Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/mmsec:"
@inproceedings{DBLP:conf/ih/0001B24, author = {Martin Benes and Rainer B{\"{o}}hme}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Exploring Diffusion-Inspired Pixel Predictors for {WS} Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {75--86}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659645}, doi = {10.1145/3658664.3659645}, timestamp = {Thu, 13 Jun 2024 09:33:01 +0200}, biburl = {https://dblp.org/rec/conf/ih/0001B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AliSSVM24, author = {Hashim Ali and Surya Subramani and Shefali Sudhir and Raksha Varahamurthy and Hafiz Malik}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Is Audio Spoof Detection Robust to Laundering Attacks?}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {283--288}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659656}, doi = {10.1145/3658664.3659656}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/AliSSVM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BhagtaniYBD24, author = {Kratika Bhagtani and Amit Kumar Singh Yadav and Paolo Bestagini and Edward J. Delp}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Are Recent Deepfake Speech Generators Detectable?}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {277--282}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659658}, doi = {10.1145/3658664.3659658}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BhagtaniYBD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraB24, author = {Jan Butora and Patrick Bas}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {The Adobe Hidden Feature and its Impact on Sensor Attribution}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {143--148}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659650}, doi = {10.1145/3658664.3659650}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CannasMBT24, author = {Edoardo Daniele Cannas and Sara Mandelli and Paolo Bestagini and Stefano Tubaro}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Investigating Translation Invariance and Shiftability in CNNs for Robust Multimedia Forensics: {A} {JPEG} Case Study}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {53--63}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659644}, doi = {10.1145/3658664.3659644}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CannasMBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DiazCCT0ARRG24, author = {Judith S{\'{a}}inz{-}Pardo D{\'{\i}}az and Andr{\'{e}}s Heredia Canales and Ignacio Heredia Cacha and Viet D. Tran and Giang T. Nguyen and Khadijeh Alibabaei and Marta Obreg{\'{o}}n Ruiz and Susana Rebolledo Ruiz and {\'{A}}lvaro L{\'{o}}pez Garc{\'{\i}}a}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Making Federated Learning Accessible to Scientists: The {AI4EOSC} Approach}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {253--264}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659642}, doi = {10.1145/3658664.3659642}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DiazCCT0ARRG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DittmannKAB24, author = {Jana Dittmann and Christian Kraetzer and Jost Alemann and Bernhard Birnbaum}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Forensic Trace Analysis for {MP3} based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive {YARA} Rules for Malware Identification}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {101--112}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659641}, doi = {10.1145/3658664.3659641}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DittmannKAB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Doerr24, author = {Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Digital Flamenco with Video Pirates}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {1--2}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659663}, doi = {10.1145/3658664.3659663}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Doerr24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DworetzkyKF24, author = {Eli Dworetzky and Edgar Kaziakhmedov and Jessica J. Fridrich}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Improving Steganographic Security with Source Biasing}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {19--30}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659646}, doi = {10.1145/3658664.3659646}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DworetzkyKF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HafnerRLFU24, author = {Michael H{\"{a}}fner and Aleksandar Radovic and Moritz Langer and Stefan Findenig and Andreas Uhl}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Forensic Recognition of Codec-Specific Image Compression Artefacts}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {131--136}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659648}, doi = {10.1145/3658664.3659648}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HafnerRLFU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Hak24, author = {Jonathan W. Hak}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Image-Based Evidence in International Criminal Prosecutions: Charting a Path Forward}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {5--6}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659629}, doi = {10.1145/3658664.3659629}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Hak24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HeW0W24, author = {Chenghua He and Deyang Wu and Xinpeng Zhang and Hanzhou Wu}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Watermarking Text Documents With Watermarked Fonts}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {187--197}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659640}, doi = {10.1145/3658664.3659640}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HeW0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/IbarrondoKCDO24, author = {Alberto Ibarrondo and Ismet Kerenciler and Herv{\'{e}} Chabanne and Vincent Despiegel and Melek {\"{O}}nen}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {211--222}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659633}, doi = {10.1145/3658664.3659633}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/IbarrondoKCDO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/IbsenNRRDLRJ024, author = {Mathias Ibsen and Robert Nichols and Christian Rathgeb and David J. Robertson and Josh P. Davis and Fr{\o}y L{\o}v{\aa}sdal and Kiran B. Raja and Ryan E. Jenkins and Christoph Busch}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {41--46}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659649}, doi = {10.1145/3658664.3659649}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/IbsenNRRDLRJ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JobicMPT24, author = {Pierre Jobic and Aur{\'{e}}lien Mayoue and Sara {Tucci Piergiovanni} and Fran{\c{c}}ois Terrier}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Extending the Scope of Gradient Reconstruction Attacks in Federated Averaging}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {235--246}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659636}, doi = {10.1145/3658664.3659636}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JobicMPT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KiltzDLHJMP24, author = {Stefan Kiltz and Jana Dittmann and Fabian Loewe and Christian Heidecke and Max John and Jonas M{\"{a}}del and Fabian Prei{\ss}ler}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {125--130}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659659}, doi = {10.1145/3658664.3659659}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KiltzDLHJMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KnochelK24, author = {Mandy Kn{\"{o}}chel and Sebastian Karius}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Text Steganography Methods and their Influence in Malware: {A} Comprehensive Overview and Evaluation}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {113--124}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659637}, doi = {10.1145/3658664.3659637}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KnochelK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiaoYP024, author = {Guorui Liao and Jinshuai Yang and Kaiyi Pang and Yongfeng Huang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {7--12}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659657}, doi = {10.1145/3658664.3659657}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiaoYP024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Loureiro-AcunaL24, author = {Jaime Loureiro{-}Acu{\~{n}}a and Xavier Mart{\'{\i}}nez Lua{\~{n}}a and H{\'{e}}ctor Pad{\'{\i}}n{-}Torrente and Gonzalo Jim{\'{e}}nez{-}Balsa and Carlos Garc{\'{\i}}a{-}Pag{\'{a}}n and Ines Ortega{-}Fernandez}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Enhancing Privacy in Federated Learning: {A} Practical Assessment of Combined PETs in a Cross-Silo Setting}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {265--270}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659661}, doi = {10.1145/3658664.3659661}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Loureiro-AcunaL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LuMFXC24, author = {Zhitong Lu and Duohe Ma and Linna Fan and Zhen Xu and Kai Chen}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {165--174}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659630}, doi = {10.1145/3658664.3659630}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LuMFXC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MalletBC24, author = {Antoine Mallet and Patrick Bas and R{\'{e}}mi Cogranne}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {87--94}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659638}, doi = {10.1145/3658664.3659638}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MalletBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MalletCB24, author = {Antoine Mallet and R{\'{e}}mi Cogranne and Patrick Bas}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {31--39}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659643}, doi = {10.1145/3658664.3659643}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MalletCB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MontibellerAPB24, author = {Andrea Montibeller and Roy Alia Asiku and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Giulia Boato}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Shedding Light on some Leaks in PRNU-based Source Attribution}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {137--142}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659654}, doi = {10.1145/3658664.3659654}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MontibellerAPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PianeseCPV24, author = {Alessandro Pianese and Davide Cozzolino and Giovanni Poggi and Luisa Verdoliva}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Training-Free Deepfake Voice Recognition by Leveraging Large-Scale Pre-Trained Models}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {289--294}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659662}, doi = {10.1145/3658664.3659662}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PianeseCPV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PrasadMFKD24, author = {Meghana Rao Bangalore Narasimha Prasad and Andrey Makrushin and Matteo Ferrara and Christian Kraetzer and Jana Dittmann}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {GAN-based Minutiae-driven Fingerprint Morphing}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {175--186}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659632}, doi = {10.1145/3658664.3659632}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PrasadMFKD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PurnekarATB24, author = {Nischay Purnekar and Lydia Abady and Benedetta Tondi and Mauro Barni}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {65--73}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659635}, doi = {10.1145/3658664.3659635}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PurnekarATB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Rahimi24, author = {Mahdi Rahimi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {{CLAM:} Client-Aware Routing in Mix Networks}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {199--209}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659631}, doi = {10.1145/3658664.3659631}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Rahimi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Riess24, author = {Christian Riess}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Dreams and Drama of Applied Image Forensics}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {3--4}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3663549}, doi = {10.1145/3658664.3663549}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Riess24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SuTH24, author = {Yang Su and Shunquan Tan and Jiwu Huang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {149--158}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659639}, doi = {10.1145/3658664.3659639}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SuTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TaibiR24, author = {Imane Taibi and Jan Ramon}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Honest Fraction Differential Privacy}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {247--251}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659655}, doi = {10.1145/3658664.3659655}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/TaibiR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/UhlenbrockCMVR24, author = {Lea Uhlenbrock and Davide Cozzolino and Denise Moussa and Luisa Verdoliva and Christian Riess}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Did You Note My Palette? Unveiling Synthetic Images Through Color Statistics}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {47--52}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659652}, doi = {10.1145/3658664.3659652}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/UhlenbrockCMVR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangH24, author = {Wenhao Wang and Fangjun Huang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Evading DeepFake Detectors via Conditional Diffusion Models}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {159--164}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659653}, doi = {10.1145/3658664.3659653}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WaniQCA24, author = {Taiba Majid Wani and Syed Asif Ahmad Qadri and Danilo Comminiello and Irene Amerini}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Detecting Audio Deepfakes: Integrating {CNN} and BiLSTM with Multi-Feature Concatenation}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {271--276}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659647}, doi = {10.1145/3658664.3659647}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WaniQCA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WooYYL24, author = {Ivy K. Y. Woo and Sheung Yiu and Hoover H. F. Yin and Russell W. F. Lai}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {13--18}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659660}, doi = {10.1145/3658664.3659660}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WooYYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangLZW24, author = {Li Zhang and Yong Liu and Xinpeng Zhang and Hanzhou Wu}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {223--234}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659634}, doi = {10.1145/3658664.3659634}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangLZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZillienPRG24, author = {Sebastian Zillien and Denis Petrov and Pascal Ruffing and Friedrich Gross}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {A Development Framework for {TCP/IP} Network Steganography Malware Detection}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, pages = {95--100}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664.3659651}, doi = {10.1145/3658664.3659651}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZillienPRG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2024, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Pedro {Comesa{~{n}}a Alfaro} and Christian Kr{\"{a}}tzer and Hong Vicky Zhao}, title = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3658664}, doi = {10.1145/3658664}, timestamp = {Thu, 13 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BeckmannHE23, author = {Arian Beckmann and Anna Hilsmann and Peter Eisert}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {175--180}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595106}, doi = {10.1145/3577163.3595106}, timestamp = {Mon, 26 Jun 2023 14:13:25 +0200}, biburl = {https://dblp.org/rec/conf/ih/BeckmannHE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BhagtaniBYBD23, author = {Kratika Bhagtani and Emily R. Bartusiak and Amit Kumar Singh Yadav and Paolo Bestagini and Edward J. Delp}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {157--162}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595112}, doi = {10.1145/3577163.3595112}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BhagtaniBYBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraBC23, author = {Jan Butora and Patrick Bas and R{\'{e}}mi Cogranne}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Analysis and Mitigation of the False Alarms of the Reverse {JPEG} Compatibility Attack}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {59--66}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595092}, doi = {10.1145/3577163.3595092}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChouchanePZKCTO23, author = {Ouba{\"{\i}}da Chouchane and Michele Panariello and Oualid Zari and Ismet Kerenciler and Imen Chihaoui and Massimiliano Todisco and Melek {\"{O}}nen}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {127--132}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595102}, doi = {10.1145/3577163.3595102}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChouchanePZKCTO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CraverR23, author = {Scott Craver and Nicholas Rosbrook}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Applying a Zero-Knowledge Watermarking Protocol to Secure Elections}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {115--120}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595099}, doi = {10.1145/3577163.3595099}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CraverR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DworetzkyKF23, author = {Eli Dworetzky and Edgar Kaziakhmedov and Jessica J. Fridrich}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {37--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595095}, doi = {10.1145/3577163.3595095}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DworetzkyKF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DworetzkyKF23a, author = {Eli Dworetzky and Edgar Kaziakhmedov and Jessica J. Fridrich}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Advancing the {JPEG} Compatibility Attack: Theory, Performance, Robustness, and Practice}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {67--79}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595090}, doi = {10.1145/3577163.3595090}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DworetzkyKF23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FangZLK023, author = {Yaodong Fang and Yuanding Zhou and Xinran Li and Ping Kong and Chuan Qin}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {{TMCIH:} Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {7--12}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595113}, doi = {10.1145/3577163.3595113}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FangZLK023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HoferB23, author = {Nora Hofer and Rainer B{\"{o}}hme}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {47--58}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595097}, doi = {10.1145/3577163.3595097}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HoferB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KaziakhmedovDF23, author = {Edgar Kaziakhmedov and Eli Dworetzky and Jessica J. Fridrich}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Limits of Data Driven Steganography Detectors}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {81--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595094}, doi = {10.1145/3577163.3595094}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KaziakhmedovDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KirchgasserKPMU23, author = {Simon Kirchgasser and Christof Kauba and Bernhard Prommegger and Fabio Monticelli and Andreas Uhl}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {121--126}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595096}, doi = {10.1145/3577163.3595096}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KirchgasserKPMU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LammingerHU23, author = {Lukas Lamminger and Heinz Hofbauer and Andreas Uhl}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {First Learning Steps to Recognize Faces in the Noise}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {139--144}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595105}, doi = {10.1145/3577163.3595105}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LammingerHU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LevecqueBB23, author = {Etienne Levecque and Patrick Bas and Jan Butora}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Compatibility and Timing Attacks for {JPEG} Steganalysis}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {29--35}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595093}, doi = {10.1145/3577163.3595093}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LevecqueBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiHQG23, author = {Cheng Li and Xinhui Han and Wenfa Qi and Zongming Guo}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {An Improved Reversible Database Watermarking Method based on Histogram Shifting}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {103--114}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595091}, doi = {10.1145/3577163.3595091}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiHQG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Liu23, author = {Xiaoming Liu}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {5}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3596214}, doi = {10.1145/3577163.3596214}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Liu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MayTFS23, author = {Brandon B. May and Kirill Trapeznikov and Shengbang Fang and Matthew C. Stamm}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {145--150}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595101}, doi = {10.1145/3577163.3595101}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MayTFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Newman23, author = {Jennifer L. Newman}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Steganography on Mobile Apps}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {3}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595114}, doi = {10.1145/3577163.3595114}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Newman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Scheirer23, author = {Walter J. Scheirer}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Photoshop Fantasies}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {1}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595115}, doi = {10.1145/3577163.3595115}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Scheirer23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/VorderleitnerHU23, author = {Andreas Vorderleitner and Jutta H{\"{a}}mmerle{-}Uhl and Andreas Uhl}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {133--138}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595107}, doi = {10.1145/3577163.3595107}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/VorderleitnerHU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WenGFZJX23, author = {Juan Wen and Liting Gao and Guangying Fan and Ziwei Zhang and Jianghao Jia and Yiming Xue}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {97--102}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595111}, doi = {10.1145/3577163.3595111}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WenGFZJX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/XiangYTBD23, author = {Ziyue Xiang and Amit Kumar Singh Yadav and Stefano Tubaro and Paolo Bestagini and Edward J. Delp}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Extracting Efficient Spectrograms From {MP3} Compressed Speech Signals for Synthetic Speech Detection}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {163--168}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595104}, doi = {10.1145/3577163.3595104}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/XiangYTBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Xu023, author = {Nanqing Xu and Weiwei Feng}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {MetaFake: Few-shot Face Forgery Detection with Meta Learning}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {151--156}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595108}, doi = {10.1145/3577163.3595108}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Xu023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangHDLY23, author = {Dengyong Zhang and Pu Huang and Xiangling Ding and Feng Li and Gaobo Yang}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Video Frame Interpolation via Multi-scale Expandable Deformable Convolution}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {19--28}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595098}, doi = {10.1145/3577163.3595098}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ZhangHDLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoC0Y0Y23, author = {Na Zhao and Kejiang Chen and Chuan Qin and Yi Yin and Weiming Zhang and Nenghai Yu}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Calibration-based Steganalysis for Neural Network Steganography}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {91--96}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595100}, doi = {10.1145/3577163.3595100}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoC0Y0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoQL0C23, author = {Gejian Zhao and Chuan Qin and Xiangyang Luo and Xinpeng Zhang and Chin{-}Chen Chang}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {13--18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595110}, doi = {10.1145/3577163.3595110}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoQL0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhouFAD23, author = {Yue Zhou and Bing Fan and Pradeep K. Atrey and Feng Ding}, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis}, booktitle = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, pages = {169--174}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163.3595103}, doi = {10.1145/3577163.3595103}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhouFAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2023, editor = {Daniel Moreira and Aparna Bharati and Cecilia Pasquini and Yassine Yousfi}, title = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577163}, doi = {10.1145/3577163}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/001G22, author = {Zhijun Wu and Junjun Guo}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {{AMR} Steganalysis based on Adversarial Bi-GRU and Data Distillation}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {141--146}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532958}, doi = {10.1145/3531536.3532958}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/001G22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BenesHB22, author = {Martin Benes and Nora Hofer and Rainer B{\"{o}}hme}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Know Your Library: How the libjpeg Version Influences Compression and Decompression Results}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {19--25}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532962}, doi = {10.1145/3531536.3532962}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BenesHB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BertaDHJ22, author = {{\'{A}}rp{\'{a}}d Berta and G{\'{a}}bor Danner and Istv{\'{a}}n Heged{\"{u}}s and M{\'{a}}rk Jelasity}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {51--62}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532966}, doi = {10.1145/3531536.3532966}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BertaDHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraB22, author = {Jan Butora and Patrick Bas}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Fighting the Reverse {JPEG} Compatibility Attack: Pick your Side}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {113--121}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532955}, doi = {10.1145/3531536.3532955}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChewNBBC22, author = {Daniel Chew and Christine Nguyen and Samuel Berhanu and Chris Baumgart and A. Brinton Cooper}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Covert Communications through Imperfect Cancellation}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {63--68}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532959}, doi = {10.1145/3531536.3532959}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChewNBBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/IbarrondoCDO22, author = {Alberto Ibarrondo and Herv{\'{e}} Chabanne and Vincent Despiegel and Melek {\"{O}}nen}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {129--139}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532952}, doi = {10.1145/3531536.3532952}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/IbarrondoCDO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JoudehS22, author = {Basheer Joudeh and Boris Skoric}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Collusion-resistant Fingerprinting of Parallel Content Channels}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {81--89}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532953}, doi = {10.1145/3531536.3532953}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JoudehS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ker22, author = {Andrew D. Ker}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Capacity Laws for Steganography in a Crowd}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {147--156}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532948}, doi = {10.1145/3531536.3532948}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Ker22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KiltzAD22, author = {Stefan Kiltz and Robert Altschaffel and Jana Dittmann}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of {UEFI} {NVRAM} and Implications for {IT} Forensics}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {107--112}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532965}, doi = {10.1145/3531536.3532965}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KiltzAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Koushanfar22, author = {Farinaz