default search action
4. IH&MMSec 2016: Vigo, Galicia, Spain
- Fernando Pérez-González, Patrick Bas, Tanya Ignatenko, François Cayre:
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016. ACM 2016, ISBN 978-1-4503-4290-2
Keynote 1
- Battista Biggio:
Machine Learning under Attack: Vulnerability Exploitation and Security Measures. 1-2
Keynote 2
- Martino Jerian:
Bringing Multimedia Security from the Research Lab to the Forensic Lab. 3
Forensics, Fingerprinting and Reversible Watermarking
- Belhassen Bayar, Matthew C. Stamm:
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer. 5-10 - Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, Fernando Pérez-González:
Forensics of High Quality and Nearly Identical JPEG Image Recompression. 11-21 - Hiroki Koga, Kaoru Itabashi:
A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack. 23-28 - Junxiang Wang, Jiangqun Ni, Xing Zhang:
Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram. 29-38 - Bin Ma, Jian Xu, Yun Q. Shi:
A Novel CDMA Based High Performance Reversible Data Hiding Scheme. 39-44
Privacy
- Mina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González:
Dynamic Privacy-Preserving Genomic Susceptibility Testing. 45-50 - Ahmet Iscen, Teddy Furon:
Group Testing for Identification with Privacy. 51-56 - Raghavendran Balu, Teddy Furon:
Differentially Private Matrix Factorization using Sketching Techniques. 57-62 - Jia Duan, Jiantao Zhou, Yuanman Li:
Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF). 63-68 - Hung Dang, Yun Long Chong, Francois Brun, Ee-Chien Chang:
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation. 69-80
Steganography and Steganalysis I
- Sebastian Berndt, Maciej Liskiewicz:
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions. 81-92 - Andrew D. Ker, Tomás Pevný, Patrick Bas:
Rethinking Optimal Embedding. 93-102 - Guanshuo Xu, Han-Zhou Wu, Yun Q. Shi:
Ensemble of CNNs for Steganalysis: An Empirical Study. 103-107 - Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier:
Color Image Steganalysis Based On Steerable Gaussian Filters Bank. 109-114
Steganography and Steganalysis II
- Brent Carrara, Carlisle Adams:
A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels. 115-126 - Peipei Wang, Hong Zhang, Yun Cao, Xianfeng Zhao:
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution. 127-137 - Zengzhen Zhao, Qingxiao Guan, Xianfeng Zhao:
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography. 139-148 - Mehdi Boroumand, Jessica J. Fridrich:
Boosting Steganalysis with Explicit Feature Maps. 149-157
Information Hiding and Cryptography
- Stefan Wüller, Marián Kühnel, Ulrike Meyer:
Information Hiding in the RSA Modulus. 159-167 - Jong-Uk Hou, Dongkyu Kim, Hyun-Ji Song, Heung-Kyu Lee:
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye. 169-174 - Christof Kauba, Stefan Mayer, Andreas Uhl:
Image Segmentation Based Visual Security Evaluation. 175-180
Ongoing works
- David Megías, Amna Qureshi:
Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]. 181-182 - Hervé Chabanne, Julien Keuffer, Roch Lescuyer:
Study of a Verifiable Biometric Matching. 183-184 - Kun He, Christophe Bidan, Gaëtan Le Guelvouit:
Privacy Protection for JPEG Content on Image-Sharing Platforms. 185-186 - Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
PPE-Based Reversible Data Hiding. 187-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.