


default search action
9th IH&MMSec 2021: Virtual Event, Belgium
- Dirk Borghys, Patrick Bas, Luisa Verdoliva, Tomás Pevný, Bin Li, Jennifer Newman:

IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021. ACM 2021, ISBN 978-1-4503-8295-3 - François-Xavier Standaert:

Evaluating and Designing against Side-Channel Leakage: White Box or Black Box? 1 - Nicholas Carlini:

How Private is Machine Learning? 3 - Alexandre Sablayrolles:

Tracing Data through Learning with Watermarking. 5 - Florian Lugstein, Simon Baier, Gregor Bachinger, Andreas Uhl:

PRNU-based Deepfake Detection. 7-12 - Zhenyu Zhang, Xiaowei Yi, Xianfeng Zhao

:
Fake Speech Detection Using Residual Network with Transformer Encoder. 13-22 - Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann:

Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences. 23-33 - Supriya Adhatarao, Cédric Lauradoux:

Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files? 35-44 - Aykut Büker

, Cemal Hanilçi:
Angular Margin Softmax Loss and Its Variants for Double Compressed AMR Audio Detection. 45-50 - Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:

FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. 51-62 - Alberto Ibarrondo

, Hervé Chabanne, Melek Önen:
Banners: Binarized Neural Networks with Replicated Secret Sharing. 63-74 - Sayed Erfan Arefin

, Abdul Serwadda:
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture! 75-80 - Alexander Schlögl, Tobias Kupek, Rainer Böhme:

iNNformant: Boundary Samples as Telltale Watermarks. 81-86 - Michael Linortner, Andreas Uhl:

Towards Match-on-Card Finger Vein Recognition. 87-92 - Andrey Makrushin

, Christof Kauba
, Simon Kirchgasser, Stefan Seidlitz, Christian Kraetzer, Andreas Uhl, Jana Dittmann:
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations. 93-104 - Solène Bernard, Patrick Bas, Tomás Pevný, John Klein:

Optimizing Additive Approximations of Non-additive Distortion Functions. 105-112 - Kevin Lamshöft

, Tom Neubert, Christian Krätzer, Claus Vielhauer, Jana Dittmann:
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset. 113-124 - Jan Butora, Jessica J. Fridrich:

Revisiting Perturbed Quantization. 125-136 - Huili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, Yongfeng Huang

:
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice. 137-142 - Jan Butora, Yassine Yousfi, Jessica J. Fridrich:

How to Pretrain for Steganalysis. 143-148 - Yassine Yousfi, Jan Butora, Jessica J. Fridrich, Clément Fuji Tsang:

Improving EfficientNet for JPEG Steganalysis. 149-157 - April Pyone Maung Maung, Hitoshi Kiya:

Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key. 159-164 - Minoru Kuribayashi

, Takuro Tanaka, Shunta Suzuki, Tatsuya Yasui, Nobuo Funabiki:
White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model. 165-170 - Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Hugo Beguinet, Hugo Senet:

A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models. 171-176 - Masoumeh Shafieinejad, Nils Lukas, Jiaqi Wang, Xinda Li, Florian Kerschbaum:

On the Robustness of Backdoor-based Watermarking in Deep Neural Networks. 177-188 - Mauro Barni, Fernando Pérez-González, Benedetta Tondi:

DNN Watermarking: Four Challenges and a Funeral. 189-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