Koushanfar}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Intellectual Property {(IP)} Protection for Deep Learning and Federated Learning Models}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {5}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532957}, doi = {10.1145/3531536.3532957}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Koushanfar22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kruegel22, author = {Christopher Kruegel}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Looking for Signals: {A} Systems Security Perspective}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {3}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3533774}, doi = {10.1145/3531536.3533774}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kruegel22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LamshoftD22, author = {Kevin Lamsh{\"{o}}ft and Jana Dittmann}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Covert Channels in Network Time Security}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {69--79}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532947}, doi = {10.1145/3531536.3532947}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LamshoftD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiWKSHH022, author = {Denghao Li and Jianzong Wang and Lingwei Kong and Shijing Si and Zhangcheng Huang and Chenyu Huang and Jing Xiao}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {123--128}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532960}, doi = {10.1145/3531536.3532960}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiWKSHH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiZCPLZ22, author = {Gen Li and Xianfeng Zhao and Yun Cao and Pengfei Pei and Jinchuan Li and Zeyu Zhang}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {{FMFCC-V:} An Asian Large-Scale Challenging Dataset for DeepFake Detection}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {7--18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532946}, doi = {10.1145/3531536.3532946}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/LiZCPLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LouniciOET22, author = {Sofiane Lounici and Melek {\"{O}}nen and Orhan Ermis and Slim Trabelsi}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {BlindSpot: Watermarking Through Fairness}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {39--50}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532950}, doi = {10.1145/3531536.3532950}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LouniciOET22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Lu22, author = {Chun{-}Shien Lu}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Sparse Trigger Pattern Guided Deep Learning Model Watermarking}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {33--38}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532961}, doi = {10.1145/3531536.3532961}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Lu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ShenZQ22, author = {Dongyao Shen and Youjian Zhao and Chengbin Quan}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Identity-Referenced Deepfake Detection with Contrastive Learning}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {27--32}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532964}, doi = {10.1145/3531536.3532964}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ShenZQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Verdoliva22, author = {Luisa Verdoliva}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Towards Generalization in Deepfake Detection}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {1}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532956}, doi = {10.1145/3531536.3532956}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Verdoliva22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WenZYX22, author = {Juan Wen and Ziwei Zhang and Yu Yang and Yiming Xue}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Few-shot Text Steganalysis Based on Attentional Meta-learner}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {97--106}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532949}, doi = {10.1145/3531536.3532949}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WenZYX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/XueYDPW22, author = {Yiming Xue and Boya Yang and Yaqian Deng and Wanli Peng and Juan Wen}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Domain Adaptational Text Steganalysis Based on Transductive Learning}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {91--96}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532963}, doi = {10.1145/3531536.3532963}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/XueYDPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YousfiDF22, author = {Yassine Yousfi and Eli Dworetzky and Jessica J. Fridrich}, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {Detector-Informed Batch Steganography and Pooled Steganalysis}, booktitle = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, pages = {157--168}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536.3532951}, doi = {10.1145/3531536.3532951}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YousfiDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2022, editor = {B. S. Manjunath and Jan Butora and Benedetta Tondi and Claus Vielhauer}, title = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3531536}, doi = {10.1145/3531536}, isbn = {978-1-4503-9355-3}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AdhataraoL21, author = {Supriya Adhatarao and C{\'{e}}dric Lauradoux}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Exploitation and Sanitization of Hidden Data in {PDF} Files: Do Security Agencies Sanitize Their {PDF} Files?}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {35--44}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460405}, doi = {10.1145/3437880.3460405}, timestamp = {Wed, 07 Jul 2021 17:13:20 +0200}, biburl = {https://dblp.org/rec/conf/ih/AdhataraoL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AltschaffelHKD21, author = {Robert Altschaffel and Jonas Hielscher and Stefan Kiltz and Jana Dittmann}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {23--33}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460412}, doi = {10.1145/3437880.3460412}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/AltschaffelHKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ArefinS21, author = {Sayed Erfan Arefin and Abdul Serwadda}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {75--80}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460415}, doi = {10.1145/3437880.3460415}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ArefinS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BarniPT21, author = {Mauro Barni and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Benedetta Tondi}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {{DNN} Watermarking: Four Challenges and a Funeral}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {189--196}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460399}, doi = {10.1145/3437880.3460399}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BarniPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BernardBPK21, author = {Sol{\`{e}}ne Bernard and Patrick Bas and Tom{\'{a}}s Pevn{\'{y}} and John Klein}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Optimizing Additive Approximations of Non-additive Distortion Functions}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {105--112}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460407}, doi = {10.1145/3437880.3460407}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BernardBPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BukerH21, author = {Aykut B{\"{u}}ker and Cemal Hanil{\c{c}}i}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Angular Margin Softmax Loss and Its Variants for Double Compressed {AMR} Audio Detection}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {45--50}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460414}, doi = {10.1145/3437880.3460414}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BukerH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraF21, author = {Jan Butora and Jessica J. Fridrich}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Revisiting Perturbed Quantization}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {125--136}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460396}, doi = {10.1145/3437880.3460396}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraYF21, author = {Jan Butora and Yassine Yousfi and Jessica J. Fridrich}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {How to Pretrain for Steganalysis}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {143--148}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460395}, doi = {10.1145/3437880.3460395}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Carlini21, author = {Nicholas Carlini}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {How Private is Machine Learning?}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {3}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3458440}, doi = {10.1145/3437880.3458440}, timestamp = {Fri, 10 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Carlini21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/IbarrondoCO21, author = {Alberto Ibarrondo and Herv{\'{e}} Chabanne and Melek {\"{O}}nen}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Banners: Binarized Neural Networks with Replicated Secret Sharing}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {63--74}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460394}, doi = {10.1145/3437880.3460394}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/IbarrondoCO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KapustaTBBS21, author = {Katarzyna Kapusta and Vincent Thouvenot and Olivier Bettan and Hugo Beguinet and Hugo Senet}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {171--176}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460409}, doi = {10.1145/3437880.3460409}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KapustaTBBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KuribayashiTSYF21, author = {Minoru Kuribayashi and Takuro Tanaka and Shunta Suzuki and Tatsuya Yasui and Nobuo Funabiki}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {165--170}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460402}, doi = {10.1145/3437880.3460402}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KuribayashiTSYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LamshoftNKVD21, author = {Kevin Lamsh{\"{o}}ft and Tom Neubert and Christian Kr{\"{a}}tzer and Claus Vielhauer and Jana Dittmann}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the {SWAT} Dataset}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {113--124}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460413}, doi = {10.1145/3437880.3460413}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LamshoftNKVD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LinortnerU21, author = {Michael Linortner and Andreas Uhl}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Towards Match-on-Card Finger Vein Recognition}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {87--92}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460406}, doi = {10.1145/3437880.3460406}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LinortnerU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LugsteinBBU21, author = {Florian Lugstein and Simon Baier and Gregor Bachinger and Andreas Uhl}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {PRNU-based Deepfake Detection}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {7--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460400}, doi = {10.1145/3437880.3460400}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LugsteinBBU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MakrushinKKSKUD21, author = {Andrey Makrushin and Christof Kauba and Simon Kirchgasser and Stefan Seidlitz and Christian Kraetzer and Andreas Uhl and Jana Dittmann}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {93--104}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460410}, doi = {10.1145/3437880.3460410}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MakrushinKKSKUD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MaungK21, author = {April Pyone Maung Maung and Hitoshi Kiya}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Piracy-Resistant {DNN} Watermarking by Block-Wise Image Transformation with Secret Key}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {159--164}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460398}, doi = {10.1145/3437880.3460398}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MaungK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Sablayrolles21, author = {Alexandre Sablayrolles}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Tracing Data through Learning with Watermarking}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {5}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3458442}, doi = {10.1145/3437880.3458442}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Sablayrolles21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchloglKB21, author = {Alexander Schl{\"{o}}gl and Tobias Kupek and Rainer B{\"{o}}hme}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {iNNformant: Boundary Samples as Telltale Watermarks}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {81--86}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460411}, doi = {10.1145/3437880.3460411}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SchloglKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ShafieinejadLWL21, author = {Masoumeh Shafieinejad and Nils Lukas and Jiaqi Wang and Xinda Li and Florian Kerschbaum}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {On the Robustness of Backdoor-based Watermarking in Deep Neural Networks}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {177--188}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460401}, doi = {10.1145/3437880.3460401}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ShafieinejadLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Standaert21, author = {Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {1}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3458441}, doi = {10.1145/3437880.3458441}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Standaert21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangYHYH21, author = {Huili Wang and Zhongliang Yang and Yuting Hu and Zhen Yang and Yongfeng Huang}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {137--142}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460404}, doi = {10.1145/3437880.3460404}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangYHYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YousfiBFT21, author = {Yassine Yousfi and Jan Butora and Jessica J. Fridrich and Cl{\'{e}}ment Fuji Tsang}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Improving EfficientNet for {JPEG} Steganalysis}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {149--157}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460397}, doi = {10.1145/3437880.3460397}, timestamp = {Sun, 22 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YousfiBFT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangYZ21, author = {Zhenyu Zhang and Xiaowei Yi and Xianfeng Zhao}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {Fake Speech Detection Using Residual Network with Transformer Encoder}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {13--22}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460408}, doi = {10.1145/3437880.3460408}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ZhangYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoWLLM21, author = {Chen Zhao and Yu Wen and Shuailou Li and Fucheng Liu and Dan Meng}, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {FederatedReverse: {A} Detection and Defense Method Against Backdoor Attacks in Federated Learning}, booktitle = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, pages = {51--62}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880.3460403}, doi = {10.1145/3437880.3460403}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoWLLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2021, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880}, doi = {10.1145/3437880}, isbn = {978-1-4503-8295-3}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Abu-gellbanNMPJ20, author = {Hashim Abu{-}gellban and Long Hoang Nguyen and Mahdi Moghadasi and Zhenhe Pan and Fang Jin}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {LiveDI: An Anti-theft Model Based on Driving Behavior}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {67--72}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395069}, doi = {10.1145/3369412.3395069}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Abu-gellbanNMPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AgarwalF20, author = {Shruti Agarwal and Hany Farid}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Photo Forensics From Rounding Artifacts}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {103--114}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395059}, doi = {10.1145/3369412.3395059}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/AgarwalF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AmeriniC20, author = {Irene Amerini and Roberto Caldelli}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {97--102}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395070}, doi = {10.1145/3369412.3395070}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/AmeriniC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BonnetFB20, author = {Beno{\^{\i}}t Bonnet and Teddy Furon and Patrick Bas}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {What if Adversarial Samples were Digital Images?}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {55--66}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395062}, doi = {10.1145/3369412.3395062}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BonnetFB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraYF20, author = {Jan Butora and Yassine Yousfi and Jessica J. Fridrich}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Turning Cost-Based Steganography into Model-Based}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {151--159}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395065}, doi = {10.1145/3369412.3395065}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraYF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CogranneGB20, author = {R{\'{e}}mi Cogranne and Quentin Giboulot and Patrick Bas}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Steganography by Minimizing Statistical Detectability: The cases of {JPEG} and Color Images}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {161--167}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395075}, doi = {10.1145/3369412.3395075}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CogranneGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FanZCXZ20, author = {Pingan Fan and Hong Zhang and Yifan Cai and Pei Xie and Xianfeng Zhao}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {127--137}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395066}, doi = {10.1145/3369412.3395066}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FanZCXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HildebrandtLDNV20, author = {Mario Hildebrandt and Kevin Lamsh{\"{o}}ft and Jana Dittmann and Tom Neubert and Claus Vielhauer}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Information Hiding in Industrial Control Systems: An {OPC} {UA} based Supply Chain Attack and its Detection}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {115--120}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395068}, doi = {10.1145/3369412.3395068}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HildebrandtLDNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JangOK20, author = {Haneol Jang and Tae{-}Woo Oh and Kibom Kim}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Feature Aggregation Networks for Image Steganalysis}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {33--38}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395072}, doi = {10.1145/3369412.3395072}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JangOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JerkovitsGSK20, author = {Thomas Jerkovits and Onur G{\"{u}}nl{\"{u}} and Vladimir Sidorenko and Gerhard Kramer}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {79--89}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395063}, doi = {10.1145/3369412.3395063}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/JerkovitsGSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kiekintveld20, author = {Christopher Kiekintveld}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Game-Theoretic Perspectives and Algorithms for Cybersecurity}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3396883}, doi = {10.1145/3369412.3396883}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kiekintveld20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kin-CleavesK20, author = {Christy Kin{-}Cleaves and Andrew D. Ker}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Simulating Suboptimal Steganographic Embedding}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {121--126}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395071}, doi = {10.1145/3369412.3395071}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kin-CleavesK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KupekPB20, author = {Tobias Kupek and Cecilia Pasquini and Rainer B{\"{o}}hme}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {On the Difficulty of Hiding Keys in Neural Networks}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {73--78}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395076}, doi = {10.1145/3369412.3395076}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/KupekPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeeOK20, author = {Daewon Lee and Tae{-}Woo Oh and Kibom Kim}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Deep Audio Steganalysis in Time Domain}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {11--21}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395064}, doi = {10.1145/3369412.3395064}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeeOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MakrushinSD20, author = {Andrey Makrushin and Dennis Siegel and Jana Dittmann}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {91--96}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395073}, doi = {10.1145/3369412.3395073}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MakrushinSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TaburetBSC20, author = {Th{\'{e}}o Taburet and Patrick Bas and Wadih Sawaya and R{\'{e}}mi Cogranne}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {{JPEG} Steganography and Synchronization of {DCT} Coefficients for a Given Development Pipeline}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {139--149}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395074}, doi = {10.1145/3369412.3395074}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/TaburetBSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangMH20, author = {Chen Wang and Jingjing Mu and Long Huang}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {49--54}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395077}, doi = {10.1145/3369412.3395077}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Wu20, author = {Min Wu}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Exploiting Micro-Signals for Physiological Forensics}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3396882}, doi = {10.1145/3369412.3396882}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Wu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangBYLHJ20, author = {Hao Yang and YongJian Bao and Zhongliang Yang and Sheng Liu and Yongfeng Huang and Saimei Jiao}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Linguistic Steganalysis via Densely Connected {LSTM} with Feature Pyramid}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {5--10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395067}, doi = {10.1145/3369412.3395067}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/YangBYLHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangLXKS20, author = {Jianhua Yang and Beiling Lu and Liang Xiao and Xiangui Kang and Yunqing Shi}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Reinforcement Learning Aided Network Architecture Generation for {JPEG} Image Steganalysis}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {23--32}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395060}, doi = {10.1145/3369412.3395060}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YangLXKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YedroudjCCAB20, author = {Mehdi Yedroudj and Marc Chaumont and Fr{\'{e}}d{\'{e}}ric Comby and Ahmed Oulad Amara and Patrick Bas}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {39--48}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3395061}, doi = {10.1145/3369412.3395061}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YedroudjCCAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2020, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412}, doi = {10.1145/3369412}, isbn = {978-1-4503-7050-9}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AbazidHG19, author = {Majd Abazid and Nesma Houmani and Sonia Garcia{-}Salicetti}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Impact of Spatial Constraints when Signing in Uncontrolled Mobile Conditions}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {89--94}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335720}, doi = {10.1145/3335203.3335720}, timestamp = {Fri, 22 Oct 2021 09:07:11 +0200}, biburl = {https://dblp.org/rec/conf/ih/AbazidHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BernardPBK19, author = {Sol{\`{e}}ne Bernard and Tom{\'{a}}s Pevn{\'{y}} and Patrick Bas and John Klein}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Exploiting Adversarial Embeddings for Better Steganography}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {216--221}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335737}, doi = {10.1145/3335203.3335737}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BernardPBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ButoraF19, author = {Jan Butora and Jessica J. Fridrich}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Effect of {JPEG} Quality on Steganographic Security}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {47--56}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335714}, doi = {10.1145/3335203.3335714}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ButoraF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CamachoW19, author = {Ivan Castillo Camacho and Kai Wang}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {A Simple and Effective Initialization of {CNN} for Forensics of Image Processing Operations}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {107--112}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335723}, doi = {10.1145/3335203.3335723}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CamachoW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenBF19, author = {Mo Chen and Mehdi Boroumand and Jessica J. Fridrich}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Reference Channels for Steganalysis of Images with Convolutional Neural Networks}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {188--197}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335733}, doi = {10.1145/3335203.3335733}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenLZ19, author = {Bolin Chen and Weiqi Luo and Peijia Zheng}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {63--68}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335716}, doi = {10.1145/3335203.3335716}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CogranneGB19, author = {R{\'{e}}mi Cogranne and Quentin Giboulot and Patrick Bas}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {The {ALASKA} Steganalysis Challenge: {A} First Step Towards Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {125--137}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335726}, doi = {10.1145/3335203.3335726}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CogranneGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DengCLL19, author = {Xiaoqing Deng and Bolin Chen and Weiqi Luo and Da Luo}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Fast and Effective Global Covariance Pooling Network for Image Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {230--234}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335739}, doi = {10.1145/3335203.3335739}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DengCLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Furon19, author = {Teddy Furon}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Watermarking Error Exponents in the Presence of Noise: The Case of the Dual Hypercone Detector}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {173--181}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335731}, doi = {10.1145/3335203.3335731}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Furon19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/GongYZM19, author = {Chen Gong and Xiaowei Yi and Xianfeng Zhao and Yi Ma}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Recurrent Convolutional Neural Networks for {AMR} Steganalysis Based on Pulse Position}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {2--13}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335708}, doi = {10.1145/3335203.3335708}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/GongYZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HosseiniG19, author = {Morteza Darvish Morshedi Hosseini and Miroslav Goljan}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Camera Identification from {HDR} Images}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {69--76}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335717}, doi = {10.1145/3335203.3335717}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HosseiniG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HuangNWY19, author = {Junwen Huang and Jiangqun Ni and Linhong Wan and Jingwen Yan}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {A Customized Convolutional Neural Network with Low Model Complexity for {JPEG} Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {198--203}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335734}, doi = {10.1145/3335203.3335734}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HuangNWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Laarhoven19, author = {Thijs Laarhoven}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Nearest Neighbor Decoding for Tardos Fingerprinting Codes}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {182--187}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335732}, doi = {10.1145/3335203.3335732}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Laarhoven19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Lerch-HostalotM19, author = {Daniel Lerch{-}Hostalot and David Meg{\'{\i}}as}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Detection of Classifier Inconsistencies in Image Steganalysis}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {222--229}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335738}, doi = {10.1145/3335203.3335738}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Lerch-HostalotM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiL19, author = {Yuezun Li and Siwei Lyu}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {De-identification Without Losing Faces}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {83--88}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335719}, doi = {10.1145/3335203.3335719}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LinWYDZ19, author = {Yuzhen Lin and Rangding Wang and Diqun Yan and Li Dong and Xueyuan Zhang}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Audio Steganalysis with Improved Convolutional Neural Network}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {210--215}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335736}, doi = {10.1145/3335203.3335736}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/LinWYDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiuK19, author = {Chang Liu and Matthias Kirchner}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {CNN-based Rescaling Factor Estimation}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {119--124}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335725}, doi = {10.1145/3335203.3335725}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LorchR19, author = {Benedikt Lorch and Christian Riess}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Image Forensics from Chroma Subsampling of High-Quality {JPEG} Images}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {101--106}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335722}, doi = {10.1145/3335203.3335722}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LorchR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MatyuninW019, author = {Nikolay Matyunin and Yujue Wang and Stefan Katzenbeisser}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Vibrational Covert Channels using Low-Frequency Acoustic Signals}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {31--36}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335712}, doi = {10.1145/3335203.3335712}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MatyuninW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Morel19, author = {Jean{-}Michel Morel}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Reverse Engineering: What Can We Learn From a Digital Image About Its Own History ?