Search dblp for Publications

export results for "stream:conf/mmsec:"

 download as .bib file

@inproceedings{DBLP:conf/ih/0001B24,
  author       = {Martin Benes and
                  Rainer B{\"{o}}hme},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Exploring Diffusion-Inspired Pixel Predictors for {WS} Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659645},
  doi          = {10.1145/3658664.3659645},
  timestamp    = {Thu, 13 Jun 2024 09:33:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/0001B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AliSSVM24,
  author       = {Hashim Ali and
                  Surya Subramani and
                  Shefali Sudhir and
                  Raksha Varahamurthy and
                  Hafiz Malik},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Is Audio Spoof Detection Robust to Laundering Attacks?},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {283--288},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659656},
  doi          = {10.1145/3658664.3659656},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AliSSVM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BhagtaniYBD24,
  author       = {Kratika Bhagtani and
                  Amit Kumar Singh Yadav and
                  Paolo Bestagini and
                  Edward J. Delp},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Are Recent Deepfake Speech Generators Detectable?},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {277--282},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659658},
  doi          = {10.1145/3658664.3659658},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BhagtaniYBD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraB24,
  author       = {Jan Butora and
                  Patrick Bas},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {The Adobe Hidden Feature and its Impact on Sensor Attribution},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {143--148},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659650},
  doi          = {10.1145/3658664.3659650},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CannasMBT24,
  author       = {Edoardo Daniele Cannas and
                  Sara Mandelli and
                  Paolo Bestagini and
                  Stefano Tubaro},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Investigating Translation Invariance and Shiftability in CNNs for
                  Robust Multimedia Forensics: {A} {JPEG} Case Study},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {53--63},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659644},
  doi          = {10.1145/3658664.3659644},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CannasMBT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DiazCCT0ARRG24,
  author       = {Judith S{\'{a}}inz{-}Pardo D{\'{\i}}az and
                  Andr{\'{e}}s Heredia Canales and
                  Ignacio Heredia Cacha and
                  Viet D. Tran and
                  Giang T. Nguyen and
                  Khadijeh Alibabaei and
                  Marta Obreg{\'{o}}n Ruiz and
                  Susana Rebolledo Ruiz and
                  {\'{A}}lvaro L{\'{o}}pez Garc{\'{\i}}a},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Making Federated Learning Accessible to Scientists: The {AI4EOSC}
                  Approach},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {253--264},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659642},
  doi          = {10.1145/3658664.3659642},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DiazCCT0ARRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DittmannKAB24,
  author       = {Jana Dittmann and
                  Christian Kraetzer and
                  Jost Alemann and
                  Bernhard Birnbaum},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Forensic Trace Analysis for {MP3} based Stego-Malware: Exemplary Study
                  for Stego-Algorithm and Capacity Attribution to derive {YARA} Rules
                  for Malware Identification},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659641},
  doi          = {10.1145/3658664.3659641},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DittmannKAB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Doerr24,
  author       = {Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Digital Flamenco with Video Pirates},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659663},
  doi          = {10.1145/3658664.3659663},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Doerr24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DworetzkyKF24,
  author       = {Eli Dworetzky and
                  Edgar Kaziakhmedov and
                  Jessica J. Fridrich},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Improving Steganographic Security with Source Biasing},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {19--30},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659646},
  doi          = {10.1145/3658664.3659646},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DworetzkyKF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HafnerRLFU24,
  author       = {Michael H{\"{a}}fner and
                  Aleksandar Radovic and
                  Moritz Langer and
                  Stefan Findenig and
                  Andreas Uhl},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Forensic Recognition of Codec-Specific Image Compression Artefacts},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {131--136},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659648},
  doi          = {10.1145/3658664.3659648},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HafnerRLFU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Hak24,
  author       = {Jonathan W. Hak},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Image-Based Evidence in International Criminal Prosecutions: Charting
                  a Path Forward},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {5--6},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659629},
  doi          = {10.1145/3658664.3659629},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Hak24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HeW0W24,
  author       = {Chenghua He and
                  Deyang Wu and
                  Xinpeng Zhang and
                  Hanzhou Wu},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Watermarking Text Documents With Watermarked Fonts},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {187--197},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659640},
  doi          = {10.1145/3658664.3659640},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HeW0W24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/IbarrondoKCDO24,
  author       = {Alberto Ibarrondo and
                  Ismet Kerenciler and
                  Herv{\'{e}} Chabanne and
                  Vincent Despiegel and
                  Melek {\"{O}}nen},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {211--222},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659633},
  doi          = {10.1145/3658664.3659633},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/IbarrondoKCDO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/IbsenNRRDLRJ024,
  author       = {Mathias Ibsen and
                  Robert Nichols and
                  Christian Rathgeb and
                  David J. Robertson and
                  Josh P. Davis and
