Technical Program
This is the tentative technical program for the workshop. Not listed here is registration, a reception Sunday evening, and a banquet/social event on Monday evening.
The program includes short papers and full papers. Short papers are given a 20-minute time slot for presentation, full papers a 30-minute time slot. The speaker is expected to reserve time for questions.
Sunday, September 6 | |
---|---|
7-9 pm | Registration and reception at Princeton Center for Information Technology Policy, Sherrerd Hall |
Monday, September 7 | |
9:00 | Welcome and opening remarks |
9:30-10:30 | Watermarking I |
Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme An efficient buyer-seller watermarking protocol based on composite signal representation |
|
10:30-11:00 | Coffee Break |
11:00-12:00 | Watermarking II |
Reversible Data Hiding Using Additive Prediction-Error Expansion Additive spread-spectrum watermark detection in demosaicked images Optimization of Natural Watermarking Using Transportation Theory |
|
12:00-1:30 | Lunch |
1:30-2:50 | Forensics I |
Exposing Digital Forgeries in Video by Detecting Double Quantization Unweighted Fusion in Microphone Forensics using a Decision Tree and Linear Logistic Regression Models MP3 Bit Rate Quality Detection through Frequency Spectrum Analysis |
|
2:50-3:20 | Coffee Break |
3:20-4:50 | Steganalysis |
Calibration Revisited Steganalysis by Subtractive Pixel Adjacency Matrix The Square Root Law Requires a Linear Key |
|
6:30pm | Banquet at the Mountain Lakes House, Princeton |
Tuesday, September 8 | |
---|---|
9:00-10:00 | Fingerprinting |
Performance Study and Improvement on ECC-based Binary Anti-Collusion Forensic Code for Multimedia EM decoding of Tardos traitor tracing codes |
|
10:00-10:30 | Coffee Break |
10:30-11:50 | Forensics II |
Detection of Seam Carving and Localization of Seam Insertions in Digital Images Defeating Fake-Quality MP3 A Pixel-Based Digital Photo Authentication Framework via Demosaicking Inter-Pixel Correlation |
|
12:00-1:30 | Lunch |
1:30-2:50 | Steganography |
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding Improved Embedding Based on a Set of Cover Images A Supraliminal Channel in a Wireless Phone Application |
|
2:50-3:20 | Coffee Break |
3:20-4:30 | Encryption |
Entropy Codec Based on Evolutionary MHT and Its Application in Video Encryption Selective Encryption of the MC EZBC Bitstream for DRM Scenarios BLINK: Pixel-Domain Encryption for Secure Document Management |
|