}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {1}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335707}, doi = {10.1145/3335203.3335707}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Morel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NandakumarRP19, author = {Karthik Nandakumar and Nalini K. Ratha and Sharathchandra Pankanti}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {151--160}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335729}, doi = {10.1145/3335203.3335729}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/NandakumarRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NeubertKD19, author = {Tom Neubert and Christian Kraetzer and Jana Dittmann}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {95--100}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335721}, doi = {10.1145/3335203.3335721}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/NeubertKD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Pedrouzo-UlloaT19, author = {Alberto Pedrouzo{-}Ulloa and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Revisiting Multivariate Lattices for Encrypted Signal Processing}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {161--172}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335730}, doi = {10.1145/3335203.3335730}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Pedrouzo-UlloaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/RyabkoF19, author = {Boris Ryabko and Andrey Fionov}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Linear Hash Functions as a Means of Distortion-Rate Optimization in Data Embedding}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {235--238}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335740}, doi = {10.1145/3335203.3335740}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/RyabkoF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Shokri19, author = {Reza Shokri}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Trusting Machine Learning: Privacy, Robustness, and Transparency Challenges}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {150}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335728}, doi = {10.1145/3335203.3335728}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Shokri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TaburetBFS19, author = {Th{\'{e}}o Taburet and Patrick Bas and Jessica J. Fridrich and Wadih Sawaya}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Computing Dependencies between {DCT} Coefficients for Natural Steganography in {JPEG} Domain}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {57--62}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335715}, doi = {10.1145/3335203.3335715}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/TaburetBFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Xie0YZYM19, author = {Pei Xie and Hong Zhang and Weike You and Xianfeng Zhao and Jianchang Yu and Yi Ma}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Adaptive {VP8} Steganography Based on Deblocking Filtering}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {25--30}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335711}, doi = {10.1145/3335203.3335711}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Xie0YZYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YadavTTF19, author = {Rohit Yadav and Iuliia Tkachenko and Alain Tr{\'{e}}meau and Thierry Fournel}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Estimation of Copy-sensitive Codes Using a Neural Approach}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {77--82}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335718}, doi = {10.1145/3335203.3335718}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YadavTTF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangLQL19, author = {Xin Yang and Yuezun Li and Honggang Qi and Siwei Lyu}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Exposing GAN-synthesized Faces Using Landmark Locations}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {113--118}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335724}, doi = {10.1145/3335203.3335724}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YangLQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangRKS19, author = {Jianhua Yang and Danyang Ruan and Xiangui Kang and Yun{-}Qing Shi}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Towards Automatic Embedding Cost Learning for {JPEG} Steganography}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {37--46}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335713}, doi = {10.1145/3335203.3335713}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YangRKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangWYZM19, author = {Yunzhao Yang and Yuntao Wang and Xiaowei Yi and Xianfeng Zhao and Yi Ma}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Defining Joint Embedding Distortion for Adaptive {MP3} Steganography}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {14--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335710}, doi = {10.1145/3335203.3335710}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YangWYZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YangYH19, author = {Hao Yang and Zhongliang Yang and Yongfeng Huang}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Steganalysis of VoIP Streams with {CNN-LSTM} Network}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {204--209}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335735}, doi = {10.1145/3335203.3335735}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/YangYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YousfiBFG19, author = {Yassine Yousfi and Jan Butora and Jessica J. Fridrich and Quentin Giboulot}, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Breaking {ALASKA:} Color Separation for Steganalysis in {JPEG} Domain}, booktitle = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, pages = {138--149}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203.3335727}, doi = {10.1145/3335203.3335727}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/YousfiBFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2019, editor = {R{\'{e}}mi Cogranne and Luisa Verdoliva and Siwei Lyu and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Xinpeng Zhang}, title = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335203}, doi = {10.1145/3335203}, isbn = {978-1-4503-6821-6}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Anderson18, author = {Ross Anderson}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Covert and Deniable Communications}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206023}, doi = {10.1145/3206004.3206023}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Anderson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BorghysBB18, author = {Dirk Borghys and Patrick Bas and Helena Bruyninckx}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Facing the Cover-Source Mismatch on JPHide using Training-Set Design}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {17--22}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206021}, doi = {10.1145/3206004.3206021}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BorghysBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CaoWZZX18, author = {Yun Cao and Yu Wang and Xianfeng Zhao and Meineng Zhu and Zhoujun Xu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Cover Block Decoupling for Content-Adaptive {H.264} Steganography}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {23--30}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206014}, doi = {10.1145/3206004.3206014}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CaoWZZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenKWZ18, author = {Yifang Chen and Xiangui Kang and Z. Jane Wang and Qiong Zhang}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {91--96}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206013}, doi = {10.1145/3206004.3206013}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenKWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenLL18, author = {Bolin Chen and Weiqi Luo and Da Luo}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Identification of Audio Processing Operations Based on Convolutional Neural Network}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {73--77}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206005}, doi = {10.1145/3206004.3206005}, timestamp = {Fri, 21 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HofbauerU18, author = {Heinz Hofbauer and Andreas Uhl}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Applicability of No-Reference Visual Quality Indices for Visual Security Assessment}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {139--144}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206007}, doi = {10.1145/3206004.3206007}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HofbauerU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HollerU18, author = {Yvonne H{\"{o}}ller and Andreas Uhl}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Do EEG-Biometric Templates Threaten User Privacy?}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {31--42}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206006}, doi = {10.1145/3206004.3206006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HollerU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ker18, author = {Andrew D. Ker}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {On the Relationship Between Embedding Costs and Steganographic Capacity}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {115--120}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206017}, doi = {10.1145/3206004.3206017}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Ker18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiZCZY18, author = {Weixiang Li and Weiming Zhang and Kejiang Chen and Wenbo Zhou and Nenghai Yu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Defining Joint Distortion for {JPEG} Steganography}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {5--16}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206008}, doi = {10.1145/3206004.3206008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiZCZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiuGZC18, author = {Yaqi Liu and Qingxiao Guan and Xianfeng Zhao and Yun Cao}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Image Forgery Localization based on Multi-Scale Convolutional Neural Networks}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {85--90}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206010}, doi = {10.1145/3206004.3206010}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiuGZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MakrushinKND18, author = {Andrey Makrushin and Christian Kraetzer and Tom Neubert and Jana Dittmann}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Generalized Benford's Law for Blind Detection of Morphed Face Images}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {49--54}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206018}, doi = {10.1145/3206004.3206018}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MakrushinKND18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MayerBS18, author = {Owen Mayer and Belhassen Bayar and Matthew C. Stamm}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Learning Unified Deep-Features for Multiple Forensic Tasks}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {79--84}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206022}, doi = {10.1145/3206004.3206022}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MayerBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MoCL18, author = {Huaxiao Mo and Bolin Chen and Weiqi Luo}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Fake Faces Identification via Convolutional Neural Network}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {43--47}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206009}, doi = {10.1145/3206004.3206009}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MoCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PevnyK18, author = {Tom{\'{a}}s Pevn{\'{y}} and Andrew D. Ker}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Exploring Non-Additive Distortion in Steganography}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {109--114}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206015}, doi = {10.1145/3206004.3206015}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PevnyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/RichterESS18, author = {Timo Richter and Stephan Escher and Dagmar Sch{\"{o}}nfeld and Thorsten Strufe}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Forensic Analysis and Anonymisation of Printed Documents}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {127--138}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206019}, doi = {10.1145/3206004.3206019}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/RichterESS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchramlDU18, author = {Rudolf Schraml and Luca Debiasi and Andreas Uhl}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Real or Fake: Mobile Device Drug Packaging Authentication}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {121--126}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206016}, doi = {10.1145/3206004.3206016}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/SchramlDU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Verdoliva18, author = {Luisa Verdoliva}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Deep Learning in Multimedia Forensics}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {3}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206024}, doi = {10.1145/3206004.3206024}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Verdoliva18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangCZXZ18, author = {Yu Wang and Yun Cao and Xianfeng Zhao and Zhoujun Xu and Meineng Zhu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in {HEVC}}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {97--107}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206020}, doi = {10.1145/3206004.3206020}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangCZXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangYYZX18, author = {Yuntao Wang and Kun Yang and Xiaowei Yi and Xianfeng Zhao and Zhoujun Xu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {CNN-based Steganalysis of {MP3} Steganography in the Entropy Code Domain}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {55--65}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206011}, doi = {10.1145/3206004.3206011}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangYYZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangZCLLY18, author = {Yiwei Zhang and Weiming Zhang and Kejiang Chen and Jiayang Liu and Yujia Liu and Nenghai Yu}, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Adversarial Examples Against Deep Neural Network based Steganalysis}, booktitle = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, pages = {67--72}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004.3206012}, doi = {10.1145/3206004.3206012}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangZCLLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2018, editor = {Rainer B{\"{o}}hme and Cecilia Pasquini and Giulia Boato and Pascal Sch{\"{o}}ttle}, title = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia Security, Innsbruck, Austria, June 20-22, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3206004}, doi = {10.1145/3206004}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BayarS17, author = {Belhassen Bayar and Matthew C. Stamm}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {A Generic Approach Towards Image Manipulation Parameter Estimation Using Convolutional Neural Networks}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {147--157}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083249}, doi = {10.1145/3082031.3083249}, timestamp = {Tue, 06 Nov 2018 16:59:01 +0100}, biburl = {https://dblp.org/rec/conf/ih/BayarS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BoroumandF17, author = {Mehdi Boroumand and Jessica J. Fridrich}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Nonlinear Feature Normalization in Steganalysis}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {45--54}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083239}, doi = {10.1145/3082031.3083239}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BoroumandF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenLL17, author = {Bolin Chen and Weiqi Luo and Haodong Li}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Audio Steganalysis with Convolutional Neural Network}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {85--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083234}, doi = {10.1145/3082031.3083234}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ChenLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenSBF17, author = {Mo Chen and Vahid Sedighi and Mehdi Boroumand and Jessica J. Fridrich}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of {JPEG} Images}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {75--84}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083248}, doi = {10.1145/3082031.3083248}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ChenSBF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CozzolinoPV17, author = {Davide Cozzolino and Giovanni Poggi and Luisa Verdoliva}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Recasting Residual-based Local Descriptors as Convolutional Neural Networks: an Application to Image Forgery Detection}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {159--164}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083247}, doi = {10.1145/3082031.3083247}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/CozzolinoPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Das17, author = {Anupam Das}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Every Move You Make: Tracking Smartphone Users through Motion Sensors}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3092568}, doi = {10.1145/3082031.3092568}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Das17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/GortUN17, author = {Maikel L. P{\'{e}}rez Gort and Claudia Feregrino Uribe and Jyrki Nummenmaa}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {A Minimum Distortion: High Capacity Watermarking Technique for Relational Data}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {111--121}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083241}, doi = {10.1145/3082031.3083241}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/GortUN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Greenstadt17, author = {Rachel Greenstadt}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Using Stylometry to Attribute Programmers and Writers}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {91}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3092567}, doi = {10.1145/3082031.3092567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Greenstadt17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HalvaniSG17, author = {Oren Halvani and Martin Steinebach and Lukas Graner}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Towards Imperceptible Natural Language Watermarking for German}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {93--98}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3084682}, doi = {10.1145/3082031.3084682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HalvaniSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ker17, author = {Andrew D. Ker}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {The Square Root Law of Steganography: Bringing Theory Closer to Practice}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {33--44}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083235}, doi = {10.1145/3082031.3083235}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Ker17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KraetzerMNHD17, author = {Christian Kraetzer and Andrey Makrushin and Tom Neubert and Mario Hildebrandt and Jana Dittmann}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {21--32}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083244}, doi = {10.1145/3082031.3083244}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KraetzerMNHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LuoH17, author = {Yubo Luo and Yongfeng Huang}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {99--104}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083240}, doi = {10.1145/3082031.3083240}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/LuoH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MayerS17, author = {Owen Mayer and Matthew C. Stamm}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Countering Anti-Forensics of Lateral Chromatic Aberration}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {15--20}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083242}, doi = {10.1145/3082031.3083242}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MayerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Menendez-OrtizU17, author = {Alejandra Menendez{-}Ortiz and Claudia Feregrino Uribe and Jose Juan Garcia{-}Hernandez}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Audio Reversible Watermarking Scheme in the intDCT Domain with Modified Prediction Error Expansion}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {105--110}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083246}, doi = {10.1145/3082031.3083246}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Menendez-OrtizU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PasquiniB17, author = {Cecilia Pasquini and Rainer B{\"{o}}hme}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {3--14}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083233}, doi = {10.1145/3082031.3083233}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/PasquiniB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangCZZ17, author = {Peipei Wang and Yun Cao and Xianfeng Zhao and Meineng Zhu}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for {H.264/AVC} Videos}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {123--133}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083245}, doi = {10.1145/3082031.3083245}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WangCZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/XiaGZXM17, author = {Chao Xia and Qingxiao Guan and Xianfeng Zhao and Zhoujun Xu and Yi Ma}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Improving {GFR} Steganalysis Features by Using Gabor Symmetry and Weighted Histograms}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {55--66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083243}, doi = {10.1145/3082031.3083243}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/XiaGZXM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Xu17, author = {Guanshuo Xu}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Deep Convolutional Neural Network to Detect {J-UNIWARD}}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {67--73}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083236}, doi = {10.1145/3082031.3083236}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Xu17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaiWR17, author = {Liming Zhai and Lina Wang and Yanzhen Ren}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in {H.264/AVC}}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {135--146}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083237}, doi = {10.1145/3082031.3083237}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ZhaiWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhanCZK17, author = {Yifeng Zhan and Yifang Chen and Qiong Zhang and Xiangui Kang}, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Image Forensics Based on Transfer Learning and Convolutional Neural Network}, booktitle = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, pages = {165--170}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031.3083250}, doi = {10.1145/3082031.3083250}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ZhanCZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2017, editor = {Matthew C. Stamm and Matthias Kirchner and Sviatoslav Voloshynovskiy}, title = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3082031}, doi = {10.1145/3082031}, isbn = {978-1-4503-5061-7}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AbdulrahmanCMM16, author = {Hasan Abdulrahman and Marc Chaumont and Philippe Montesinos and Baptiste Magnier}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Color Image Steganalysis Based On Steerable Gaussian Filters Bank}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {109--114}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930799}, doi = {10.1145/2909827.2930799}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/AbdulrahmanCMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BaluF16, author = {Raghavendran Balu and Teddy Furon}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Differentially Private Matrix Factorization using Sketching Techniques}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {57--62}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930793}, doi = {10.1145/2909827.2930793}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BaluF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BayarS16, author = {Belhassen Bayar and Matthew C. Stamm}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {5--10}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930786}, doi = {10.1145/2909827.2930786}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BayarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BerndtL16, author = {Sebastian Berndt and Maciej Liskiewicz}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {81--92}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930796}, doi = {10.1145/2909827.2930796}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BerndtL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Biggio16, author = {Battista Biggio}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Machine Learning under Attack: Vulnerability Exploitation and Security Measures}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {1--2}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930784}, doi = {10.1145/2909827.2930784}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Biggio16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BoroumandF16, author = {Mehdi Boroumand and Jessica J. Fridrich}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Boosting Steganalysis with Explicit Feature Maps}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {149--157}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930803}, doi = {10.1145/2909827.2930803}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BoroumandF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CarraraA16, author = {Brent Carrara and Carlisle Adams}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {115--126}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930800}, doi = {10.1145/2909827.2930800}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CarraraA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChabanneKL16, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Roch Lescuyer}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Study of a Verifiable Biometric Matching}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {183--184}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2931097}, doi = {10.1145/2909827.2931097}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ChabanneKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DangCBC16, author = {Hung Dang and Yun Long Chong and Francois Brun and Ee{-}Chien Chang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {69--80}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930795}, doi = {10.1145/2909827.2930795}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DangCBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DuanZL16, author = {Jia Duan and Jiantao Zhou and Yuanman Li}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization {(NMF)}}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {63--68}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930794}, doi = {10.1145/2909827.2930794}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/DuanZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HeBG16, author = {Kun He and Christophe Bidan and Ga{\"{e}}tan Le Guelvouit}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Privacy Protection for {JPEG} Content on Image-Sharing Platforms}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {185--186}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2933195}, doi = {10.1145/2909827.2933195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HeBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HouKSL16, author = {Jong{-}Uk Hou and Dongkyu Kim and Hyun{-}Ji Song and Heung{-}Kyu Lee}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {169--174}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930805}, doi = {10.1145/2909827.2930805}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HouKSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/IscenF16, author = {Ahmet Iscen and Teddy Furon}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Group Testing for Identification with Privacy}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {51--56}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930792}, doi = {10.1145/2909827.2930792}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/IscenF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Jerian16, author = {Martino Jerian}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Bringing Multimedia Security from the Research Lab to the Forensic Lab}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {3}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930785}, doi = {10.1145/2909827.2930785}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Jerian16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KaubaMU16, author = {Christof Kauba and Stefan Mayer and Andreas Uhl}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Image Segmentation Based Visual Security Evaluation}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {175--180}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930806}, doi = {10.1145/2909827.2930806}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/KaubaMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KerPB16, author = {Andrew D. Ker and Tom{\'{a}}s Pevn{\'{y}} and Patrick Bas}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Rethinking Optimal Embedding}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {93--102}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930797}, doi = {10.1145/2909827.2930797}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KerPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KogaI16, author = {Hiroki Koga and Kaoru Itabashi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {23--28}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930788}, doi = {10.1145/2909827.2930788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/KogaI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MaXS16, author = {Bin Ma and Jian Xu and Yun Q. Shi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {A Novel {CDMA} Based High Performance Reversible Data Hiding Scheme}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {39--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930790}, doi = {10.1145/2909827.2930790}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MaXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MegiasQ16, author = {David Meg{\'{\i}}as and Amna Qureshi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in {P2P} Distribution Systems: [Extended Abstract]}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {181--182}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2931096}, doi = {10.1145/2909827.2931096}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MegiasQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NamaziTP16, author = {Mina Namazi and Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Dynamic Privacy-Preserving Genomic Susceptibility Testing}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {45--50}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930791}, doi = {10.1145/2909827.2930791}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/NamaziTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PasquiniSBBP16, author = {Cecilia Pasquini and Pascal Sch{\"{o}}ttle and Rainer B{\"{o}}hme and Giulia Boato and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Forensics of High Quality and Nearly Identical {JPEG} Image Recompression}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {11--21}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930787}, doi = {10.1145/2909827.2930787}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/PasquiniSBBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangNZ16, author = {Junxiang Wang and Jiangqun Ni and Xing Zhang}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Efficient {HS} based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {29--38}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930789}, doi = {10.1145/2909827.2930789}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WangNZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangZCZ16, author = {Peipei Wang and Hong Zhang and Yun Cao and Xianfeng Zhao}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {127--137}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930801}, doi = {10.1145/2909827.2930801}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WangZCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WuWS16, author = {Han{-}Zhou Wu and Hong{-}Xia Wang and Yun{-}Qing Shi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {PPE-Based Reversible Data Hiding}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {187--188}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2933196}, doi = {10.1145/2909827.2933196}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WuWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WullerKM16, author = {Stefan W{\"{u}}ller and Mari{\'{a}}n K{\"{u}}hnel and Ulrike Meyer}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Information Hiding in the {RSA} Modulus}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {159--167}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930804}, doi = {10.1145/2909827.2930804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WullerKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/XuWS16, author = {Guanshuo Xu and Han{-}Zhou Wu and Yun Q. Shi}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Ensemble of CNNs for Steganalysis: An Empirical Study}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {103--107}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930798}, doi = {10.1145/2909827.2930798}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/XuWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoGZ16, author = {Zengzhen Zhao and Qingxiao Guan and Xianfeng Zhao}, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography}, booktitle = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, pages = {139--148}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827.2930802}, doi = {10.1145/2909827.2930802}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2016, editor = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Patrick Bas and Tanya Ignatenko and Fran{\c{c}}ois Cayre}, title = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2909827}, doi = {10.1145/2909827}, isbn = {978-1-4503-4290-2}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ArndtKDF15, author = {Christian Arndt and Stefan Kiltz and Jana Dittmann and Robert Fischer}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {91--96}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756615}, doi = {10.1145/2756601.2756615}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ArndtKDF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Aucsmith15, author = {David Aucsmith}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Implications of Cyber Warfare}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756622}, doi = {10.1145/2756601.2756622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Aucsmith15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BaroughiCM15, author = {Alireza Farrokh Baroughi and Scott Craver and Mohammed Faizan Mohsin}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {A Negative Number Vulnerability for Histogram-based Face Recognition Systems}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {155--160}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756617}, doi = {10.1145/2756601.2756617}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BaroughiCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BondA15, author = {William F. Bond and Ahmed Awad E. A.}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Touch-based Static Authentication Using a Virtual Grid}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {129--134}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756602}, doi = {10.1145/2756601.2756602}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BondA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BurgPB15, author = {Sebastian Matthias Burg and Dustin Peterson and Oliver Bringmann}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {End-to-Display Encryption: {A} Pixel-Domain Encryption with Security Benefit}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {123--128}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756613}, doi = {10.1145/2756601.2756613}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BurgPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CaoZZY15, author = {Yun Cao and Hong Zhang and Xianfeng Zhao and Haibo Yu}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Video Steganography Based on Optimized Motion Estimation Perturbation}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {25--31}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756609}, doi = {10.1145/2756601.2756609}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CaoZZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CarraraA15, author = {Brent C. Carrara and Carlisle M. Adams}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {On Characterizing and Measuring Out-of-Band Covert Channels}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {43--54}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756604}, doi = {10.1145/2756601.2756604}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/CarraraA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Chow15, author = {Richard Chow}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {IoT Privacy: Can We Regain Control?}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756623}, doi = {10.1145/2756601.2756623}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Chow15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DenemarkF15, author = {Tom{\'{a}}s Denemark and Jessica J. Fridrich}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Improving Steganographic Security by Synchronizing the Selection Channel}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {5--14}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756620}, doi = {10.1145/2756601.2756620}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/DenemarkF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FischerV15, author = {Robert Fischer and Claus Vielhauer}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Automated Firearm Identification: On using a novel Multiple-Slice-Shape {(MSS)} Approach for Comparison and Matching of Firing Pin Impression Topography}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {161--171}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756619}, doi = {10.1145/2756601.2756619}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/FischerV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Hajj-AhmadBCD15, author = {Adi Hajj{-}Ahmad and S{\'{e}}verine Baudry and Bertrand Chupeau and Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Flicker Forensics for Pirate Device Identification}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {75--84}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756612}, doi = {10.1145/2756601.2756612}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Hajj-AhmadBCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HouKCL15, author = {Jong{-}Uk Hou and Do{-}Gon Kim and Sunghee Choi and Heung{-}Kyu Lee}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {115--121}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756607}, doi = {10.1145/2756601.2756607}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HouKCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Laarhoven15, author = {Thijs Laarhoven}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Optimal Sequential Fingerprinting: Wald vs. Tardos}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {97--107}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756603}, doi = {10.1145/2756601.2756603}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Laarhoven15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiuWY15, author = {Bei{-}Bei Liu and Xingjie Wei and Jeff Yan}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {85--90}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756614}, doi = {10.1145/2756601.2756614}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiuWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NatarajKM15, author = {Lakshmanan Nataraj and S. Karthikeyan and B. S. Manjunath}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {{SATTVA:} SpArsiTy inspired classificaTion of malware VAriants}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {135--140}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756616}, doi = {10.1145/2756601.2756616}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/NatarajKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/RyuKY15, author = {Eun{-}Kyung Ryu and Dae{-}Soo Kim and Kee{-}Young Yoo}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {On Elliptic Curve Based Untraceable {RFID} Authentication Protocols}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {147--153}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756610}, doi = {10.1145/2756601.2756610}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/RyuKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchaferMBS15, author = {Marcel Sch{\"{a}}fer and Sebastian Mair and Waldemar Berchtold and Martin Steinebach}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Universal Threshold Calculation for Fingerprinting Decoders using Mixture Models}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {109--114}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756611}, doi = {10.1145/2756601.2756611}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/SchaferMBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SedighiF15, author = {Vahid Sedighi and Jessica J. Fridrich}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Effect of Imprecise Knowledge of the Selection Channel on Steganalysis}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {33--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756621}, doi = {10.1145/2756601.2756621}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/SedighiF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ShenHWLYL15, author = {Yao Shen and Liusheng Huang and Fei Wang and Xiaorong Lu and Wei Yang and Lu Li}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {LiHB: Lost in {HTTP} Behaviors - {A} Behavior-Based Covert Channel in {HTTP}}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {55--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756605}, doi = {10.1145/2756601.2756605}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ShenHWLYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SongLYLZ15, author = {Xiaofeng Song and Fenlin Liu and Chunfang Yang and Xiangyang Luo and Yi Zhang}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Steganalysis of Adaptive {JPEG} Steganography Using 2D Gabor Filters}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {15--23}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756608}, doi = {10.1145/2756601.2756608}, timestamp = {Wed, 28 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/SongLYLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WrightFL15, author = {Charles V. Wright and Wu{-}chi Feng and Feng Liu}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Thumbnail-Preserving Encryption for {JPEG}}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {141--146}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756618}, doi = {10.1145/2756601.2756618}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/WrightFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/YoonKJLL15, author = {Ji Won Yoon and Hyoungshick Kim and Hyun{-}Ju Jo and Hyelim Lee and Kwangsu Lee}, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Visual Honey Encryption: Application to Steganography}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, pages = {65--74}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2756601.2756606}, doi = {10.1145/2756601.2756606}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/YoonKJLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2015, editor = {Adnan M. Alattar and Jessica J. Fridrich and Ned M. Smith and Pedro {Comesa{~{n}}a Alfaro}}, title = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2756601}, isbn = {978-1-4503-3587-4}, timestamp = {Thu, 18 Jun 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BringerCFP0Z14, author = {Julien Bringer and Herv{\'{e}} Chabanne and M{\'{e}}lanie Favre and Alain Patey and Thomas Schneider and Michael Zohner}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {{GSHADE:} faster privacy-preserving distance computation and biometric identification}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {187--198}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600922}, doi = {10.1145/2600918.2600922}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BringerCFP0Z14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CarneinSB14, author = {Matthias Carnein and Pascal Sch{\"{o}}ttle and Rainer B{\"{o}}hme}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Predictable rain?: steganalysis of public-key steganography using wet paper codes}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {97--108}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600942}, doi = {10.1145/2600918.2600942}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/CarneinSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Clabian14, author = {Markus Clabian}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {FastPass: automated border control as challenging combination of various security technologies}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {61}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600944}, doi = {10.1145/2600918.2600944}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Clabian14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DragoiCC14, author = {Ioan{-}Catalin Dragoi and Dinu Coltuc and Ion Caciula}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Gradient based prediction for reversible watermarking by difference expansion}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {35--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600924}, doi = {10.1145/2600918.2600924}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/DragoiCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/EiblE14, author = {G{\"{u}}nther Eibl and Dominik Engel}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Influence of data granularity on nonintrusive appliance load monitoring}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {147--151}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600920}, doi = {10.1145/2600918.2600920}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/EiblE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FengXZX14, author = {Chunhui Feng and Zhengquan Xu and Wenting Zhang and Yanyan Xu}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Automatic location of frame deletion point for digital video forensics}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {171--179}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600923}, doi = {10.1145/2600918.2600923}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/FengXZX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FischerV14, author = {Robert Fischer and Claus Vielhauer}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Digital crime scene analysis: automatic matching of firing pin impressions on cartridge bottoms using 2d and 3d spatial features}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {77--82}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600930}, doi = {10.1145/2600918.2600930}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/FischerV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/GhoshHD14, author = {Sudeep Ghosh and Jason D. Hiser and Jack W. Davidson}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {What's the PointiSA?}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {23--34}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600928}, doi = {10.1145/2600918.2600928}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/GhoshHD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HildebrandtD14, author = {Mario Hildebrandt and Jana Dittmann}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {71--76}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600926}, doi = {10.1145/2600918.2600926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HildebrandtD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JelasityB14, author = {M{\'{a}}rk Jelasity and Kenneth P. Birman}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Distributional differential privacy for large-scale smart metering}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {141--146}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600919}, doi = {10.1145/2600918.2600919}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/JelasityB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KammerstetterLSK14, author = {Markus Kammerstetter and Lucie Langer and Florian Skopik and Wolfgang Kastner}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Architecture-driven smart grid security management}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {153--158}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600937}, doi = {10.1145/2600918.2600937}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/KammerstetterLSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Laarhoven14, author = {Thijs Laarhoven}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Capacities and capacity-achieving decoders for various fingerprinting games}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {123--134}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600925}, doi = {10.1145/2600918.2600925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Laarhoven14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/PevnyK14, author = {Tom{\'{a}}s Pevn{\'{y}} and Andrew D. Ker}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Steganographic key leakage through payload metadata}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {109--114}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600921}, doi = {10.1145/2600918.2600921}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/PevnyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/QiaoZCR14, author = {Tong Qiao and Cathel Zitzmann and R{\'{e}}mi Cogranne and Florent Retraint}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {3--13}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600932}, doi = {10.1145/2600918.2600932}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/QiaoZCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/QiuLLH14, author = {Xiaoqing Qiu and Haodong Li and Weiqi Luo and Jiwu Huang}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {A universal image forensic strategy based on steganalytic model}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {165--170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600941}, doi = {10.1145/2600918.2600941}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/QiuLLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/QuiringS14, author = {Erwin Quiring and Pascal Sch{\"{o}}ttle}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {41--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600939}, doi = {10.1145/2600918.2600939}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/QuiringS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/RaghavendraB14, author = {Ramachandra Raghavendra and Christoph Busch}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Robust palmprint verification using sparse representation of binarized statistical features: a comprehensive study}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {181--185}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600929}, doi = {10.1145/2600918.2600929}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/RaghavendraB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/RenZWZ14, author = {Yanzhen Ren and Liming Zhai and Lina Wang and Tingting Zhu}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Video steganalysis based on subtractive probability of optimal matching feature}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {83--90}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600938}, doi = {10.1145/2600918.2600938}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/RenZWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Schelkens14, author = {Peter Schelkens}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Image security tools for {JPEG} standards}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600943}, doi = {10.1145/2600918.2600943}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Schelkens14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/SchneiderS14, author = {Matthias Schneider and Thomas Schneider}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Notes on non-interactive secure comparison in "image feature extraction in the encrypted domain with privacy-preserving SIFT"}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {135--140}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600927}, doi = {10.1145/2600918.2600927}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/SchneiderS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TangLLH14, author = {Weixuan Tang and Haodong Li and Weiqi Luo and Jiwu Huang}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Adaptive steganalysis against {WOW} embedding algorithm}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {91--96}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600935}, doi = {10.1145/2600918.2600935}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/TangLLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TiwariG14, author = {Kamlesh Tiwari and Phalguni Gupta}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Biometrics based observer free transferable E-cash}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {63--70}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600934}, doi = {10.1145/2600918.2600934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/TiwariG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/UnterwegerU14, author = {Andreas Unterweger and Andreas Uhl}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Slice groups for post-compression region of interest encryption in {SVC}}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {15--22}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600940}, doi = {10.1145/2600918.2600940}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/UnterwegerU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/UrvoyA14, author = {Matthieu Urvoy and Florent Autrusseau}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Application of Grubbs' test for outliers to the detection of watermarks}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {49--60}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600931}, doi = {10.1145/2600918.2600931}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/UrvoyA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangCZZY14, author = {Hong Zhang and Yun Cao and Xianfeng Zhao and Weiming Zhang and Nenghai Yu}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Video steganography with perturbed macroblock partition}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {115--122}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600936}, doi = {10.1145/2600918.2600936}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangCZZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhaoCWM14, author = {Hong Zhao and Yifan Chen and Rui Wang and Hafiz Malik}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Audio source authentication and splicing detection using acoustic environmental signature}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {159--164}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600933}, doi = {10.1145/2600918.2600933}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhaoCWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2014, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2600918}, isbn = {978-1-4503-2647-6}, timestamp = {Tue, 16 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AmeriniBCC13, author = {Irene Amerini and Mauro Barni and Roberto Caldelli and Andrea Costanzo}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {{SIFT} keypoint removal and injection for countering matching-based image forensics}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {123--130}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482524}, doi = {10.1145/2482513.2482524}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/AmeriniBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BerchtoldSS13, author = {Waldemar Berchtold and Marcel Sch{\"{a}}fer and Martin Steinebach}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Leakage detection and tracing for databases}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {29--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482537}, doi = {10.1145/2482513.2482537}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BerchtoldSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BianchiRFRP13, author = {Tiziano Bianchi and Alessia De Rosa and Marco Fontani and Giovanni Rocciolo and Alessandro Piva}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Detection and classification of double compressed {MP3} audio tracks}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {159--164}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482523}, doi = {10.1145/2482513.2482523}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/BianchiRFRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/BouzidiZHP13, author = {Ines Bouzidi and Azza Ouled Zaid and Meha Hachani and William Puech}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Joint watermarking and progressive geometric compression of 3D meshes}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {209--214}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482530}, doi = {10.1145/2482513.2482530}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/BouzidiZHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenXLH13, author = {Jiaorong Chen and Shijun Xiang and Weiping Liu and Hongbin Huang}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Exposing digital audio forgeries in time domain by using singularity analysis with wavelets}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {149--158}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482516}, doi = {10.1145/2482513.2482516}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ChenXLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ColtucD13, author = {Dinu Coltuc and Ioan{-}Catalin Dragoi}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Context embedding for raster-scan rhombus based reversible watermarking}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {215--220}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482535}, doi = {10.1145/2482513.2482535}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/ColtucD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Engel13, author = {Dominik Engel}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Privacy and security challenges in the smart grid user domain}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {85--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482966}, doi = {10.1145/2482513.2482966}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Engel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/EngelUU13, author = {Dominik Engel and Andreas Uhl and Andreas Unterweger}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Region of interest signalling for encrypted {JPEG} images}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {165--174}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482518}, doi = {10.1145/2482513.2482518}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/EngelUU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/FanWCX13, author = {Wei Fan and Kai Wang and Fran{\c{c}}ois Cayre and Zhang Xiong}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {{JPEG} anti-forensics using non-parametric {DCT} quantization noise estimation and natural image statistics}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {117--122}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482536}, doi = {10.1145/2482513.2482536}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/FanWCX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HalvaniSWZ13, author = {Oren Halvani and Martin Steinebach and Patrick Wolf and Ralf Zimmermann}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Natural language watermarking for german texts}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {193--202}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482522}, doi = {10.1145/2482513.2482522}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HalvaniSWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Hammerle-UhlPU13, author = {Jutta H{\"{a}}mmerle{-}Uhl and Elias Pschernig and Andreas Uhl}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Non-invertible and revocable iris templates using key-dependent wavelet transforms}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {105--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482532}, doi = {10.1145/2482513.2482532}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Hammerle-UhlPU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Hammerle-UhlPU13a, author = {Jutta H{\"{a}}mmerle{-}Uhl and Michael Pober and Andreas Uhl}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Towards standardised fingerprint matching robustness assessment: the StirMark toolkit - cross-database comparisons with minutiae-based matching}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {111--116}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482531}, doi = {10.1145/2482513.2482531}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Hammerle-UhlPU13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HanilciE13, author = {Cemal Hanil{\c{c}}i and Figen Ertas}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Optimizing acoustic features for source cell-phone recognition using speech signals}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {141--148}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482520}, doi = {10.1145/2482513.2482520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HanilciE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HasseGB13, author = {Jakob Hasse and Thomas Gloe and Martin Beck}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Forensic identification of {GSM} mobile phones}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {131--140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482529}, doi = {10.1145/2482513.2482529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HasseGB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Ho13, author = {Anthony T. S. Ho}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {On the intertwining of information hiding and multimedia security: a personal perspective}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {191--192}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2484424}, doi = {10.1145/2482513.2484424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Ho13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HoHSB13, author = {Anh Thu Phan Ho and Bao An Mai Hoang and Wadih Sawaya and Patrick Bas}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Document authentication using graphical codes: impacts of the channel model}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {87--94}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482538}, doi = {10.1145/2482513.2482538}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HoHSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HolubF13, author = {Vojtech Holub and Jessica J. Fridrich}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Digital image steganography using universal distortion}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {59--68}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482514}, doi = {10.1145/2482513.2482514}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/HolubF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HuangLHS13, author = {Fangjun Huang and Weiqi Luo and Jiwu Huang and Yun{-}Qing Shi}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Distortion function designing for {JPEG} steganography with uncompressed side-image}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {69--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482517}, doi = {10.1145/2482513.2482517}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HuangLHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JiangZHM13, author = {Kai Jiang and Kenny Q. Zhu and Yan Huang and Xiaobin Ma}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Watermarking road maps against crop and merge attacks}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {221--230}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482526}, doi = {10.1145/2482513.2482526}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/JiangZHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/KerBBCCFFP13, author = {Andrew D. Ker and Patrick Bas and Rainer B{\"{o}}hme and R{\'{e}}mi Cogranne and Scott Craver and Tom{\'{a}}s Filler and Jessica J. Fridrich and Tom{\'{a}}s Pevn{\'{y}}}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Moving steganography and steganalysis from the laboratory into the real world}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {45--58}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482965}, doi = {10.1145/2482513.2482965}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/KerBBCCFFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kuribayashi13, author = {Minoru Kuribayashi}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {A simple tracing algorithm for binary fingerprinting code under averaging attack}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {3--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482521}, doi = {10.1145/2482513.2482521}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kuribayashi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LaarhovenW13, author = {Thijs Laarhoven and Benne de Weger}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Discrete distributions in the tardos scheme, revisited}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {13--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482533}, doi = {10.1145/2482513.2482533}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/LaarhovenW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LiHLL13, author = {Zhenyu Li and Zongyun Hu and Xiangyang Luo and Bin Lu}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Embedding change rate estimation based on ensemble learning}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {77--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482528}, doi = {10.1145/2482513.2482528}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/LiHLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MathonFAB13, author = {Benjamin Mathon and Teddy Furon and Laurent Amsaleg and Julien Bringer}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Secure and efficient approximate nearest neighbors search}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {175--180}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482539}, doi = {10.1145/2482513.2482539}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MathonFAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MerkelOCDVB13, author = {Ronny Merkel and Karen Otte and Robert Clausing and Jana Dittmann and Claus Vielhauer and Anja Br{\"{a}}utigam}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {First investigation of latent fingerprints long-term aging using chromatic white light sensors}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {95--104}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482519}, doi = {10.1145/2482513.2482519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MerkelOCDVB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MoussakhaniSFR13, author = {Babak Moussakhani and Mohammad Ali Sedaghat and John T. Fl{\aa}m and Tor A. Ramstad}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {On optimal detection for matrix multiplicative data hiding}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {203--208}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482534}, doi = {10.1145/2482513.2482534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/MoussakhaniSFR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/OosterwijkSD13, author = {Jan{-}Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Optimal suspicion functions for tardos traitor tracing schemes}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {19--28}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482527}, doi = {10.1145/2482513.2482527}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/OosterwijkSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Pehlivanoglu13, author = {Serdar Pehlivanoglu}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {35--44}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482525}, doi = {10.1145/2482513.2482525}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Pehlivanoglu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Troncoso13, author = {Carmela Troncoso}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Bayesian inference to evaluate information leakage in complex scenarios}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2485731}, doi = {10.1145/2482513.2485731}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/Troncoso13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WuODS13, author = {Xiaotian Wu and Duanhao Ou and Lu Dai and Wei Sun}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {XOR-based meaningful visual secret sharing by generalized random grids}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {181--190}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482515}, doi = {10.1145/2482513.2482515}, timestamp = {Mon, 05 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/WuODS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2013, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2482513}, isbn = {978-1-4503-2081-8}, timestamp = {Mon, 04 Aug 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Al-HassanJS12, author = {Nadia Al{-}Hassan and Sabah A. Jassim and Harin Sellahewa}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Enhancing face recognition at a distance using super resolution}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {123--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361429}, doi = {10.1145/2361407.2361429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Al-HassanJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ArndtKV12, author = {Christian Arndt and Christian Kraetzer and Claus Vielhauer}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {57--66}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361417}, doi = {10.1145/2361407.2361417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ArndtKV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BarniFT12, author = {Mauro Barni and Marco Fontani and Benedetta Tondi}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {A universal technique to hide traces of histogram-based image manipulations}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {97--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361424}, doi = {10.1145/2361407.2361424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BarniFT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Baudry12, author = {S{\'{e}}verine Baudry}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Frame-accurate temporal registration for non-blind video watermarking}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {19--26}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361411}, doi = {10.1145/2361407.2361411}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Baudry12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BerchtoldS12, author = {Waldemar Berchtold and Marcel Sch{\"{a}}fer}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Performance and code length optimization of joint decoding tardos fingerprinting}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {27--32}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361412}, doi = {10.1145/2361407.2361412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BerchtoldS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ClausingKDV12, author = {Eric Clausing and Christian Kraetzer and Jana Dittmann and Claus Vielhauer}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {47--56}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361416}, doi = {10.1145/2361407.2361416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ClausingKDV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ErbilekF12, author = {Meryem Erbilek and Michael C. Fairhurst}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {A methodological framework for investigating age factors on the performance of biometric systems}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {115--122}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361428}, doi = {10.1145/2361407.2361428}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ErbilekF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ErkinBVL12, author = {Zekeriya Erkin and Michael Beye and Thijs Veugen and Reginald L. Lagendijk}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Privacy-preserving content-based recommender system}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {77--84}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361420}, doi = {10.1145/2361407.2361420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ErkinBVL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FischerV12, author = {Robert Fischer and Claus Vielhauer}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Forensic ballistic analysis using a 3D sensor device}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {67--76}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361418}, doi = {10.1145/2361407.2361418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FischerV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GhianiMR12, author = {Luca Ghiani and Gian Luca Marcialis and Fabio Roli}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {157--164}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361434}, doi = {10.1145/2361407.2361434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GhianiMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GloePK12, author = {Thomas Gloe and Stefan Pfennig and Matthias Kirchner}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {109--114}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361426}, doi = {10.1145/2361407.2361426}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GloePK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GuanLH12, author = {Yu Guan and Chang{-}Tsun Li and Yongjian Hu}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {An adaptive system for gait recognition in multi-view environments}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {139--144}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361431}, doi = {10.1145/2361407.2361431}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GuanLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/IzadiD12, author = {M. Hamed Izadi and Andrzej Drygajlo}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Embedding cylinder quality measures into minutia cylinder-code based latent fingerprint matching}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {33--38}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361414}, doi = {10.1145/2361407.2361414}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/IzadiD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KaravarsamisPN12, author = {Sotiris Karavarsamis and Ioannis Pitas and Nikos Ntarmos}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Recognizing pornographic images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {105--108}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361425}, doi = {10.1145/2361407.2361425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KaravarsamisPN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KargelHD12, author = {Rainer K{\"{a}}rgel and Mario Hildebrandt and Jana Dittmann}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {An evaluation of biometric fingerprint matchers in a forensic context using latent impressions}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {133--138}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361430}, doi = {10.1145/2361407.2361430}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KargelHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KerP12, author = {Andrew David Ker and Tom{\'{a}}s Pevn{\'{y}}}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Batch steganography in the real world}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {1--10}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361409}, doi = {10.1145/2361407.2361409}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LazzerettiGB12, author = {Riccardo Lazzeretti and Jorge Guajardo and Mauro Barni}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Privacy preserving {ECG} quality evaluation}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {165--174}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361435}, doi = {10.1145/2361407.2361435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LazzerettiGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LubenkoK12, author = {Ivans Lubenko and Andrew D. Ker}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Steganalysis with mismatched covers: do simple classifiers help?}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {11--18}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361410}, doi = {10.1145/2361407.2361410}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LubenkoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MerkelV12, author = {Ronny Merkel and Claus Vielhauer}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {On using flat bed scanners for the age determination of latent fingerprints: first results for the binary pixel feature}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {39--46}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361415}, doi = {10.1145/2361407.2361415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MerkelV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/NambiarCS12, author = {Athira M. Nambiar and Paulo Lobato Correia and Lu{\'{\i}}s Ducla Soares}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Frontal gait recognition combining 2D and 3D data}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {145--150}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361432}, doi = {10.1145/2361407.2361432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/NambiarCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PanagakisK12, author = {Yannis Panagakis and Constantine Kotropoulos}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Automatic telephone handset identification by sparse representation of random spectral features}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {91--96}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361422}, doi = {10.1145/2361407.2361422}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/PanagakisK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SattaFR12, author = {Riccardo Satta and Giorgio Fumera and Fabio Roli}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Appearance-based people recognition by local dissimilarity representations}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {151--156}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361433}, doi = {10.1145/2361407.2361433}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SattaFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/UnterwegerU12, author = {Andreas Unterweger and Andreas Uhl}, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Length-preserving bit-stream-based {JPEG} encryption}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, pages = {85--90}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2361407.2361421}, doi = {10.1145/2361407.2361421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/UnterwegerU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2012, editor = {Chang{-}Tsun Li and Jana Dittmann and Stefan Katzenbeisser and Scott Craver}, title = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United Kingdom, September 6-7, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2361407}, isbn = {978-1-4503-1417-6}, timestamp = {Tue, 16 Dec 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/0001SKH11, author = {Kun Qian and Maik Schott and Christian Kraetzer and Matthias L. Hemmje}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Contextualizing security for digital long-term preservation}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {115--120}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037274}, doi = {10.1145/2037252.2037274}, timestamp = {Mon, 20 Dec 2021 11:32:07 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/0001SKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AhmadLAM11, author = {Junaid Jameel Ahmad and Shujun Li and Ihab Amer and Marco Mattavelli}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Building multimedia security applications in the {MPEG} reconfigurable video coding {(RVC)} framework}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {121--130}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037275}, doi = {10.1145/2037252.2037275}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AhmadLAM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ChoiCL11, author = {Chang{-}Hee Choi and Jung{-}Ho Choi and Heung{-}Kyu Lee}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {{CFA} pattern identification of digital cameras using intermediate value counting}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {21--26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037258}, doi = {10.1145/2037252.2037258}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/ChoiCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Franz011, author = {Martin Franz and Stefan Katzenbeisser}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Processing encrypted floating point signals}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {103--108}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037271}, doi = {10.1145/2037252.2037271}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Franz011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HildebrandtKDV11, author = {Mario Hildebrandt and Stefan Kiltz and Jana Dittmann and Claus Vielhauer}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {33--40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037260}, doi = {10.1145/2037252.2037260}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HildebrandtKDV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HildebrandtKGV11, author = {Mario Hildebrandt and Stefan Kiltz and Ina Grossmann and Claus Vielhauer}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {1--8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037254}, doi = {10.1145/2037252.2037254}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HildebrandtKGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KanadePD11, author = {Sanjay Ganesh Kanade and Dijana Petrovska{-}Delacr{\'{e}}taz and Bernadette Dorizzi}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Multi-biometrics based crypto-biometric session key generation and sharing protocol}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {109--114}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037272}, doi = {10.1145/2037252.2037272}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KanadePD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Kiertscher0V11, author = {Tobias Kiertscher and Robert Fischer and Claus Vielhauer}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Latent fingerprint detection using a spectral texture feature}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {27--32}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037259}, doi = {10.1145/2037252.2037259}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Kiertscher0V11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KodovskyFH11, author = {Jan Kodovsk{\'{y}} and Jessica J. Fridrich and Vojtech Holub}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {On dangers of overtraining steganography to incomplete cover model}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {69--76}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037266}, doi = {10.1145/2037252.2037266}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KodovskyFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KraetzerMACD11, author = {Christian Kraetzer and Ronny Merkel and Robert Altschaffel and Eric Clausing and Jana Dittmann}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {93--102}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037270}, doi = {10.1145/2037252.2037270}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KraetzerMACD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC11, author = {Enping Li and Scott Craver}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {A square-root law for active wardens}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {87--92}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037268}, doi = {10.1145/2037252.2037268}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Liu11, author = {Qingzhong Liu}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Steganalysis of DCT-embedding based adaptive steganography and {YASS}}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {77--86}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037267}, doi = {10.1145/2037252.2037267}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Liu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Lu011, author = {Wenjun Lu and Min Wu}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Seam carving estimation using forensic hash}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {9--14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037255}, doi = {10.1145/2037252.2037255}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Lu011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MerkelBKDV11, author = {Ronny Merkel and Anja Br{\"{a}}utigam and Christian Kraetzer and Jana Dittmann and Claus Vielhauer}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light {(CWL)} sensor}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {41--50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037262}, doi = {10.1145/2037252.2037262}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MerkelBKDV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PanZL11, author = {Xunyu Pan and Xing Zhang and Siwei Lyu}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Exposing image forgery with blind noise estimation}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {15--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037256}, doi = {10.1145/2037252.2037256}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/PanZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ScheidatV011, author = {Tobias Scheidat and Claus Vielhauer and Robert Fischer}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Comparative study on fusion strategies for biometric handwriting}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {61--68}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037264}, doi = {10.1145/2037252.2037264}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ScheidatV011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SerwaddaPK11, author = {Abdul Serwadda and Vir V. Phoha and Ankunda R. Kiremire}, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Using global knowledge of users' typing traits to attack keystroke biometrics templates}, booktitle = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, pages = {51--60}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252.2037263}, doi = {10.1145/2037252.2037263}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SerwaddaPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2011, editor = {Chad Heitzenrater and Scott Craver and Jana Dittmann}, title = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia and security, MM{\&}Sec '11, Buffalo, New York, USA, September 29-30, 2011}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2037252}, doi = {10.1145/2037252}, isbn = {978-1-4503-0806-9}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Al-AssamSJ10, author = {Hisham Al{-}Assam and Harin Sellahewa and Sabah Jassim}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Multi-factor biometrics for authentication: a false sense of security}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {81--88}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854246}, doi = {10.1145/1854229.1854246}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Al-AssamSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ArnoldBC10, author = {Michael Arnold and Peter G. Baum and Xiao{-}Ming Chen}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Robust detection of audio watermarks after acoustic path transmission}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {117--126}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854253}, doi = {10.1145/1854229.1854253}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ArnoldBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BarniBCRLFFLPSP10, author = {Mauro Barni and Tiziano Bianchi and Dario Catalano and Mario Di Raimondo and Ruggero Donida Labati and Pierluigi Failla and Dario Fiore and Riccardo Lazzeretti and Vincenzo Piuri and Fabio Scotti and Alessandro Piva}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Privacy-preserving fingercode authentication}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {231--240}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854270}, doi = {10.1145/1854229.1854270}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/BarniBCRLFFLPSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BeaugeD10, author = {Lionel Beaug{\'{e}} and Andrzej Drygajlo}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Fully featured secure biometric smart card device for fingerprint-based authentication and