                  Fr{\o}y L{\o}v{\aa}sdal and
                  Kiran B. Raja and
                  Ryan E. Jenkins and
                  Christoph Busch},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Conditional Face Image Manipulation Detection: Combining Algorithm
                  and Human Examiner Decisions},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {41--46},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659649},
  doi          = {10.1145/3658664.3659649},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/IbsenNRRDLRJ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JobicMPT24,
  author       = {Pierre Jobic and
                  Aur{\'{e}}lien Mayoue and
                  Sara {Tucci Piergiovanni} and
                  Fran{\c{c}}ois Terrier},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Extending the Scope of Gradient Reconstruction Attacks in Federated
                  Averaging},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {235--246},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659636},
  doi          = {10.1145/3658664.3659636},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JobicMPT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KiltzDLHJMP24,
  author       = {Stefan Kiltz and
                  Jana Dittmann and
                  Fabian Loewe and
                  Christian Heidecke and
                  Max John and
                  Jonas M{\"{a}}del and
                  Fabian Prei{\ss}ler},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation
                  of the Effectiveness with Structured Image Sets},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659659},
  doi          = {10.1145/3658664.3659659},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KiltzDLHJMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KnochelK24,
  author       = {Mandy Kn{\"{o}}chel and
                  Sebastian Karius},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Text Steganography Methods and their Influence in Malware: {A} Comprehensive
                  Overview and Evaluation},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659637},
  doi          = {10.1145/3658664.3659637},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KnochelK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiaoYP024,
  author       = {Guorui Liao and
                  Jinshuai Yang and
                  Kaiyi Pang and
                  Yongfeng Huang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Co-Stega: Collaborative Linguistic Steganography for the Low Capacity
                  Challenge in Social Media},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659657},
  doi          = {10.1145/3658664.3659657},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiaoYP024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Loureiro-AcunaL24,
  author       = {Jaime Loureiro{-}Acu{\~{n}}a and
                  Xavier Mart{\'{\i}}nez Lua{\~{n}}a and
                  H{\'{e}}ctor Pad{\'{\i}}n{-}Torrente and
                  Gonzalo Jim{\'{e}}nez{-}Balsa and
                  Carlos Garc{\'{\i}}a{-}Pag{\'{a}}n and
                  Ines Ortega{-}Fernandez},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Enhancing Privacy in Federated Learning: {A} Practical Assessment
                  of Combined PETs in a Cross-Silo Setting},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {265--270},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659661},
  doi          = {10.1145/3658664.3659661},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Loureiro-AcunaL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LuMFXC24,
  author       = {Zhitong Lu and
                  Duohe Ma and
                  Linna Fan and
                  Zhen Xu and
                  Kai Chen},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors
                  in Occlusion},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659630},
  doi          = {10.1145/3658664.3659630},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LuMFXC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MalletBC24,
  author       = {Antoine Mallet and
                  Patrick Bas and
                  R{\'{e}}mi Cogranne},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source
                  Mismatch},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659638},
  doi          = {10.1145/3658664.3659638},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MalletBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MalletCB24,
  author       = {Antoine Mallet and
                  R{\'{e}}mi Cogranne and
                  Patrick Bas},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Linking Intrinsic Difficulty and Regret to Properties of Multivariate
                  Gaussians in Image Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {31--39},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659643},
  doi          = {10.1145/3658664.3659643},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MalletCB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MontibellerAPB24,
  author       = {Andrea Montibeller and
                  Roy Alia Asiku and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Giulia Boato},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Shedding Light on some Leaks in PRNU-based Source Attribution},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {137--142},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659654},
  doi          = {10.1145/3658664.3659654},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MontibellerAPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PianeseCPV24,
  author       = {Alessandro Pianese and
                  Davide Cozzolino and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Training-Free Deepfake Voice Recognition by Leveraging Large-Scale
                  Pre-Trained Models},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {289--294},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659662},
  doi          = {10.1145/3658664.3659662},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PianeseCPV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PrasadMFKD24,
  author       = {Meghana Rao Bangalore Narasimha Prasad and
                  Andrey Makrushin and
                  Matteo Ferrara and
                  Christian Kraetzer and
                  Jana Dittmann},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {GAN-based Minutiae-driven Fingerprint Morphing},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659632},
  doi          = {10.1145/3658664.3659632},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PrasadMFKD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PurnekarATB24,
  author       = {Nischay Purnekar and
                  Lydia Abady and
                  Benedetta Tondi and
                  Mauro Barni},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Improving the Robustness of Synthetic Images Detection by Means of
                  Print and Scan Augmentation},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {65--73},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659635},
  doi          = {10.1145/3658664.3659635},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PurnekarATB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Rahimi24,
