Stop the war!
Остановите войну!
for scientists:
default search action
6th IH&MMSec 2018: Innsbruck, Austria
- Rainer Böhme, Cecilia Pasquini, Giulia Boato, Pascal Schöttle:
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018. ACM 2018
Keynote 1
- Ross Anderson:
Covert and Deniable Communications. 1
Keynote 2
- Luisa Verdoliva:
Deep Learning in Multimedia Forensics. 3
JPEG & H.264 Steganography
- Weixiang Li, Weiming Zhang, Kejiang Chen, Wenbo Zhou, Nenghai Yu:
Defining Joint Distortion for JPEG Steganography. 5-16 - Dirk Borghys, Patrick Bas, Helena Bruyninckx:
Facing the Cover-Source Mismatch on JPHide using Training-Set Design. 17-22 - Yun Cao, Yu Wang, Xianfeng Zhao, Meineng Zhu, Zhoujun Xu:
Cover Block Decoupling for Content-Adaptive H.264 Steganography. 23-30
Biometrics and Forensics
- Yvonne Höller, Andreas Uhl:
Do EEG-Biometric Templates Threaten User Privacy? 31-42 - Huaxiao Mo, Bolin Chen, Weiqi Luo:
Fake Faces Identification via Convolutional Neural Network. 43-47 - Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann:
Generalized Benford's Law for Blind Detection of Morphed Face Images. 49-54
Deep Learning for Steganography
- Yuntao Wang, Kun Yang, Xiaowei Yi, Xianfeng Zhao, Zhoujun Xu:
CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain. 55-65 - Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, Nenghai Yu:
Adversarial Examples Against Deep Neural Network based Steganalysis. 67-72
CNN-based Media Forensics
- Bolin Chen, Weiqi Luo, Da Luo:
Identification of Audio Processing Operations Based on Convolutional Neural Network. 73-77 - Owen Mayer, Belhassen Bayar, Matthew C. Stamm:
Learning Unified Deep-Features for Multiple Forensic Tasks. 79-84 - Yaqi Liu, Qingxiao Guan, Xianfeng Zhao, Yun Cao:
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks. 85-90 - Yifang Chen, Xiangui Kang, Z. Jane Wang, Qiong Zhang:
Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks. 91-96
Embedding Impact in Steganography
- Yu Wang, Yun Cao, Xianfeng Zhao, Zhoujun Xu, Meineng Zhu:
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC. 97-107 - Tomás Pevný, Andrew D. Ker:
Exploring Non-Additive Distortion in Steganography. 109-114 - Andrew D. Ker:
On the Relationship Between Embedding Costs and Steganographic Capacity. 115-120
Encryption, Authentication, Anonymization
- Rudolf Schraml, Luca Debiasi, Andreas Uhl:
Real or Fake: Mobile Device Drug Packaging Authentication. 121-126 - Timo Richter, Stephan Escher, Dagmar Schönfeld, Thorsten Strufe:
Forensic Analysis and Anonymisation of Printed Documents. 127-138 - Heinz Hofbauer, Andreas Uhl:
Applicability of No-Reference Visual Quality Indices for Visual Security Assessment. 139-144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.