identification}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {181--186}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854263}, doi = {10.1145/1854229.1854263}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BeaugeD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BhowmikA10, author = {Deepayan Bhowmik and Charith Abhayaratne}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Video watermarking using motion compensated 2D+t+2D filtering}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {127--136}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854254}, doi = {10.1145/1854229.1854254}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BhowmikA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BringerC10, author = {Julien Bringer and Herv{\'{e}} Chabanne}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Negative databases for biometric data}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {55--62}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854242}, doi = {10.1145/1854229.1854242}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BringerC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/CaoZNT10, author = {Gang Cao and Yao Zhao and Rongrong Ni and Huawei Tian}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Anti-forensics of contrast enhancement in digital images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {25--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854237}, doi = {10.1145/1854229.1854237}, timestamp = {Thu, 05 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/CaoZNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ChoiLLS10, author = {Jung{-}Ho Choi and Heung{-}Kyu Lee and Hae{-}Yeoun Lee and Young{-}Ho Suh}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Color laser printer forensics with noise texture analysis}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {19--24}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854235}, doi = {10.1145/1854229.1854235}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ChoiLLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FaillaSB10, author = {Pierluigi Failla and Yagiz Sutcu and Mauro Barni}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {241--246}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854271}, doi = {10.1145/1854229.1854271}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FaillaSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FengD10, author = {Xiaoying Feng and Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {FLD-based detection of re-compressed speech signals}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {43--48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854239}, doi = {10.1145/1854229.1854239}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/FengD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FillerF10, author = {Tom{\'{a}}s Filler and Jessica J. Fridrich}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Steganography using Gibbs random fields}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {199--212}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854266}, doi = {10.1145/1854229.1854266}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FillerF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FontaniRCFPCC10, author = {Marco Fontani and Alessia De Rosa and Roberto Caldelli and Francesco Filippini and Alessandro Piva and Matteo Consalvo and Vito Cappellini}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Reversible watermarking for image integrity verification in hierarchical {PACS}}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {161--168}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854259}, doi = {10.1145/1854229.1854259}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FontaniRCFPCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GaoZWL10, author = {Xifeng Gao and Caiming Zhang and Yu Wei and Weitao Li}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {A highly adaptable capacity and invisibility 3D watermarking based on four-points sets}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {137--146}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854255}, doi = {10.1145/1854229.1854255}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GaoZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GreitansPF10, author = {Modris Greitans and Mihails Pudzs and Rihards Fuksis}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Palm vein biometrics based on infrared imaging and complex matched filtering}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {101--106}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854250}, doi = {10.1145/1854229.1854250}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/GreitansPF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Juels10, author = {Ari Juels}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Biometrics in electronic travel documents}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {1--2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854231}, doi = {10.1145/1854229.1854231}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Juels10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Ker10, author = {Andrew D. Ker}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {The square root law does not require a linear key}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {213--224}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854267}, doi = {10.1145/1854229.1854267}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Ker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Kirchner10, author = {Matthias Kirchner}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Linear row and column predictors for the analysis of resized images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {13--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854234}, doi = {10.1145/1854229.1854234}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Kirchner10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KodovskyF10, author = {Jan Kodovsk{\'{y}} and Jessica J. Fridrich}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Quantitative steganalysis of {LSB} embedding in {JPEG} domain}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {187--198}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854265}, doi = {10.1145/1854229.1854265}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KodovskyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KraetzerMACSD10, author = {Christian Kraetzer and Ronny Merkel and Robert Altschaffel and Eric Clausing and Maik Schott and Jana Dittmann}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Modelling watermark communication protocols using the {CASPER} modelling language}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {107--116}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854252}, doi = {10.1145/1854229.1854252}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KraetzerMACSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KummelV10, author = {Karl K{\"{u}}mmel and Claus Vielhauer}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {67--72}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854244}, doi = {10.1145/1854229.1854244}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KummelV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LeeLORL10, author = {Ji Won Lee and Min{-}Jeong Lee and Tae{-}Woo Oh and Seung{-}Jin Ryu and Heung{-}Kyu Lee}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Screenshot identification using combing artifact from interlaced video}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {49--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854240}, doi = {10.1145/1854229.1854240}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LeeLORL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LevettJA10, author = {Chris P. Levett and Arshad Jhumka and Sarabjot Singh Anand}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Towards event ordering in digital forensics}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {35--42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854238}, doi = {10.1145/1854229.1854238}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LevettJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Lyu10, author = {Siwei Lyu}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Estimating vignetting function from a single image for image authentication}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {3--12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854233}, doi = {10.1145/1854229.1854233}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Lyu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MakrushinVD10, author = {Andrey Makrushin and Claus Vielhauer and Jana Dittmann}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {The impact of {ARTMAP} to appearance-based face verification}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {89--94}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854248}, doi = {10.1145/1854229.1854248}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/MakrushinVD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MeerwaldU10, author = {Peter Meerwald and Andreas Uhl}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Watermark detection on quantized transform coefficients using product bernoulli distributions}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {175--180}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854261}, doi = {10.1145/1854229.1854261}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MeerwaldU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MuzzarelliCBE10, author = {Michele Muzzarelli and Marco Carli and Giulia Boato and Karen O. Egiazarian}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Reversible watermarking via histogram shifting and least square optimization}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {147--152}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854256}, doi = {10.1145/1854229.1854256}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MuzzarelliCBE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchaferBZS10, author = {Marcel Sch{\"{a}}fer and Waldemar Berchtold and Sascha Zmudzinski and Martin Steinebach}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Zero false positive 2-secure fingerprinting watermarking based on combining hamming distance conditions and parent pair search}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {169--174}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854260}, doi = {10.1145/1854229.1854260}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchaferBZS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchwambergerF10, author = {Valentin Schwamberger and Matthias O. Franz}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Simple algorithmic modifications for improving blind steganalysis performance}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {225--230}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854268}, doi = {10.1145/1854229.1854268}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchwambergerF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/StutzPAUH10, author = {Thomas St{\"{u}}tz and Vinod Pankajakshan and Florent Autrusseau and Andreas Uhl and Heinz Hofbauer}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Subjective and objective quality assessment of transparently encrypted {JPEG2000} images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {247--252}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854272}, doi = {10.1145/1854229.1854272}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/StutzPAUH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VelardoD10, author = {Carmelo Velardo and Jean{-}Luc Dugelay}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Face recognition with {DAISY} descriptors}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {95--100}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854249}, doi = {10.1145/1854229.1854249}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VelardoD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WillemsI10, author = {Frans M. J. Willems and Tanya Ignatenko}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Identification and secret-key generation in biometric systems with protected templates}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {63--66}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854243}, doi = {10.1145/1854229.1854243}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/WillemsI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/XieFF10, author = {Fuchun Xie and Teddy Furon and Caroline Fontaine}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Towards robust and secure watermarking}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {153--160}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854258}, doi = {10.1145/1854229.1854258}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/XieFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/XuV10, author = {Haiyun Xu and Raymond N. J. Veldhuis}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {73--80}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854245}, doi = {10.1145/1854229.1854245}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/XuV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2010, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1854229}, isbn = {978-1-4503-0286-9}, timestamp = {Thu, 22 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/0008CZX09, author = {Ming Chen and Zhenyong Chen and Xiao Zeng and Zhang Xiong}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Reversible data hiding using additive prediction-error expansion}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {19--24}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597822}, doi = {10.1145/1597817.1597822}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/0008CZX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AtakliCWC09, author = {Idris M. Atakli and Yu Chen and Qing Wu and Scott Craver}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {{BLINK:} pixel-domain encryption for secure document management}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {171--176}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597847}, doi = {10.1145/1597817.1597847}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AtakliCWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BasW09, author = {Patrick Bas and Andreas Westfeld}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Two key estimation techniques for the broken arrows watermarking scheme}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {1--8}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597819}, doi = {10.1145/1597817.1597819}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BasW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/CaoZF09, author = {Yun Cao and Xianfeng Zhao and Dengguo Feng}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Entropy codec based on evolutionary {MHT} and its application in video encryption}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {155--160}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597845}, doi = {10.1145/1597817.1597845}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/CaoZF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DAlessandroS09, author = {Brian D'Alessandro and Yun Q. Shi}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Mp3 bit rate quality detection through frequency spectrum analysis}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {57--62}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597828}, doi = {10.1145/1597817.1597828}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/DAlessandroS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DengBPP09, author = {Mina Deng and Tiziano Bianchi and Alessandro Piva and Bart Preneel}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {An efficient buyer-seller watermarking protocol based on composite signal representation}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {9--18}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597820}, doi = {10.1145/1597817.1597820}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/DengBPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FanJH09, author = {Na Fan and Cheng Jin and Yizhen Huang}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {A pixel-based digital photo authentication framework via demosaicking inter-pixel correlation}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {125--130}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597839}, doi = {10.1145/1597817.1597839}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/FanJH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FranzRB09, author = {Elke Franz and Stefan R{\"{o}}nisch and Robert Bartel}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Improved embedding based on a set of cover images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {141--150}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597842}, doi = {10.1145/1597817.1597842}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FranzRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FuronP09, author = {Teddy Furon and Luis P{\'{e}}rez{-}Freire}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {{EM} decoding of tardos traitor tracing codes}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {99--106}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597835}, doi = {10.1145/1597817.1597835}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FuronP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HofbauerU09, author = {Heinz Hofbauer and Andreas Uhl}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Selective encryption of the {MC} {EZBC} bitstream for {DRM} scenarios}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {161--170}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597846}, doi = {10.1145/1597817.1597846}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HofbauerU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Ker09, author = {Andrew D. Ker}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {The square root law requires a linear key}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {85--92}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597832}, doi = {10.1145/1597817.1597832}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Ker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KodovskyF09, author = {Jan Kodovsk{\'{y}} and Jessica J. Fridrich}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Calibration revisited}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {63--74}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597830}, doi = {10.1145/1597817.1597830}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KodovskyF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KraetzerSD09, author = {Christian Kraetzer and Maik Schott and Jana Dittmann}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {49--56}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597827}, doi = {10.1145/1597817.1597827}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KraetzerSD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC09, author = {Enping Li and Scott Craver}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {A supraliminal channel in a wireless phone application}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {151--154}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597843}, doi = {10.1145/1597817.1597843}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LiC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Lin0B09, author = {W. Sabrina Lin and Shan He and Jeffrey Bloom}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Performance study and improvement on ECC-based binary anti-collusion forensic code for multimedia}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {93--98}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597834}, doi = {10.1145/1597817.1597834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Lin0B09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MathonBCM09, author = {Benjamin Mathon and Patrick Bas and Fran{\c{c}}ois Cayre and Beno{\^{\i}}t Macq}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Optimization of natural watermarking using transportation theory}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {33--38}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597824}, doi = {10.1145/1597817.1597824}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MathonBCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MeerwaldU09, author = {Peter Meerwald and Andreas Uhl}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Additive spread-spectrum watermark detection in demosaicked images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {25--32}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597823}, doi = {10.1145/1597817.1597823}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MeerwaldU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PevnyBF09, author = {Tom{\'{a}}s Pevn{\'{y}} and Patrick Bas and Jessica J. Fridrich}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Steganalysis by subtractive pixel adjacency matrix}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {75--84}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597831}, doi = {10.1145/1597817.1597831}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/PevnyBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SachnevKZ09, author = {Vasiliy Sachnev and Hyoung Joong Kim and Rongyue Zhang}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Less detectable {JPEG} steganography method based on heuristic optimization and {BCH} syndrome coding}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {131--140}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597841}, doi = {10.1145/1597817.1597841}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SachnevKZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SarkarNM09, author = {Anindya Sarkar and Lakshmanan Nataraj and B. S. Manjunath}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Detection of seam carving and localization of seam insertions in digital images}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {107--116}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597837}, doi = {10.1145/1597817.1597837}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SarkarNM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WangF09, author = {Weihong Wang and Hany Farid}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Exposing digital forgeries in video by detecting double quantization}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {39--48}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597826}, doi = {10.1145/1597817.1597826}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/WangF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YangSH09, author = {Rui Yang and Yun{-}Qing Shi and Jiwu Huang}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Defeating fake-quality {MP3}}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {117--124}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597838}, doi = {10.1145/1597817.1597838}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/YangSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2009, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, publisher = {{ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1597817}, isbn = {978-1-60558-492-8}, timestamp = {Mon, 04 Aug 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AgarwalP08, author = {Parag Agarwal and Balakrishnan Prabhakaran}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Tamper proofing mechanisms for motion capture data}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {91--100}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411346}, doi = {10.1145/1411328.1411346}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/AgarwalP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BasD08, author = {Patrick Bas and Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {227--232}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411366}, doi = {10.1145/1411328.1411366}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/BasD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BianchiPB08, author = {Tiziano Bianchi and Alessandro Piva and Mauro Barni}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Efficient pointwise and blockwise encrypted operations}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {85--90}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411344}, doi = {10.1145/1411328.1411344}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BianchiPB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BiermannHDV08, author = {Michael Biermann and Tobias Hoppe and Jana Dittmann and Claus Vielhauer}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Vehicle systems: comfort {\&} security enhancement of face/speech fusion with compensational biometric modalities}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {185--194}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411360}, doi = {10.1145/1411328.1411360}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BiermannHDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Cox08, author = {Ingemar J. Cox}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Watermarking, steganography and content forensics}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {1--2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411330}, doi = {10.1145/1411328.1411330}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Cox08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Diehl08, author = {Malte Diehl}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Secure covert channels in multiplayer games}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {117--122}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411350}, doi = {10.1145/1411328.1411350}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Diehl08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Hammerle-UhlUW08, author = {Jutta H{\"{a}}mmerle{-}Uhl and Andreas Uhl and Hartmut Wernisch}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Multiple re-watermarking using varying non-stationary mra with parameterized wavelet filters}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {63--68}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411340}, doi = {10.1145/1411328.1411340}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Hammerle-UhlUW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KeeF08, author = {Eric Kee and Hany Farid}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Printer profiling for forensics and ballistics}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {3--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411332}, doi = {10.1145/1411328.1411332}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KeeF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Ker08, author = {Andrew D. Ker}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Locating steganographic payload via ws residuals}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {27--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411335}, doi = {10.1145/1411328.1411335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Ker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KerPKF08, author = {Andrew D. Ker and Tom{\'{a}}s Pevn{\'{y}} and Jan Kodovsk{\'{y}} and Jessica J. Fridrich}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {The square root law of steganographic capacity}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {107--116}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411349}, doi = {10.1145/1411328.1411349}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KerPKF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KimLLS08, author = {Kyung{-}Su Kim and Min{-}Jeong Lee and Heung{-}Kyu Lee and Young{-}Ho Suh}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Histogram-based reversible data hiding technique using subsampling}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {69--74}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411341}, doi = {10.1145/1411328.1411341}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KimLLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Kirchner08, author = {Matthias Kirchner}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Fast and reliable resampling detection by spectral analysis of fixed linear predictor residue}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411333}, doi = {10.1145/1411328.1411333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Kirchner08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KodovskyF08, author = {Jan Kodovsk{\'{y}} and Jessica J. Fridrich}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {On completeness of feature spaces in blind steganalysis}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {123--132}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411352}, doi = {10.1145/1411328.1411352}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KodovskyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KovalVP08, author = {Oleksiy J. Koval and Sviatoslav Voloshynovskiy and Thierry Pun}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Privacy-preserving multimodal person and object identification}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {177--184}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411359}, doi = {10.1145/1411328.1411359}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KovalVP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KraetzerD08, author = {Christian Kr{\"{a}}tzer and Jana Dittmann}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Impact of feature selection in classification for hidden channel detection on the example of audio data hiding}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {159--166}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411356}, doi = {10.1145/1411328.1411356}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KraetzerD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KwittMU08, author = {Roland Kwitt and Peter Meerwald and Andreas Uhl}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {A lightweight rao-cauchy detector for additive watermarking in the dwt-domain}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {33--42}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411337}, doi = {10.1145/1411328.1411337}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KwittMU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiSH08, author = {Bin Li and Yun Q. Shi and Jiwu Huang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Steganalysis of {YASS}}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {139--148}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411354}, doi = {10.1145/1411328.1411354}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiZY08, author = {Xiaolong Li and Tieyong Zeng and Bin Yang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Detecting {LSB} matching by applying calibration technique for difference image}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {133--138}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411353}, doi = {10.1145/1411328.1411353}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiuPG08, author = {Yang Liu and Balakrishnan Prabhakaran and Xiaohu Guo}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {A robust spectral approach for blind watermarking of manifold surfaces}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {43--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411338}, doi = {10.1145/1411328.1411338}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiuPG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Malik08, author = {Hafiz Malik}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Steganalysis of {QIM} steganography using irregularity measure}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {149--158}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411355}, doi = {10.1145/1411328.1411355}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Malik08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PevnyF08, author = {Tom{\'{a}}s Pevn{\'{y}} and Jessica J. Fridrich}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Novelty detection in blind steganalysis}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {167--176}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411357}, doi = {10.1145/1411328.1411357}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/PevnyF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Schaathun08, author = {Hans Georg Schaathun}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {A key-recovery attack on authentication watermarking by li and yuan}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {221--226}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411365}, doi = {10.1145/1411328.1411365}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Schaathun08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchlauwegPZM08, author = {Mathias Schlauweg and Dima Pr{\"{o}}frock and Benedikt Zeibich and Erika M{\"{u}}ller}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Self-synchronizing robust texel watermarking in gaussian scale-space}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {53--62}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411339}, doi = {10.1145/1411328.1411339}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchlauwegPZM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VoloshynovskiyKP08, author = {Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Thierry Pun}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Multimodal authentication based on random projections and source coding}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {195--204}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411361}, doi = {10.1145/1411328.1411361}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VoloshynovskiyKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Westfeld08, author = {Andreas Westfeld}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {A regression-based restoration technique for automated watermark removal}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {215--220}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411364}, doi = {10.1145/1411328.1411364}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Westfeld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WilliamsTHC08, author = {David M. Williams and Helen Treharne and Anthony T. S. Ho and Chris Culnane}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {205--214}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411363}, doi = {10.1145/1411328.1411363}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/WilliamsTHC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/XieFF08, author = {Fuchun Xie and Teddy Furon and Caroline Fontaine}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {On-off keying modulation and tardos fingerprinting}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {101--106}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411347}, doi = {10.1145/1411328.1411347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/XieFF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YangQH08, author = {Rui Yang and Zhenhua Qu and Jiwu Huang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Detecting digital audio forgeries by checking frame offsets}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {21--26}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411334}, doi = {10.1145/1411328.1411334}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/YangQH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ZmudzinskiS08, author = {Sascha Zmudzinski and Martin Steinebach}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Psycho-acoustic model-based message authentication coding for audio data}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {75--84}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411343}, doi = {10.1145/1411328.1411343}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ZmudzinskiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2008, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-058-6}, timestamp = {Tue, 25 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AgarwalP07, author = {Parag Agarwal and Balakrishnan Prabhakaran}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Robust blind watermarking mechanism for point sampled geometry}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {175--186}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288894}, doi = {10.1145/1288869.1288894}, timestamp = {Mon, 22 Apr 2024 21:24:22 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/AgarwalP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BaligaK07, author = {Arati Baliga and Joe Kilian}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {On covert collaboration}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {25--34}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288874}, doi = {10.1145/1288869.1288874}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BaligaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BarniDM07, author = {Mauro Barni and Angela D'Angelo and Neri Merhav}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Expanding the class of watermark de-synchronization attacks}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {195--204}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288897}, doi = {10.1145/1288869.1288897}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BarniDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ComesanaP07, author = {Pedro Comesa{\~{n}}a and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {On the capacity of stegosystems}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {15--24}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288873}, doi = {10.1145/1288869.1288873}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/ComesanaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/CzarlinskaK07, author = {Alexandra Czarlinska and Deepa Kundur}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Attack vs. failure detection in event-driven wireless visual sensor networks}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {215--220}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288899}, doi = {10.1145/1288869.1288899}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/CzarlinskaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DybalaJL07, author = {Brandon Dybala and Brian Jennings and David Letscher}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Detecting filtered cloning in digital images}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {43--50}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288877}, doi = {10.1145/1288869.1288877}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/DybalaJL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/EngelSU07, author = {Dominik Engel and Thomas St{\"{u}}tz and Andreas Uhl}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Format-compliant jpeg2000 encryption with combined packet header and packet body protection}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {87--96}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288882}, doi = {10.1145/1288869.1288882}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/EngelSU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FridrichPK07, author = {Jessica J. Fridrich and Tom{\'{a}}s Pevn{\'{y}} and Jan Kodovsk{\'{y}}}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {3--14}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288872}, doi = {10.1145/1288869.1288872}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/FridrichPK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/JacobJV07, author = {Matthias Jacob and Mariusz H. Jakubowski and Ramarathnam Venkatesan}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {129--140}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288887}, doi = {10.1145/1288869.1288887}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/JacobJV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/JainskyKH07, author = {Julien S. Jainsky and Deepa Kundur and Don R. Halverson}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Towards digital video steganalysis using asymptotic memoryless detection}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {161--168}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288891}, doi = {10.1145/1288869.1288891}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/JainskyKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Ker07, author = {Andrew D. Ker}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {The ultimate steganalysis benchmark?}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {141--148}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288889}, doi = {10.1145/1288869.1288889}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Ker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KratzerODL07, author = {Christian Kr{\"{a}}tzer and Andrea Oermann and Jana Dittmann and Andreas Lang}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Digital audio forensics: a first practical evaluation on microphone and environment classification}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {63--74}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288879}, doi = {10.1145/1288869.1288879}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KratzerODL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LuhK07, author = {William Luh and Deepa Kundur}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Distributed keyless security for correlated data with applications in visual sensor networks}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {75--86}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288881}, doi = {10.1145/1288869.1288881}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LuhK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MaheshwariAP07, author = {Puneet Maheshwari and Parag Agarwal and Balakrishnan Prabhakaran}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Progressive compression invariant semi-fragile watermarks for 3d meshes}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {245--250}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288904}, doi = {10.1145/1288869.1288904}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/MaheshwariAP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MalikSC07, author = {Hafiz Malik and K. P. Subbalakshmi and Rajarathnam Chandramouli}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Steganalysis of GIM-based data hiding using kernel density estimation}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {149--160}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288890}, doi = {10.1145/1288869.1288890}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/MalikSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MathonBC07, author = {Benjamin Mathon and Patrick Bas and Fran{\c{c}}ois Cayre}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {237--244}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288903}, doi = {10.1145/1288869.1288903}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MathonBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Nafornita07, author = {Corina Nafornita}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {A new pixel-wise mask for watermarking}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {221--228}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288901}, doi = {10.1145/1288869.1288901}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Nafornita07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/NoorkamiM07, author = {Maneli Noorkami and Russell M. Mersereau}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Video watermark detection with controllable performance with and without knowledge of watermark location}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {229--236}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288902}, doi = {10.1145/1288869.1288902}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/NoorkamiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ProfrockSM07, author = {Dima Pr{\"{o}}frock and Mathias Schlauweg and Erika M{\"{u}}ller}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Geometric warping watermarking extended concerning geometric attacks and embedding artifacts}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {169--174}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288893}, doi = {10.1145/1288869.1288893}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ProfrockSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SencarLM07, author = {Husrev T. Sencar and Qiming Li and Nasir D. Memon}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {A new approach to countering ambiguity attacks}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {205--214}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288898}, doi = {10.1145/1288869.1288898}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SencarLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ShiCC07, author = {Yun Q. Shi and Chunhua Chen and Wen Chen}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {A natural image model approach to splicing detection}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {51--62}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288878}, doi = {10.1145/1288869.1288878}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/ShiCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/StutzU07, author = {Thomas St{\"{u}}tz and Andreas Uhl}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {On efficient transparent jpeg2000 encryption}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {97--108}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288883}, doi = {10.1145/1288869.1288883}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/StutzU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Thuraisingham07, author = {Bhavani Thuraisingham}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Multimedia systems security}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {1--2}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288870}, doi = {10.1145/1288869.1288870}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/Thuraisingham07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Troncoso-PastorizaKCL07, author = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Stefan Katzenbeisser and Mehmet Utku Celik and Aweke N. Lemma}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {A secure multidimensional point inclusion protocol}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {109--120}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288884}, doi = {10.1145/1288869.1288884}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Troncoso-PastorizaKCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VielhauerS07, author = {Claus Vielhauer and Maik Schott}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Nested object watermarking: from the rectangular con-straint to polygonal and private annotations}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {187--194}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288895}, doi = {10.1145/1288869.1288895}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VielhauerS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WangF07, author = {Weihong Wang and Hany Farid}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Exposing digital forgeries in video by detecting duplication}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {35--42}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288876}, doi = {10.1145/1288869.1288876}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/WangF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/XiangKH07, author = {Shijun Xiang and Hyoung{-}Joong Kim and Jiwu Huang}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Histogram-based image hashing scheme robust against geometric deformations}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {121--128}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288886}, doi = {10.1145/1288869.1288886}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/XiangKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2007, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-857-2}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AgarwalAP06, author = {Parag Agarwal and Ketaki Adi and B. Prabhakaran}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Robust blind watermarking mechanism for motion data streams}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {230--235}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161407}, doi = {10.1145/1161366.1161407}, timestamp = {Fri, 26 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AgarwalAP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Barni06, author = {Mauro Barni}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Processing encrypted signals: a new frontier for multimedia security}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {1}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161367}, doi = {10.1145/1161366.1161367}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Barni06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BarniOP06, author = {Mauro Barni and Claudio Orlandi and Alessandro Piva}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {A privacy-preserving protocol for neural-network-based computation}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {146--151}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161393}, doi = {10.1145/1161366.1161393}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BarniOP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BasC06, author = {Patrick Bas and Fran{\c{c}}ois Cayre}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Achieving subspace or key security for {WOA} using natural or circular watermarking}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {80--88}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161381}, doi = {10.1145/1161366.1161381}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BasC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/EngelKU06, author = {Dominik Engel and Rade Kutil and Andreas Uhl}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {A symbolic transform attack on lightweight encryption based on wavelet filter parameterization}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {202--207}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161402}, doi = {10.1145/1161366.1161402}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/EngelKU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Farid06, author = {Hany Farid}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Exposing digital forgeries in scientific images}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {29--36}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161374}, doi = {10.1145/1161366.1161374}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Farid06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Fridrich06, author = {Jessica J. Fridrich}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Minimizing the embedding impact in steganography}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {2--10}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161369}, doi = {10.1145/1161366.1161369}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Fridrich06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Furon06, author = {Teddy Furon}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Hermite polynomials as provably good functions to watermark white gaussian hosts}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {224--229}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161406}, doi = {10.1145/1161366.1161406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Furon06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HuangCW06, author = {Chun{-}Hsiang Huang and Shang{-}Chih Chuang and Ja{-}Ling Wu}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Digital invisible ink and its applications in steganography}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {23--28}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161372}, doi = {10.1145/1161366.1161372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HuangCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/JohnsonF06, author = {Micah K. Johnson and Hany Farid}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Exposing digital forgeries through chromatic aberration}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {48--55}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161376}, doi = {10.1145/1161366.1161376}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/JohnsonF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KangILS06, author = {In Koo Kang and Dong{-}Hyuck Im and Heung{-}Kyu Lee and Young{-}Ho Suh}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Implementation of real-time watermarking scheme for high-quality video}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {124--129}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161388}, doi = {10.1145/1161366.1161388}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KangILS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KovalVHP06, author = {Oleksiy J. Koval and Sviatoslav Voloshynovskiy and Taras Holotyak and Thierry Pun}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Information-theoretic analysis of steganalysis in real images}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {11--16}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161370}, doi = {10.1145/1161366.1161370}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KovalVHP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KratzerDLK06, author = {Christian Kr{\"{a}}tzer and Jana Dittmann and Andreas Lang and Tobias K{\"{u}}hne}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {{WLAN} steganography: a first practical review}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {17--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161371}, doi = {10.1145/1161366.1161371}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KratzerDLK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LangD06, author = {Andreas Lang and Jana Dittmann}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Transparency and complexity benchmarking of audio watermarking algorithms issues}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {190--201}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161401}, doi = {10.1145/1161366.1161401}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LangD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC06, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Robust, short and sensitive authentication tags using secure sketch}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {56--61}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161377}, doi = {10.1145/1161366.1161377}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiC06a, author = {Qiming Li and Ee{-}Chien Chang}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Zero-knowledge watermark detection resistant to ambiguity attacks}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {158--163}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161395}, doi = {10.1145/1161366.1161395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LiC06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MeixnerU06, author = {Albert Meixner and Andreas Uhl}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Robustness and security of a wavelet-based {CBIR} hashing algorithm}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {140--145}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161392}, doi = {10.1145/1161366.1161392}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MeixnerU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/NakashimaTNB06, author = {Yuta Nakashima and Ryuki Tachibana and Masafumi Nishimura and Noboru Babaguchi}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Estimation of recording location using audio watermarking}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {108--113}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161385}, doi = {10.1145/1161366.1161385}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/NakashimaTNB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Perez-FreirePF06, author = {Luis P{\'{e}}rez{-}Freire and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Teddy Furon}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {On achievable security levels for lattice data hiding in the known message attack scenario}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {68--79}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161380}, doi = {10.1145/1161366.1161380}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Perez-FreirePF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PetrovicTW06, author = {Rade Petrovic and Babak Tehranchi and Joseph M. Winograd}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Digital watermarking security considerations}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {152--157}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161394}, doi = {10.1145/1161366.1161394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/PetrovicTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ScheidatEV06, author = {Tobias Scheidat and Andreas Engel and Claus Vielhauer}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Parameter optimization for biometric fingerprint recognition using genetic algorithms}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {130--134}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161389}, doi = {10.1145/1161366.1161389}, timestamp = {Sat, 09 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ScheidatEV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchlauwegPM06, author = {Mathias Schlauweg and Dima Pr{\"{o}}frock and Erika M{\"{u}}ller}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {JPEG2000-based secure image authentication}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {62--67}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161378}, doi = {10.1145/1161366.1161378}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchlauwegPM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SocekSMC06, author = {Daniel Socek and Michal Sramka and Oge Marques and Dubravko Culibrk}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {An improvement to a biometric.based multimedia content protection scheme}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {135--139}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161390}, doi = {10.1145/1161366.1161390}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SocekSMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ThiemertSW06, author = {Stefan Thiemert and Martin Steinebach and Patrick Wolf}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {A digital watermark for vector-based fonts}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {120--123}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161387}, doi = {10.1145/1161366.1161387}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ThiemertSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/TopkaraTA06, author = {Umut Topkara and Mercan Topkara and Mikhail J. Atallah}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {164--174}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161397}, doi = {10.1145/1161366.1161397}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/TopkaraTA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Troncoso-PastorizaP06, author = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Zero-knowledge watermark detector robust to sensitivity attacks}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {97--107}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161383}, doi = {10.1145/1161366.1161383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Troncoso-PastorizaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VielhauerS06, author = {Claus Vielhauer and Maik Schott}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Image annotation watermarking: nested object embedding using hypergraph model}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {182--189}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161399}, doi = {10.1145/1161366.1161399}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VielhauerS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VinodDB06, author = {P. Vinod and Gwena{\"{e}}l J. Do{\"{e}}rr and Prabin Kumar Bora}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Assessing motion-coherency in video watermarking}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {114--119}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161386}, doi = {10.1145/1161366.1161386}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/VinodDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VoloshynovskiyKTVP06, author = {Sviatoslav Voloshynovskiy and Oleksiy J. Koval and Emre Topak and Jos{\'{e}}{-}Emilio Vila{-}Forc{\'{e}}n and Thierry Pun}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {On reversibility of random binning based data-hiding techniques: security perspectives}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {89--96}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161382}, doi = {10.1145/1161366.1161382}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VoloshynovskiyKTVP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WangF06, author = {Weihong Wang and Hany Farid}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Exposing digital forgeries in video by detecting double {MPEG} compression}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {37--47}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161375}, doi = {10.1145/1161366.1161375}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/WangF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Westfeld06, author = {Andreas Westfeld}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Lessons from the {BOWS} contest}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {208--213}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161403}, doi = {10.1145/1161366.1161403}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Westfeld06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ZhuT06, author = {William Zhu and Clark D. Thomborson}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Extraction in software watermarking}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {175--181}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161398}, doi = {10.1145/1161366.1161398}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ZhuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2006, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-493-6}, timestamp = {Fri, 26 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AhmedM05, author = {Farid Ahmed and Ira S. Moskowitz}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Composite signature based watermarking for fingerprint