acm_logo
gen
unige

 cvml

Home




Programme



Registration


Location/Hotels/Travel


.

Tuesday, September 26


Time

Topic

Person

8:00-8:50
Registration  
8:50-9:00
Welcome Sviatoslav Voloshynovskiy

Session: Steganography and steganalysis
9:00-9:30
Minimizing the Embedding Impact in Steganography Jessica Fridrich
9:30-9:50
Information-theoretic analysis of steganalysis in real images Oleksiy Koval, Sviatoslav Voloshynovskiy,
Taras Holotyak, Thierry Pun
9:50-10:10
WLAN Steganography: a first practical review Christian Krätzer
10:10-10:30
Digital Invisible Ink and its Applications in Steganography Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
10:30-10:50
Coffee Break
 

Session: Authentication and forensics
10:50-11:20
Exposing Digital Forgeries in Scientific Images Hany Farid
11:20-11:50
Exposing Digital Forgeries in Video by Detecting Double MPEG Compression Weihong Wang, Hany Farid
11:50-12:20
Exposing Digital Forgeries Through Chromatic Aberration Micah Johnson, Hany Farid
12:20-12:40
Robust, Short and Sensitive Authentication Tags Using Secure Sketch Qiming Li, Ee-Chien Chang
12:40-13:00
JPEG2000-based Secure Image Authentication Mathias Schlauweg, Dima Pröfrock, Erika Müller
13:00-14:00
Lunch break  

Session:Security analysis I
14:00-14:30
On achievable security levels for lattice data hiding in the Known Message Attack scenario Luis Perez-Freire, Fernando Perez-Gonzalez,
Teddy Furon
14:30-15:00
Achieving Subspace or Key Security for WOA using Natural or Circular watermarking Patrick Bas
15:00-15:30
On reversibility of random binning based data-hiding techniques: security perspectives Sviatoslav Voloshynovskiy, Oleksiy Koval, Emre Topak, Jose Vila, Thierry Pun
15:30-16:00
Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks Juan Ramón Troncoso-Pastoriza,
Fernando Perez-Gonzalez
16:00-16:30
Coffee break  

Session: Applications I
16:30-16:50
Estimation of Recording Location Using Audio Watermarking Yuta Nakashima, Ryuki Tachibana,
Masafumi Nishimura, NoboruBabaguchi
16:50-17:10
Assessing MotionCoherency in Video Watermarking Vinod P, Gwenael Doerr, P.K. Bora
17:10-17:30
A digital watermark for vector-based fonts Stefan Thiemert, Martin Steinebach
17:30-17:50
Real-Time Watermark Embedding for High Resolution Video on Personal Computer InKoo Kang, Dong-Hyuck Im, Hyung-Kyu Lee
17:50-18:10
Parameter Optimization for Biometric Fingerprint Recognition Using Genetic Algorithms Tobias Scheidat, Andreas Engel and Claus Vielhauer
18:10-18:30
An Improvement to a Biometric-Based Multimedia Content Protection Scheme Daniel Socek, Michal Sramka, Oge Marques,
Dubravko Culibrk
19:30-open end
Gala Dinner
 


Wednesday, September 27


Time

Topic

Person

9:00-10:00
Keynote Speaker:

10:00-10:20
Coffee Break  

Session: Security analysis II
10:20-10:40
Robustness and Security of a Wavelet-based CBIR Hashing Algorithm Andreas Uhl, Albert Meixner
10:40-11:00
A Privacy-Preserving Protocol for Neural-Network-Based Computation Mauro Barni, Claudio Orlandi, Alessandro Piva
11:00-11:20
Digital Watermarking Security Considerations Rade Petrovic
11:20-11:40
Zero-Knowledge Watermark Detection Resistant to Ambiguity Attacks Qiming Li, Ee-Chien Chang

Session: Applications II
11:40-12:10
The Hiding Virtues of Ambiguity: Quantifiably Resilient Watermarking of Natural Language Text through Synonym Substitutions Umut Topkara, Mercan Topkara, Mikhail J. Atallah
12:10-12:40
Extraction In Software Watermarking William Zhu, Clark Thomborson, Fei-Yue Wang
12:40-13:10
Image Annotation Watermarking: Nested Object Embedding using Hypergraph Model Clauss Vielhauer and Maik Schott
13:10-14:00
Lunch Break  

Session: Benchmarking and attacks
14:00-14:30
Transparency and complexity benchmarking of audio watermarking algorithm issues Andreas Lang
14:30-14:50
A Symbolic Transform Attack on Lightweight Encryption Based on Wavelet Filter Parameterization Dominik Engel, Rade Kutil, Andreas Uhl
14:50-15:10
Lessons from the BOWS Contest Andreas Westfeld
15:10-15:30
Coffee break  

Session: Performance analysis and enhancement
15:30-16:00
Embedding with Syndrome Coding based on BCH Codes Dagmar Schönfeld, Antje Schneidewind
16:00-16:20
Hermite polynomials as provably good functions to watermark white gaussian hosts Teddy Furon
16:20-16:40
Robust blind watermarking mechanism for motion data streams Parag Agarwal, Ketaki Adi, Balakrishnan Prabhakaran
16:40-16:50
Workshop Summary