


default search action
12th IH&MMSec 2025: San Jose, CA, USA
- Shruti Agarwal, Scott Craver, Shan Jia, Chau-Wai Wong, Benedetta Tondi:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC 2025, San Jose, USA, June 18-20, 2025. ACM 2025, ISBN 979-8-4007-1887-8 - Joy Battocchio
, Stefano Dell'Anna
, Andrea Montibeller
, Giulia Boato
:
Advance Fake Video Detection via Vision Transformers. 1-11 - Yu Cai
, Peng Chen
, Jiahe Tian
, Jin Liu
, Jiao Dai
, Xi Wang
, Shan Jia
, Siwei Lyu
, Jizhong Han
:
Modality-Agnostic Deepfakes Detection. 12-23 - Yiran He, Yun Cao, Bowen Yang
, Zeyu Zhang
:
Can GPT tell us why these images are synthesized? Empowering Multimodal Large Language Models for Forensics. 24-34 - Diego Soi
, Silvia Lucia Sanna
, Giacomo Benedetti
, Angelica Liguori
, Leonardo Regano
, Luca Caviglione
, Giorgio Giacinto
:
Analysis and Detection of Android Stegomalware: the Impact of the Loading Stage. 35-45 - Jana Dittmann
, Stefan Kiltz
, Robert Altschaffel
, Judith Antal
:
Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor. 46-51 - Claus Vielhauer
, Fabian Loewe
, Michael Pilgermann
:
Towards Modeling Hidden & Steganographic Malware Communication based on Images. 52-63 - Felix Feist
, Sebastian Karius
, Mandy Knöchel
, Sandro Wefel
:
Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware. 64-73 - Pascal Tippe
, Adrian Tippe
, Jörg Keller
:
Detecting and Attributing Tor-Obfuscated Malware Communications Through Traffic Fingerprinting. 74-79 - João Phillipe Cardenuto
, Joshua Krinsky
, Lucas Nogueira
, Aparna Bharati
, Daniel Moreira
:
Implications of Neural Compression to Scientific Images. 80-85 - Martin Zbudila
, Aysajan Abidin
, Bart Preneel
:
Exploring Adversarial Attacks on the MaSTer Truncation Protocol. 86-97 - Mahdi Rahimi
:
MOCHA: Mixnet Optimization Considering Honest Client Anonymity. 98-107 - Hoover H. F. Yin
, Harry W. H. Wong
:
How (Not) to Build Dual-Regev Covert Channel. 108-113 - Shengnan Guo
, Kaiyi Pang
, Zhongliang Yang
, Yamin Li
, Yu Qing
, Yongfeng Huang
:
Reinforcement Learning-based Copyright Protection Watermarking for Large Language Model. 114-120 - Eli Dworetzky
, Jessica J. Fridrich
:
Secure Payload Scaling in Detector-Informed Batch Steganography: The Mismatched Detectors Case. 121-130 - Ziping Zhang
, Jiamin Zeng
, Yan Xu, Xiaowei Yi
, Yun Cao
, Changjun Liu:
Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media Channels. 131-141 - Saixing Zhou
, Miaoxin Ye
, Weiqi Luo
, Xin Liao
, Kangkang Wei
:
Color Image Steganography Using Generative Adversarial Networks with a Phased Training Strategy. 142-152 - Yufei Luo
, Zhen Yang
, Xin Xu
, Yelei Wang
, Ru Zhang
, Yongfeng Huang
:
Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis. 153-163 - Edgar Kaziakhmedov
, Jessica J. Fridrich
, Patrick Bas
:
Effect of Acquisition Noise Outliers on Steganalysis. 164-173 - Kirill Trapeznikov
, Paul Cummer
, Pranay Pherwani
, Jai Aslam
, Michael Davinroy
, Peter Bautista
, Laura Cassani
, Matthew C. Stamm
:
SAFE: Synthetic Audio Forensics Evaluation Challenge. 174-180 - Candy Olivia Mawalim
, Yutong Wang
, Aulia Adila
, Shogo Okada
, Masashi Unoki
:
Robust Multilingual Audio Deepfake Detection Through Hybrid Modeling. 181-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.