Program:

27 papers accepted, 74 papers submitted, Acceptance Rate = 36%.

The proceedings of the conference may be found on the ACM Digital Library at: 
http://dl.acm.org/citation.cfm?id=2482513

The Best Paper Award is given to:
Wei Fan, Kai Wang, François Cayre and Zhang Xiong. JPEG Anti-forensics 
Using Non-parametric DCT Quantization Noise Estimation and Natural Image Statistics

The Best Student Paper Award  is given to:
Vojtech Holub and Jessica Fridrich. 
Digital Image Steganography Using 
Universal Distortion

Previous best papers for ACM europe may be found at: 
http://europe.acm.org/best-paper.html

 

Monday 17/6

9:00 AM – 11:15 AM: Registration

11:15 AM - 11:30 AM: Welcome talk

11:30 AM - 12:30 PM: Invited talk, chaired by Stefan Katzenbeisser

Carmela Tronsoco: Bayesian inference to evaluate information leakage in complex scenarios

12:30 PM - 2:00 PM: Lunch

2:00 PM - 4:10 PM: Session "Tracing", chaired by Patrick Bas

 14h00-14h30: Minoru Kuribayashi. A Simple Tracing Algorithm for Binary Fingerprinting Code under Averaging Attack

 14h30-14h50: Thijs Laarhoven and Benne de Weger. Discrete Distributions in the Tardos Scheme, Revisited

 14h50-15h20: Jan-Jaap Oosterwijk, Boris Skoric and Jeroen Doumen. Optimal Suspicion Functions for Tardos Traitor Tracing Schemes

 15h20-15h40: Waldemar Berchtold, Marcel Schaefer and Martin Steinebach. Leakage Detection and Tracing for Databases

 15h40-16h10: Serdar Pehlivanoglu. An Asymmetric Fingerprinting Code for Collusion-Resistant Buyer-Seller Watermarking 

4:10 PM - 4:30 PM: Coffee break

4:30 PM - 6:30 PM: Session "Moving steganography and steganalysis from the laboratory to the real world", chaired by Andrew Ker

 16h30-17h00: Andrew Ker, Patrick Bas, Rainer Boehme, Remi Cogranne, Scott Craver, Tomas Filler, Jessica Fridrich and Tomas Pevny. Moving Steganography and Steganalysis from the Laboratory into the Real World

 17h00-17h30: Vojtech Holub and Jessica Fridrich. Digital Image Steganography Using Universal Distortion

 17h30-18h00: Fangjun Huang, Weiqi Luo, Jiwu Huang and Yun-Qing Shi. Distortion Function Designing for JPEG Steganography with Uncompressed Side-image

 18h00-18h30: Zhenyu Li, Fenlin Liu, Xiangyang Luo, Chunfang Yang and Xiaofeng Song. Embedding change rate estimation based on ensemble learning

6:30 PM -7:30 PM: Steering Comittee Meeting

---

Tuesday 18/6

8:30 AM - 9:30 AM: Invited talk, chaired by Gwenaël Doerr

Dominik Engel: Privacy and Security Challenges in the Smart Grid User Domain

9:30 AM - 9:50 AM: Coffee break

9:50 AM - 11:20 AM: Session "From Biometric to Forensics", chaired by Chang-Tsun Li and Massimo Tistarelli, and Victor Sanchez

 9h50-10h10: Anh Thu Phan Ho, Bao An Mai Hoang, Wadih Sawaya and Patrick Bas. Document authentication using graphical codes: impacts of the channel model

 10h10-10h40: Ronny Merkel, Karen Otte, Robert Clausing, Jana Dittmann, Claus Vielhauer and Anja Bräutigam. First Investigation of Latent Fingerprints Long-term Aging using Chromatic White Light Sensors

 10h40-11h00: Jutta Hämmerle-Uhl, Elias Pschernig and Andreas Uhl. Non-Invertible and Revocable Iris Templates using Key-dependent Wavelet Transforms

 11h00-11h20: Jutta Hämmerle-Uhl, Michael Pober and Andreas Uhl. Towards Standardised Fingerprint Matching Robustness Assessment: The StirMark Toolkit - Cross-Database Comparisons with Minutiae-based Matching 

11:20 AM -12:40 PM: Session "End User and Signal Processing: a successful synergy towards the assessment of forensic tools" - Part 1 -, chaired by Marco Carli.

 11h20-11h40: Wei Fan, Kai Wang, François Cayre and Zhang Xiong. JPEG Anti-forensics Using Non-parametric DCT Quantization Noise Estimation and Natural Image Statistics

 11h40-12h10: Irene Amerini, Mauro Barni, Roberto Caldelli and Andrea Costanzo. SIFT keypoint removal and injection for countering matching-based Image Forensics

 12h10-12h40: Jakob Hasse, Thomas Gloe and Martin Beck. Forensic Identification of GSM Mobile Phones

12:40 PM - 2:10 PM: Lunch

2:10 PM - 3:40 PM: Session "End User and Signal Processing: a successful synergy towards the assessment of forensic tools" - Part 2 -, chaired by Marco Carli.

 14h10-14h40: Cemal Hanilci and Figen Ertas. Optimizing Acoustic Features for Source Cell-Phone Recognition Using Speech Signals

 14h40-15h10: Shijun Xiang. Exposing Digital Audio Forgeries in Time Domain by Using Singularity Analysis with Wavelets

 15h10-15h40: Tiziano Bianchi, Alessia De Rosa, Marco Fontani, Giovanni Rocciolo and Alessandro Piva. Detection and classification of double compressed MP3 audio tracks

3:40 PM - 4:00 PM: Coffee break

4:00 PM - 5:20 PM: Session "Media encryption", chaired by Andreas Uhl

 16h00-16h30: Dominik Engel, Andreas Uhl and Andreas Unterweger. Region of Interest Signalling For Encrypted JPEG Images

 16h30-16h50: Benjamin Mathon, Teddy Furon, Laurent Amsaleg and Julien Bringer. Secure and efficient approximate nearest neighbors search

 16h50-17h20: Xiaotian Wu, Duanhao Ou, Lu Dai and Wei Sun. XOR-based meaningful visual secret sharing by generalized random grid

5:30 PM: Social event

---

Wednesday 19/6

9:00 AM - 10:00 AM: Invited Talk, chaired by Jana Dittmann

Anthony TS Ho: On the Intertwining of Information Hiding and Multimedia Security: A Personal Perspective

10:00 AM - 10:30 AM: Coffee break

10:30 AM - 12:30 PM: Session "Watermarking", chaired by Dinu Coltuc

 10h30-11h00: Oren Halvani, Martin Steinebach, Patrick Wolf and Ralf Zimmermann. Natural Language Watermarking for German Texts

 11h00-11h20: Babak Moussakhani, Mohammad Ali Sedaghat, John Flåm and Tor Ramstad. On Optimal Detection for Matrix Multiplicative Data Hiding

 11h20-11h40: Ines Bouzidi, Azza Ouled Zaid, Meha Hachani and William Puech. Joint Watermarking and Progressive Geometric Compression of 3D Meshes

 11h40-12h00: Dinu Coltuc and Catalin Dragoi. Context Embedding for Raster-Scan Rhombus Based Reversible Watermarking

 12h00-12h30: Jacky Jiang, Kenny Zhu, Yan Huang and Xiaobin Ma. Watermarking Road Maps against Crop and Merge Attacks

12:30 PM: End talk