  author       = {Mahdi Rahimi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {{CLAM:} Client-Aware Routing in Mix Networks},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {199--209},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659631},
  doi          = {10.1145/3658664.3659631},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Rahimi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Riess24,
  author       = {Christian Riess},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Dreams and Drama of Applied Image Forensics},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {3--4},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3663549},
  doi          = {10.1145/3658664.3663549},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Riess24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SuTH24,
  author       = {Yang Su and
                  Shunquan Tan and
                  Jiwu Huang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {A Novel Universal Image Forensics Localization Model Based on Image
                  Noise and Segment Anything Model},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659639},
  doi          = {10.1145/3658664.3659639},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SuTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TaibiR24,
  author       = {Imane Taibi and
                  Jan Ramon},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Honest Fraction Differential Privacy},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {247--251},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659655},
  doi          = {10.1145/3658664.3659655},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TaibiR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/UhlenbrockCMVR24,
  author       = {Lea Uhlenbrock and
                  Davide Cozzolino and
                  Denise Moussa and
                  Luisa Verdoliva and
                  Christian Riess},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Did You Note My Palette? Unveiling Synthetic Images Through Color
                  Statistics},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {47--52},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659652},
  doi          = {10.1145/3658664.3659652},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/UhlenbrockCMVR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangH24,
  author       = {Wenhao Wang and
                  Fangjun Huang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Evading DeepFake Detectors via Conditional Diffusion Models},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659653},
  doi          = {10.1145/3658664.3659653},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WaniQCA24,
  author       = {Taiba Majid Wani and
                  Syed Asif Ahmad Qadri and
                  Danilo Comminiello and
                  Irene Amerini},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Detecting Audio Deepfakes: Integrating {CNN} and BiLSTM with Multi-Feature
                  Concatenation},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {271--276},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659647},
  doi          = {10.1145/3658664.3659647},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WaniQCA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WooYYL24,
  author       = {Ivy K. Y. Woo and
                  Sheung Yiu and
                  Hoover H. F. Yin and
                  Russell W. F. Lai},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Dataset, Noise Analysis, and Automated Parameter Estimation for Natural
                  Steganography},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659660},
  doi          = {10.1145/3658664.3659660},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WooYYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangLZW24,
  author       = {Li Zhang and
                  Yong Liu and
                  Xinpeng Zhang and
                  Hanzhou Wu},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Suppressing High-Frequency Artifacts for Generative Model Watermarking
                  by Anti-Aliasing},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {223--234},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659634},
  doi          = {10.1145/3658664.3659634},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangLZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZillienPRG24,
  author       = {Sebastian Zillien and
                  Denis Petrov and
                  Pascal Ruffing and
                  Friedrich Gross},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {A Development Framework for {TCP/IP} Network Steganography Malware
                  Detection},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  pages        = {95--100},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664.3659651},
  doi          = {10.1145/3658664.3659651},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZillienPRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2024,
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Pedro {Comesa{~{n}}a Alfaro} and
                  Christian Kr{\"{a}}tzer and
                  Hong Vicky Zhao},
  title        = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2024, Baiona, Spain, June 24-26, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658664},
  doi          = {10.1145/3658664},
  timestamp    = {Thu, 13 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BeckmannHE23,
  author       = {Arian Beckmann and
                  Anna Hilsmann and
                  Peter Eisert},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595106},
  doi          = {10.1145/3577163.3595106},
  timestamp    = {Mon, 26 Jun 2023 14:13:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BeckmannHE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BhagtaniBYBD23,
  author       = {Kratika Bhagtani and
                  Emily R. Bartusiak and
                  Amit Kumar Singh Yadav and
                  Paolo Bestagini and
                  Edward J. Delp},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Synthesized Speech Attribution Using The Patchout Spectrogram Attribution
                  Transformer},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {157--162},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595112},
  doi          = {10.1145/3577163.3595112},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BhagtaniBYBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraBC23,
  author       = {Jan Butora and
                  Patrick Bas and
                  R{\'{e}}mi Cogranne},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Analysis and Mitigation of the False Alarms of the Reverse {JPEG}
                  Compatibility Attack},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {59--66},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595092},
  doi          = {10.1145/3577163.3595092},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChouchanePZKCTO23,
  author       = {Ouba{\"{\i}}da Chouchane and
                  Michele Panariello and
                  Oualid Zari and
                  Ismet Kerenciler and
                  Imen Chihaoui and
                  Massimiliano Todisco and
                  Melek {\"{O}}nen},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Differentially Private Adversarial Auto-Encoder to Protect Gender
