INFORMATION FOR SPEAKERS
Authors of full papers have 25 minutes for their presentation, and short papers are limited to 15 minutes. These include time for questions. Please help the workshop to run smoothly by keeping to time. The computing lab provides a Windows XP machine with Office 2003, from which your presentation can be run, or you may plug in your laptop to the projection system. Laptop line out can be amplified.
KEYNOTE ADDRESS
We are delighted to announce that a keynote address will be given by Prof. Ingemar Cox, BT Chair of Communications at University College London.
PROGRAM
Sunday 21 September
19:00
Opening Reception
in the Swire Seminar Room at University College, Oxford High St.
Monday 22 September
9:00
Welcome
Andrew Ker, University of Oxford
9:10
Forensics
session chair: Jana Dittmann, Otto-von-Guericke University, Magdeburg
#16
Printer Profiling for Forensics and Ballistics
#55
Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
#34
Detecting Digital Audio Forgeries by Checking Frame Offsets (short paper)
#17
Locating Steganographic Payload via WS Residuals (short paper)
10:30
Coffee
11:00
Watermarking
session chair: Patrick Bas, CNRS
#7
A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain
#61
A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces
#49
Self-Synchronizing Robust Texel Watermarking in Gaussian Scale-Space
#10
Multiple Re-Watermarking Using Varying Non-Stationary MRA with Parameterized Wavelet Filters (short paper)
#41
Histogram-Based Reversible Data Hiding Technique Using Subsampling (short paper)
12:45
Lunch
14:00
Coding & Encryption
session chair: Andreas Westfeld, TU Dresden
#52
Psycho-acoustic Model-based Message Authentication Coding for Audio Data
#47
Efficient Pointwise and Blockwise Encrypted Operations (short paper)
14:40
Fingerprinting & Tamperproofing
session chair: Andreas Westfeld, TU Dresden
#6
Tamper Proofing Mechanisms for Motion Capture Data
#37
On-Off Keying Modulation and Tardos Fingerprinting (short paper)
15:20
Coffee
15:50
Steganography
session chair: Jessica Fridrich, SUNY Binghamton
#68
The Square Root Law of Steganographic Capacity
#11
Secure Covert Channels in Multiplayer Games (short paper)
16:30
Rump Session
session chair: Jessica Fridrich, SUNY Binghamton
19:00
Conference Dinner at University College
Tuesday 23 September
9:00
Keynote address
Watermarking, Steganography and Content Forensics
10:00
Steganalysis
session chair: Andrew Ker, University of Oxford
#67
On Completeness of Feature Spaces in Blind Steganalysis
#24
Detecting LSB Matching by Applying Calibration Technique for Difference Image (short paper)
10:40
Coffee
11:10
Steganalysis (continued)
#35
Steganalysis of YASS
#62
Steganalysis of QIM Steganography Using Irregularity Measure
#65
Impact of Feature Selection in Classification for Hidden Channel Detection on the Example of Audio Data Hiding
#66
Novelty Detection in Blind Steganalysis
12:50
Lunch
14:00
Biometrics & Multimodal Methods
session chair: Balakrishnan Prabhakaran, University of Dallas
#33
Privacy-Preserving Multimodal Person and Object Identification
#63
Vehicle Systems: Comfort & Security Enhancement of Face/Speech Fusion with Compensational Biometrics
#29
Multimodal Authentication based on Random Projections and Distributed Coding
15:15
Coffee
15:45
Watermarking Attacks
session chair: Claus Vielhauer, Otto-von-Guericke University, Magdeburg
#38
Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol
#56
A Regression-Based Restoration Technique for Automated Watermark Removal (short paper)
#8
A Key-Recovery Attack on Authentication Watermarking by Li and Yuan (short paper)
#31
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes (short paper)
16:55
Closing Address
|