IH&MMSec '16- Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security

SESSION: Keynote 1

Machine Learning under Attack: Vulnerability Exploitation and Security Measures

  • Battista Biggio

SESSION: Keynote 2

Bringing Multimedia Security from the Research Lab to the Forensic Lab

  • Martino Jerian

SESSION: Forensics, Fingerprinting and Reversible Watermarking

A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer

  • Belhassen Bayar
  • Matthew C. Stamm

Forensics of High Quality and Nearly Identical JPEG Image Recompression

  • Cecilia Pasquini
  • Pascal Schöttle
  • Rainer Böhme
  • Giulia Boato
  • Fernando Pèrez-Gonzàlez

A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack

  • Hiroki Koga
  • Kaoru Itabashi

Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram

  • Junxiang Wang
  • Jiangqun Ni
  • Xing Zhang

A Novel CDMA Based High Performance Reversible Data Hiding Scheme

  • Bin Ma
  • Jian Xu
  • Yun Q. Shi

SESSION: Privacy

Dynamic Privacy-Preserving Genomic Susceptibility Testing

  • Mina Namazi
  • Juan Ramón Troncoso-Pastoriza
  • Fernando Pérez-González

Group Testing for Identification with Privacy

  • Ahmet Iscen
  • Teddy Furon

Differentially Private Matrix Factorization using Sketching Techniques

  • Raghavendran Balu
  • Teddy Furon

Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)

  • Jia Duan
  • Jiantao Zhou
  • Yuanman Li

Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation

  • Hung Dang
  • Yun Long Chong
  • Francois Brun
  • Ee-Chien Chang

SESSION: Steganography and Steganalysis I

Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions

  • Sebastian Berndt
  • Maciej Liśkiewicz

Rethinking Optimal Embedding

  • Andrew D. Ker
  • Tomáš Pevnỳ
  • Patrick Bas

Ensemble of CNNs for Steganalysis: An Empirical Study

  • Guanshuo Xu
  • Han-Zhou Wu
  • Yun Q.. Shi

Color Image Steganalysis Based On Steerable Gaussian Filters Bank

  • Hasan Abdulrahman
  • Marc Chaumont
  • Philippe Montesinos
  • Baptiste Magnier

SESSION: Steganography and Steganalysis II

A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels

  • Brent Carrara
  • Carlisle Adams

A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution

  • Peipei Wang
  • Hong Zhang
  • Yun Cao
  • Xianfeng Zhao

Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography

  • Zengzhen Zhao
  • Qingxiao Guan
  • Xianfeng Zhao

Boosting Steganalysis with Explicit Feature Maps

  • Mehdi Boroumand
  • Jessica Fridrich

SESSION: Information Hiding and Cryptography

Information Hiding in the RSA Modulus

  • Stefan Wüller
  • Marián Kühnel
  • Ulrike Meyer

Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

  • Jong-Uk Hou
  • Dongkyu Kim
  • Hyun-Ji Song
  • Heung-Kyu Lee

Image Segmentation Based Visual Security Evaluation

  • Christof Kauba
  • Stefan Mayer
  • Andreas Uhl

SESSION: Ongoing works

Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]

  • David Megias
  • Amna Qureshi

Study of a Verifiable Biometric Matching

  • Hervé Chabanne
  • Julien Keuffer
  • Roch Lescuyer

Privacy Protection for JPEG Content on Image-Sharing Platforms

  • Kun He
  • Christophe Bidan
  • Gaëtan Le Guelvouit

PPE-Based Reversible Data Hiding

  • Han-Zhou Wu
  • Hong-Xia Wang
  • Yun-Qing Shi