IH&MMSec '16- Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
SESSION: Keynote 1
Machine Learning under Attack: Vulnerability Exploitation and Security Measures
- Battista Biggio
SESSION: Keynote 2
Bringing Multimedia Security from the Research Lab to the Forensic Lab
- Martino Jerian
SESSION: Forensics, Fingerprinting and Reversible Watermarking
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
- Belhassen Bayar
- Matthew C. Stamm
Forensics of High Quality and Nearly Identical JPEG Image Recompression
- Cecilia Pasquini
- Pascal Schöttle
- Rainer Böhme
- Giulia Boato
- Fernando Pèrez-Gonzàlez
A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack
- Hiroki Koga
- Kaoru Itabashi
Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram
- Junxiang Wang
- Jiangqun Ni
- Xing Zhang
A Novel CDMA Based High Performance Reversible Data Hiding Scheme
- Bin Ma
- Jian Xu
- Yun Q. Shi
SESSION: Privacy
Dynamic Privacy-Preserving Genomic Susceptibility Testing
- Mina Namazi
- Juan Ramón Troncoso-Pastoriza
- Fernando Pérez-González
Group Testing for Identification with Privacy
- Ahmet Iscen
- Teddy Furon
Differentially Private Matrix Factorization using Sketching Techniques
- Raghavendran Balu
- Teddy Furon
Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)
- Jia Duan
- Jiantao Zhou
- Yuanman Li
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
- Hung Dang
- Yun Long Chong
- Francois Brun
- Ee-Chien Chang
SESSION: Steganography and Steganalysis I
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions
- Sebastian Berndt
- Maciej Liśkiewicz
Rethinking Optimal Embedding
- Andrew D. Ker
- Tomáš Pevnỳ
- Patrick Bas
Ensemble of CNNs for Steganalysis: An Empirical Study
- Guanshuo Xu
- Han-Zhou Wu
- Yun Q.. Shi
Color Image Steganalysis Based On Steerable Gaussian Filters Bank
- Hasan Abdulrahman
- Marc Chaumont
- Philippe Montesinos
- Baptiste Magnier
SESSION: Steganography and Steganalysis II
A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels
- Brent Carrara
- Carlisle Adams
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution
- Peipei Wang
- Hong Zhang
- Yun Cao
- Xianfeng Zhao
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography
- Zengzhen Zhao
- Qingxiao Guan
- Xianfeng Zhao
Boosting Steganalysis with Explicit Feature Maps
- Mehdi Boroumand
- Jessica Fridrich
SESSION: Information Hiding and Cryptography
Information Hiding in the RSA Modulus
- Stefan Wüller
- Marián Kühnel
- Ulrike Meyer
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye
- Jong-Uk Hou
- Dongkyu Kim
- Hyun-Ji Song
- Heung-Kyu Lee
Image Segmentation Based Visual Security Evaluation
- Christof Kauba
- Stefan Mayer
- Andreas Uhl
SESSION: Ongoing works
Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]
- David Megias
- Amna Qureshi
Study of a Verifiable Biometric Matching
- Hervé Chabanne
- Julien Keuffer
- Roch Lescuyer
Privacy Protection for JPEG Content on Image-Sharing Platforms
- Kun He
- Christophe Bidan
- Gaëtan Le Guelvouit
PPE-Based Reversible Data Hiding
- Han-Zhou Wu
- Hong-Xia Wang
- Yun-Qing Shi