The 10th ACM Workshop
on Multimedia and Security

The 10th ACM Workshop
on Multimedia and Security

The 10th ACM Workshop
on Multimedia and Security

September 22-23, 2008
Oxford, UK

Key dates
Feb 1, 2008
Submissions open
Apr 15, 2008
Submissions end
Jun 13, 2008
Authors notified
Jun 20, 2008
Registration open
Jul 15, 2008
Camera ready by
Aug 18, 2008
Late registration
Sep 22-23, 2008
Workshop
Magdalen college tower
INFORMATION FOR SPEAKERS
Authors of full papers have 25 minutes for their presentation, and short papers are limited to 15 minutes. These include time for questions. Please help the workshop to run smoothly by keeping to time. The computing lab provides a Windows XP machine with Office 2003, from which your presentation can be run, or you may plug in your laptop to the projection system. Laptop line out can be amplified.


KEYNOTE ADDRESS
We are delighted to announce that a keynote address will be given by Prof. Ingemar Cox, BT Chair of Communications at University College London.


PROGRAM

Sunday 21 September
19:00
Opening Reception
in the Swire Seminar Room at University College, Oxford High St.

Monday 22 September
9:00
Welcome
Andrew Ker, University of Oxford
9:10
Forensics
session chair: Jana Dittmann, Otto-von-Guericke University, Magdeburg
#16
Printer Profiling for Forensics and Ballistics
Eric Kee, Dartmouth College; Hany Farid, Dartmouth College
#55
Fast and Reliable Resampling Detection by Spectral Analysis of Fixed Linear Predictor Residue
Matthias Kirchner, TU Dresden
#34
Detecting Digital Audio Forgeries by Checking Frame Offsets   (short paper)
Rui Yang, Sun Yat-Sen University; Zhenhua Qu, Sun Yat-Sen University; Jiwu Huang, Sun Yat-Sen University
#17
Locating Steganographic Payload via WS Residuals   (short paper)
Andrew D. Ker, University of Oxford
10:30
Coffee
11:00
Watermarking
session chair: Patrick Bas, CNRS
#7
A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain
Roland Kwitt, University of Salzburg; Peter Meerwald, University of Salzburg; Andreas Uhl, University of Salzburg
#61
A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces
Yang Liu, University of Texas at Dallas; Balakrishnan Prabhakaran, University of Dallas; Xiaohu Guo, University of Texas at Dallas
#49
Self-Synchronizing Robust Texel Watermarking in Gaussian Scale-Space
Mathias Schlauweg, University of Rostock; Dima Pröfrock, University of Rostock; Benedikt Zeibich, University of Rostock; Erika Müller, University of Rostock
#10
Multiple Re-Watermarking Using Varying Non-Stationary MRA with Parameterized Wavelet Filters   (short paper)
Andreas Uhl, University of Salzburg
#41
Histogram-Based Reversible Data Hiding Technique Using Subsampling   (short paper)
Kyung-Su Kim, KAIST; Min-Jeong Lee, KAIST; Heung-Kyu Lee, KAIST
12:45
Lunch
14:00
Coding & Encryption
session chair: Andreas Westfeld, TU Dresden
#52
Psycho-acoustic Model-based Message Authentication Coding for Audio Data
Sascha Zmudzinski, Fraunhofer SIT; Martin Steinebach, Fraunhofer SIT
#47
Efficient Pointwise and Blockwise Encrypted Operations   (short paper)
Tiziano Bianchi, University of Florence; Alessandro Piva, University of Florence; Mauro Barni, University of Siena
14:40
Fingerprinting & Tamperproofing
session chair: Andreas Westfeld, TU Dresden
#6
Tamper Proofing Mechanisms for Motion Capture Data
Parag Agarwal, University of Texas at Dallas; Balakrishnan Prabhakaran, University of Dallas
#37
On-Off Keying Modulation and Tardos Fingerprinting   (short paper)
Fuchun Xie, INRIA; Teddy Furon, INRIA; Caroline Fontaine, CNRS
15:20
Coffee
15:50
Steganography
session chair: Jessica Fridrich, SUNY Binghamton
#68
The Square Root Law of Steganographic Capacity
Andrew D. Ker, University of Oxford; Tomás Pevný, SUNY Binghamton; Jan Kodovský, SUNY Binghamton; Jessica Fridrich, SUNY Binghamton
#11
Secure Covert Channels in Multiplayer Games   (short paper)
Malte Diehl, Universität Oldenburg
16:30
Rump Session
session chair: Jessica Fridrich, SUNY Binghamton
19:00
Conference Dinner at University College

Tuesday 23 September
9:00
Keynote address
Watermarking, Steganography and Content Forensics
Ingemar Cox, University College London
10:00
Steganalysis
session chair: Andrew Ker, University of Oxford
#67
On Completeness of Feature Spaces in Blind Steganalysis
Jan Kodovský, SUNY Binghamton; Jessica Fridrich, SUNY Binghamton
#24
Detecting LSB Matching by Applying Calibration Technique for Difference Image   (short paper)
Xiaolong Li, Peking University; Tieyong Zeng, CNRS; Bin Yang, Peking University
10:40
Coffee
11:10
Steganalysis (continued)
#35
Steganalysis of YASS
Bin Li, Sun Yat-Sen University; Yun Shi, New Jersey Institute of Technology; Jiwu Huang, Sun Yat-Sen Unversity
#62
Steganalysis of QIM Steganography Using Irregularity Measure
Hafiz Malik, University of Michigan
#65
Impact of Feature Selection in Classification for Hidden Channel Detection on the Example of Audio Data Hiding
Christian Krätzer, Otto-von-Guericke University, Magdeburg; Jana Dittmann, Otto-von-Guericke University, Magdeburg
#66
Novelty Detection in Blind Steganalysis
Tomás Pevný, SUNY Binghamton; Jessica Fridrich, SUNY Binghamton
12:50
Lunch
14:00
Biometrics & Multimodal Methods
session chair: Balakrishnan Prabhakaran, University of Dallas
#33
Privacy-Preserving Multimodal Person and Object Identification
Oleksiy Koval, University of Geneva; Slava Voloshynovskiy, University of Geneva; Thierry Pun, University of Geneva
#63
Vehicle Systems: Comfort & Security Enhancement of Face/Speech Fusion with Compensational Biometrics
Michale Biermann, Otto-von-Guericke University, Magdeburg; Tobias Hoppe, Otto-von-Guericke University, Magdeburg; Jana Dittmann, Otto-von-Guericke University, Magdeburg; Claus Vielhauer, Otto-von-Guericke University, Magdeburg
#29
Multimodal Authentication based on Random Projections and Distributed Coding
Slava Voloshynovskiy, University of Geneva; Oleksiy Koval, University of Geneva; Thierry Pun, University of Geneva
15:15
Coffee
15:45
Watermarking Attacks
session chair: Claus Vielhauer, Otto-von-Guericke University, Magdeburg
#38
Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol
David Williams, University of Surrey; Helen Treharne, University of Surrey; Anthony Ho, University of Surrey; Chris Culnane, University of Surrey
#56
A Regression-Based Restoration Technique for Automated Watermark Removal   (short paper)
Andreas Westfeld, TU Dresden
#8
A Key-Recovery Attack on Authentication Watermarking by Li and Yuan   (short paper)
Hans Georg Schaathun, University of Surrey
#31
Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes   (short paper)
Patrick Bas, CNRS; Gwenaël Doërr, University College London
16:55
Closing Address