authentication}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {137--142}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073195}, doi = {10.1145/1073170.1073195}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AhmedM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AmbalavananC05, author = {Aruna Ambalavanan and Rajarathnam Chandramouli}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {A Bayesian image steganalysis approach to estimate the embedded secret message}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {33--38}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073177}, doi = {10.1145/1073170.1073177}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AmbalavananC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ConstantinGG05, author = {Cam{\'{e}}lia Constantin and David Gross{-}Amblard and Meryem Guerrouani}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Watermill: an optimized fingerprinting system for highly constrained data}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {143--155}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073196}, doi = {10.1145/1073170.1073196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ConstantinGG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DumitrescuW05, author = {Sorina Dumitrescu and Xiaolin Wu}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {{LSB} steganalysis based on high-order statistics}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {25--32}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073176}, doi = {10.1145/1073170.1073176}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/DumitrescuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/EngelU05, author = {Dominik Engel and Andreas Uhl}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Parameterized biorthogonal wavelet lifting for lightweight {JPEG} 2000 transparent encryption}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {63--70}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073183}, doi = {10.1145/1073170.1073183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/EngelU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HarmsenP05, author = {Jeremiah J. Harmsen and William A. Pearlman}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Capacity of steganographic channels}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {11--24}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073175}, doi = {10.1145/1073170.1073175}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HarmsenP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HeW05, author = {Shan He and Min Wu}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Building efficient and effective multimedia fingerprints via joint coding and embedding}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {127--136}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073194}, doi = {10.1145/1073170.1073194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HeW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Heitzenrater05, author = {Chad Heitzenrater}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {A government perspective on digital data embedding: taking a systems approach}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {77--78}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073172}, doi = {10.1145/1073170.1073172}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Heitzenrater05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/JohnsonF05, author = {Micah K. Johnson and Hany Farid}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Exposing digital forgeries by detecting inconsistencies in lighting}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {1--10}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073171}, doi = {10.1145/1073170.1073171}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/JohnsonF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LangDSV05, author = {Andreas Lang and Jana Dittmann and Ryan Spring and Claus Vielhauer}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Audio watermark attacks: from single to profile attacks}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {39--50}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073179}, doi = {10.1145/1073170.1073179}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LangDSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MobasseriM05, author = {Bijan G. Mobasseri and Michael P. Marcinak}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Watermarking of {MPEG-2} video in compressed domain using {VLC} mapping}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {91--94}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073187}, doi = {10.1145/1073170.1073187}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MobasseriM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/OermannLD05, author = {Andrea Oermann and Andreas Lang and Jana Dittmann}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Verifier-tuple for audio-forensic to determine speaker environment}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {57--62}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073181}, doi = {10.1145/1073170.1073181}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/OermannLD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/OzerSM05, author = {Hamza {\"{O}}zer and B{\"{u}}lent Sankur and Nasir D. Memon}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {An SVD-based audio watermarking technique}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {51--56}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073180}, doi = {10.1145/1073170.1073180}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/OzerSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/PiperSM05, author = {Angela Piper and Reihaneh Safavi{-}Naini and Alfred Mertins}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Resolution and quality scalable spread spectrum image watermarking}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {79--90}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073186}, doi = {10.1145/1073170.1073186}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/PiperSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Raman05, author = {Neerja Raman}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Challenges in multimedia security: an industry perspective}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {125--126}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073173}, doi = {10.1145/1073170.1073173}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Raman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SocekC05, author = {Daniel Socek and Dubravko Culibrk}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {On the security of a clipped hopfield neural network-based cryptosystem}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {71--76}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073184}, doi = {10.1145/1073170.1073184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SocekC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SutcuSM05, author = {Yagiz Sutcu and Husrev T. Sencar and Nasir D. Memon}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {A secure biometric authentication scheme based on robust hashing}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {111--116}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073191}, doi = {10.1145/1073170.1073191}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SutcuSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/WuC05, author = {Hao{-}Tian Wu and Yiu{-}ming Cheung}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {A fragile watermarking scheme for 3D meshes}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {117--124}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073192}, doi = {10.1145/1073170.1073192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/WuC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YangSBNS05, author = {Bian Yang and Martin Schmucker and Christoph Busch and Xiamu Niu and Sheng{-}He Sun}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Approaching optimal value expansion for reversible watermarking}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {95--102}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073188}, doi = {10.1145/1073170.1073188}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/YangSBNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YuLL05, author = {Chia{-}Mu Yu and Chun{-}Shien Lu}, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Robust non-interactive zero-knowledge watermarking scheme against cheating prover}, booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, pages = {103--110}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1073170.1073190}, doi = {10.1145/1073170.1073190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/YuLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2005, editor = {Ahmet M. Eskicioglu and Jessica J. Fridrich and Jana Dittmann}, title = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-032-9}, timestamp = {Fri, 26 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AdelsbachRS04, author = {Andr{\'{e}} Adelsbach and Markus Rohe and Ahmad{-}Reza Sadeghi}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Overcoming the obstacles of zero-knowledge watermark detection}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {46--55}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022441}, doi = {10.1145/1022431.1022441}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AdelsbachRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/AdelsbachS04, author = {Andr{\'{e}} Adelsbach and J{\"{o}}rg Schwenk}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Key-assignment strategies for {CPPM}}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {107--115}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022451}, doi = {10.1145/1022431.1022451}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/AdelsbachS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BeaugetVL04, author = {Sylvain Beauget and Michiel van der Veen and Aweke N. Lemma}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Informed detection of audio watermark for resolving playback speed modifications}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {117--123}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022453}, doi = {10.1145/1022431.1022453}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BeaugetVL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BohmeW04, author = {Rainer B{\"{o}}hme and Andreas Westfeld}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Statistical characterisation of {MP3} encoders for steganalysis}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {25--34}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022437}, doi = {10.1145/1022431.1022437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BohmeW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BrachtlUD04, author = {Michael Brachtl and Andreas Uhl and Werner Dietl}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Key-dependency for a wavelet-based blind watermarking algorithm}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {175--179}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022462}, doi = {10.1145/1022431.1022462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/BrachtlUD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Delp04, author = {Edward J. Delp}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Multimedia security: the 22nd century approach!}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {116}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022433}, doi = {10.1145/1022431.1022433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Delp04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DittmannF04, author = {Jana Dittmann and Jessica J. Fridrich}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Introduction to the {ACM} multimedia and security workshop}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {1--3}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022432}, doi = {10.1145/1022431.1022432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/DittmannF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DoerrDG04, author = {Gwena{\"{e}}l J. Do{\"{e}}rr and Jean{-}Luc Dugelay and Lucas Grang{\'{e}}}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Exploiting self-similarities to defeat digital watermarking systems: a case study on still images}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {133--142}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022455}, doi = {10.1145/1022431.1022455}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/DoerrDG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FranzS04, author = {Elke Franz and Antje Schneidewind}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Adaptive steganography based on dithering}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {56--62}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022443}, doi = {10.1145/1022431.1022443}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FranzS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FridrichGS04, author = {Jessica J. Fridrich and Miroslav Goljan and David Soukal}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Perturbed quantization steganography with wet paper codes}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {4--15}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022435}, doi = {10.1145/1022431.1022435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FridrichGS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GanicE04, author = {Emir Ganic and Ahmet M. Eskicioglu}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Robust {DWT-SVD} domain image watermarking: embedding data in all frequencies}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {166--174}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022461}, doi = {10.1145/1022431.1022461}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GanicE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/GrimmA04, author = {R{\"{u}}diger Grimm and Patrick Aichroth}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Privacy protection for signed media files: a separation-of-duty approach to the lightweight {DRM} {(LWDRM)} system}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {93--99}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022449}, doi = {10.1145/1022431.1022449}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/GrimmA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HsuL04, author = {Chao{-}Yong Hsu and Chun{-}Shien Lu}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Geometric distortion-resilient image hashing system and its application scalability}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {81--92}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022448}, doi = {10.1145/1022431.1022448}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HsuL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KesalMV04, author = {Mustafa Kesal and Mehmet Kivan{\c{c}} Mih{\c{c}}ak and Ramarathnam Venkatesan}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {An improved attack analysis on a public-key spread spectrum watermarking}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {41--45}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022440}, doi = {10.1145/1022431.1022440}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KesalMV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KovalVPDP04, author = {Oleksiy J. Koval and Sviatoslav Voloshynovskiy and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Fr{\'{e}}d{\'{e}}ric Deguillaume and Thierry Pun}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Quantization-based watermarking performance improvement using host statistics: {AWGN} attack case}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {35--39}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022439}, doi = {10.1145/1022431.1022439}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KovalVPDP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiuLD04, author = {Zheng Liu and Xue Li and Zhaoyang Dong}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Multimedia authentication with sensor-based watermarking}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {155--159}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022458}, doi = {10.1145/1022431.1022458}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/LiuLD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiuVM04, author = {Tie Liu and Ramarathnam Venkatesan and Mehmet Kivan{\c{c}} Mih{\c{c}}ak}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {124--132}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022454}, doi = {10.1145/1022431.1022454}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiuVM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MaretE04, author = {Yannick Maret and Touradj Ebrahimi}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Data hiding on 3D polygonal meshes}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {68--74}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022445}, doi = {10.1145/1022431.1022445}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/MaretE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/MegiasHM04, author = {David Meg{\'{\i}}as and Jordi Herrera{-}Joancomart{\'{\i}} and Juli{\`{a}} Minguill{\'{o}}n}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {An audio watermarking scheme robust against stereo attacks}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {206--213}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022467}, doi = {10.1145/1022431.1022467}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/MegiasHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/RoueBC04, author = {Benoit Roue and Patrick Bas and Jean{-}Marc Chassery}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Improving {LSB} steganalysis using marginal and joint probabilistic distributions}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {75--80}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022446}, doi = {10.1145/1022431.1022446}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/RoueBC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchulzV04, author = {Gerrit Schulz and Michael Voigt}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {A high capacity watermarking system for digital maps}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {180--186}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022463}, doi = {10.1145/1022431.1022463}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchulzV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SiL04, author = {Huayin Si and Chang{-}Tsun Li}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Fragile watermarking scheme based on the block-wise dependence in the wavelet domain}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {214--219}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022469}, doi = {10.1145/1022431.1022469}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SiL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Sidorov04, author = {Maxim Sidorov}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Hidden Markov models and steganalysis}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {63--67}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022444}, doi = {10.1145/1022431.1022444}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Sidorov04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SteinebachZC04, author = {Martin Steinebach and Sascha Zmudzinski and Fan Chen}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {The digital watermarking container: secure and efficient embedding}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {199--205}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022466}, doi = {10.1145/1022431.1022466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SteinebachZC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/TerzijaG04, author = {Natasa Terzija and Walter Geisselhardt}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Digital image watermarking using complex wavelet transform}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {193--198}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022465}, doi = {10.1145/1022431.1022465}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/TerzijaG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/TopkaraTATLD04, author = {Mercan Topkara and Umut Topkara and Mikhail J. Atallah and C{\"{u}}neyt M. Taskiran and Eugene T. Lin and Edward J. Delp}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {A hierarchical protocol for increasing the stealthiness of steganographic methods}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {16--24}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022436}, doi = {10.1145/1022431.1022436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/TopkaraTATLD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/UcchedduCB04, author = {Francesca Uccheddu and Massimiliano Corsini and Mauro Barni}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Wavelet-based blind watermarking of 3D models}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {143--154}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022456}, doi = {10.1145/1022431.1022456}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/UcchedduCB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/UhlP04, author = {Andreas Uhl and Andreas Pommer}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Are parameterised biorthogonal wavelet filters suited (better) for selective encryption?}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {100--106}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022450}, doi = {10.1145/1022431.1022450}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/UhlP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Venturini04, author = {Ilaria Venturini}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Counteracting Oracle attacks}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {187--192}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022464}, doi = {10.1145/1022431.1022464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Venturini04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/VoigtYB04, author = {Michael Voigt and Bian Yang and Christoph Busch}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Reversible watermarking of 2D-vector data}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {160--165}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022459}, doi = {10.1145/1022431.1022459}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/VoigtYB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YuanH04, author = {Song Yuan and Sorin A. Huss}, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Audio watermarking algorithm for real-time speech integrity and authentication}, booktitle = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, pages = {220--226}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1022431.1022470}, doi = {10.1145/1022431.1022470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/YuanH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2004, editor = {Jana Dittmann and Jessica J. Fridrich}, title = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec 2004, Magdeburg, Germany, September 20-21, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-854-7}, timestamp = {Fri, 26 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ChenC01, author = {Trista Pei{-}Chun Chen and Tsuhan Chen}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {A framework for optimal blind watermark detection}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {11--14}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232460}, doi = {10.1145/1232454.1232460}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/ChenC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DittmannS01, author = {Jana Dittmann and Martin Steinebach}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {PlataJanus: an audio annotation watermarking framework}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {44--47}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232471}, doi = {10.1145/1232454.1232471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/DittmannS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DittmannWN01, author = {Jana Dittmann and Petra Wohlmacher and Klara Nahrstedt}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Introduction to multimedia and security: protecting the media of the future - securing the future of the media}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {1--2}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232456}, doi = {10.1145/1232454.1232456}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/DittmannWN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/FridrichGD01, author = {Jessica J. Fridrich and Miroslav Goljan and Rui Du}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Reliable detection of {LSB} steganography in color and grayscale images}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {27--30}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232466}, doi = {10.1145/1232454.1232466}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/FridrichGD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Grimm01, author = {R{\"{u}}diger Grimm}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Security requirements for internet voting}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {56--59}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232475}, doi = {10.1145/1232454.1232475}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Grimm01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/HansenHRA01, author = {Klaus Hansen and Christian Hammer and Lars R. Randleff and Jens Damgaard Andersen}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Steganographic capacity of images, based on image equivalence classes}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {36--39}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232468}, doi = {10.1145/1232454.1232468}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/HansenHRA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Hollick01, author = {Matthias Hollick}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Security awareness in service discovery for multimedia collaboration}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {60--63}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232476}, doi = {10.1145/1232454.1232476}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Hollick01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KangKH01, author = {Hwan Il Kang and Kab Il Kim and Seung{-}Soo Han}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Watermarking techniques using the Drawing Exchange Format {(DXF)} file}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {19--22}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232463}, doi = {10.1145/1232454.1232463}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/KangKH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/KoukopoulosS01, author = {Dimitrios Koukopoulos and Yannis C. Stamatiou}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {A compressed-domain watermarking algorithm for mpeg audio layer 3}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {7--10}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232459}, doi = {10.1145/1232454.1232459}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/KoukopoulosS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/NickersonCJ01, author = {J. R. Nickerson and S. T. Chow and H. J. Johnson}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Tamper resistant software: extending trust into a hostile environment}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {64--67}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232477}, doi = {10.1145/1232454.1232477}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/NickersonCJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/RathaCB01, author = {Nalini K. Ratha and Jonathan H. Connell and Ruud M. Bolle}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Secure fingerprint-based authentication for Lotus Notes{\textregistered}}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {48--51}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232472}, doi = {10.1145/1232454.1232472}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/RathaCB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SchwenkMN01, author = {J{\"{o}}rg Schwenk and Tobias Martin and Erik Neumann}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {From pay-tv to pay-streaming: similarities and differences}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {40--43}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232470}, doi = {10.1145/1232454.1232470}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SchwenkMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SheppardSO01, author = {Nicholas Paul Sheppard and Reihaneh Safavi{-}Naini and Philip Ogunbona}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {On multiple watermarking}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {3--6}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232458}, doi = {10.1145/1232454.1232458}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SheppardSO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SridharLN01, author = {Veena Sridhar and Xiaobo Li and Mario A. Nascimento}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Towards robust hidden watermarking using multiple quasi-circles}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {31--35}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232467}, doi = {10.1145/1232454.1232467}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/SridharLN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/SuhailD01, author = {M. A. Suhail and M. M. Dawoud}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Watermarking security enhancement using filter parametrization in feature domain}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {15--18}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232462}, doi = {10.1145/1232454.1232462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/SuhailD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/TzelepiKP01, author = {Sofia K. Tzelepi and Dimitrios K. Koukopoulos and George Pangalos}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {A flexible content and context-based access control model for multimedia medical image database systems}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {52--55}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232473}, doi = {10.1145/1232454.1232473}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/TzelepiKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/TzengT01, author = {Chih{-}Hsuan Tzeng and Wen{-}Hsiang Tsai}, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {A new technique for authentication of image/video for multimedia applications}, booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, pages = {23--26}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/1232454.1232464}, doi = {10.1145/1232454.1232464}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmsec/2001, editor = {Nicolas D. Georganas and Radu Popescu{-}Zeletin}, title = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, publisher = {{ACM}}, year = {2001}, isbn = {1-58113-393-6}, timestamp = {Fri, 26 Oct 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.