, Fang Jin:
LiveDI: An Anti-theft Model Based on Driving Behavior. 67-72 - Tobias Kupek, Cecilia Pasquini, Rainer Böhme:
On the Difficulty of Hiding Keys in Neural Networks. 73-78 - Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko, Gerhard Kramer:
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage. 79-89 - Andrey Makrushin, Dennis Siegel, Jana Dittmann:
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans. 91-96 - Irene Amerini, Roberto Caldelli:
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos. 97-102 - Shruti Agarwal, Hany Farid:
Photo Forensics From Rounding Artifacts. 103-114 - Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert, Claus Vielhauer:
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection. 115-120 - Christy Kin-Cleaves, Andrew D. Ker:
Simulating Suboptimal Steganographic Embedding. 121-126 - Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie, Xianfeng Zhao:
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel. 127-137 - Théo Taburet, Patrick Bas, Wadih Sawaya, Rémi Cogranne:
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline. 139-149 - Jan Butora, Yassine Yousfi, Jessica J. Fridrich:
Turning Cost-Based Steganography into Model-Based. 151-159 - Rémi Cogranne, Quentin Giboulot, Patrick Bas:
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images. 161-167
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.