|
|
|
|
Time |
Topic |
Person |
8:00-8:50
|
Registration | |
8:50-9:00
|
Welcome | Sviatoslav Voloshynovskiy |
|
Session: Steganography and steganalysis | |
9:00-9:30
|
Minimizing the Embedding Impact in Steganography | Jessica Fridrich |
9:30-9:50
|
Information-theoretic analysis of steganalysis in real images | Oleksiy Koval, Sviatoslav Voloshynovskiy, Taras Holotyak, Thierry Pun |
9:50-10:10
|
WLAN Steganography: a first practical review | Christian Krätzer |
10:10-10:30 |
Digital Invisible Ink and its Applications in Steganography | Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu |
10:30-10:50
|
Coffee Break |
|
|
Session: Authentication and forensics | |
10:50-11:20
|
Exposing Digital Forgeries in Scientific Images | Hany Farid |
11:20-11:50
|
Exposing Digital Forgeries in Video by Detecting Double MPEG Compression | Weihong Wang, Hany Farid |
11:50-12:20
|
Exposing Digital Forgeries Through Chromatic Aberration | Micah Johnson, Hany Farid |
12:20-12:40 |
Robust, Short and Sensitive Authentication Tags Using Secure Sketch | Qiming Li, Ee-Chien Chang |
12:40-13:00 |
JPEG2000-based Secure Image Authentication | Mathias Schlauweg, Dima Pröfrock, Erika Müller |
13:00-14:00
|
Lunch break | |
|
Session:Security analysis I | |
14:00-14:30
|
On achievable security levels for lattice data hiding in the Known Message Attack scenario | Luis Perez-Freire, Fernando Perez-Gonzalez, Teddy Furon |
14:30-15:00
|
Achieving Subspace or Key Security for WOA using Natural or Circular watermarking | Patrick Bas |
15:00-15:30
|
On reversibility of random binning based data-hiding techniques: security perspectives | Sviatoslav Voloshynovskiy, Oleksiy Koval, Emre Topak, Jose Vila, Thierry Pun |
15:30-16:00
|
Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks | Juan
Ramón Troncoso-Pastoriza, Fernando Perez-Gonzalez |
16:00-16:30
|
Coffee break | |
|
Session: Applications I | |
16:30-16:50
|
Estimation of Recording Location Using Audio Watermarking | Yuta
Nakashima, Ryuki Tachibana, Masafumi Nishimura, NoboruBabaguchi |
16:50-17:10
|
Assessing MotionCoherency in Video Watermarking | Vinod P, Gwenael Doerr, P.K. Bora |
17:10-17:30
|
A digital watermark for vector-based fonts | Stefan
Thiemert, Martin Steinebach |
17:30-17:50
|
Real-Time Watermark Embedding for High Resolution Video on Personal Computer | InKoo
Kang, Dong-Hyuck Im, Hyung-Kyu Lee |
17:50-18:10 |
Parameter Optimization for Biometric Fingerprint Recognition Using Genetic Algorithms | Tobias Scheidat, Andreas Engel and Claus Vielhauer |
18:10-18:30 |
An Improvement to a Biometric-Based Multimedia Content Protection Scheme | Daniel Socek,
Michal Sramka, Oge Marques, Dubravko Culibrk |
19:30-open end
|
Gala Dinner |
Time |
Topic |
Person |
9:00-10:00
|
Keynote Speaker: |
|
10:00-10:20
|
Coffee Break | |
|
Session: Security analysis II | |
10:20-10:40
|
Robustness and Security of a Wavelet-based CBIR Hashing Algorithm | Andreas Uhl, Albert Meixner |
10:40-11:00
|
A Privacy-Preserving Protocol for Neural-Network-Based Computation | Mauro Barni, Claudio Orlandi, Alessandro Piva |
11:00-11:20
|
Digital Watermarking Security Considerations | Rade Petrovic |
11:20-11:40
|
Zero-Knowledge Watermark Detection Resistant to Ambiguity Attacks | Qiming Li, Ee-Chien Chang |
|
Session: Applications II | |
11:40-12:10
|
The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions | Umut Topkara, Mercan Topkara, Mikhail J. Atallah |
12:10-12:40
|
Extraction In Software Watermarking | William Zhu, Clark Thomborson, Fei-Yue Wang |
12:40-13:10 |
Image Annotation Watermarking: Nested Object Embedding using Hypergraph Model | Clauss Vielhauer and Maik Schott |
13:10-14:00
|
Lunch Break | |
|
Session: Benchmarking and attacks | |
14:00-14:30
|
Transparency and complexity benchmarking of audio watermarking algorithm issues | Andreas Lang |
14:30-14:50
|
A Symbolic Transform Attack on Lightweight Encryption Based on Wavelet Filter Parameterization | Dominik Engel, Rade Kutil, Andreas Uhl |
14:50-15:10
|
Lessons from the BOWS Contest | Andreas Westfeld |
15:10-15:30
|
Coffee break | |
|
Session: Performance analysis and enhancement | |
15:30-16:00
|
Embedding with Syndrome Coding based on BCH Codes | Dagmar Schönfeld, Antje Schneidewind |
16:00-16:20
|
Hermite polynomials as provably good functions to watermark white gaussian hosts | Teddy Furon |
16:20-16:40
|
Robust blind watermarking mechanism for motion data streams | Parag Agarwal, Ketaki Adi, Balakrishnan Prabhakaran |
16:40-16:50
|
Workshop Summary |