                  in Voice Biometrics},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {127--132},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595102},
  doi          = {10.1145/3577163.3595102},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChouchanePZKCTO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CraverR23,
  author       = {Scott Craver and
                  Nicholas Rosbrook},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Applying a Zero-Knowledge Watermarking Protocol to Secure Elections},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595099},
  doi          = {10.1145/3577163.3595099},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CraverR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DworetzkyKF23,
  author       = {Eli Dworetzky and
                  Edgar Kaziakhmedov and
                  Jessica J. Fridrich},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595095},
  doi          = {10.1145/3577163.3595095},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DworetzkyKF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DworetzkyKF23a,
  author       = {Eli Dworetzky and
                  Edgar Kaziakhmedov and
                  Jessica J. Fridrich},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Advancing the {JPEG} Compatibility Attack: Theory, Performance, Robustness,
                  and Practice},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {67--79},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595090},
  doi          = {10.1145/3577163.3595090},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DworetzkyKF23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FangZLK023,
  author       = {Yaodong Fang and
                  Yuanding Zhou and
                  Xinran Li and
                  Ping Kong and
                  Chuan Qin},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {{TMCIH:} Perceptual Robust Image Hashing with Transformer-based Multi-layer
                  Constraints},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595113},
  doi          = {10.1145/3577163.3595113},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FangZLK023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HoferB23,
  author       = {Nora Hofer and
                  Rainer B{\"{o}}hme},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Progressive JPEGs in the Wild: Implications for Information Hiding
                  and Forensics},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595097},
  doi          = {10.1145/3577163.3595097},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HoferB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KaziakhmedovDF23,
  author       = {Edgar Kaziakhmedov and
                  Eli Dworetzky and
                  Jessica J. Fridrich},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Limits of Data Driven Steganography Detectors},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595094},
  doi          = {10.1145/3577163.3595094},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KaziakhmedovDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KirchgasserKPMU23,
  author       = {Simon Kirchgasser and
                  Christof Kauba and
                  Bernhard Prommegger and
                  Fabio Monticelli and
                  Andreas Uhl},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {121--126},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595096},
  doi          = {10.1145/3577163.3595096},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KirchgasserKPMU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LammingerHU23,
  author       = {Lukas Lamminger and
                  Heinz Hofbauer and
                  Andreas Uhl},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {First Learning Steps to Recognize Faces in the Noise},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595105},
  doi          = {10.1145/3577163.3595105},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LammingerHU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LevecqueBB23,
  author       = {Etienne Levecque and
                  Patrick Bas and
                  Jan Butora},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Compatibility and Timing Attacks for {JPEG} Steganalysis},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595093},
  doi          = {10.1145/3577163.3595093},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LevecqueBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiHQG23,
  author       = {Cheng Li and
                  Xinhui Han and
                  Wenfa Qi and
                  Zongming Guo},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {An Improved Reversible Database Watermarking Method based on Histogram
                  Shifting},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {103--114},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595091},
  doi          = {10.1145/3577163.3595091},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiHQG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Liu23,
  author       = {Xiaoming Liu},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {On the Detection, Localization, and Reverse Engineering of Diverse
                  Image Manipulations},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3596214},
  doi          = {10.1145/3577163.3596214},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Liu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MayTFS23,
  author       = {Brandon B. May and
                  Kirill Trapeznikov and
                  Shengbang Fang and
                  Matthew C. Stamm},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery
                  for Development and Evaluation of Forensic Tools},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595101},
  doi          = {10.1145/3577163.3595101},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MayTFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Newman23,
  author       = {Jennifer L. Newman},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Steganography on Mobile Apps},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595114},
  doi          = {10.1145/3577163.3595114},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Newman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Scheirer23,
  author       = {Walter J. Scheirer},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Photoshop Fantasies},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595115},
  doi          = {10.1145/3577163.3595115},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Scheirer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/VorderleitnerHU23,
  author       = {Andreas Vorderleitner and
                  Jutta H{\"{a}}mmerle{-}Uhl and
                  Andreas Uhl},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation
                  Attack Artefacts},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {133--138},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595107},
  doi          = {10.1145/3577163.3595107},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/VorderleitnerHU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WenGFZJX23,
  author       = {Juan Wen and
                  Liting Gao and
                  Guangying Fan and
                  Ziwei Zhang and
                  Jianghao Jia and
                  Yiming Xue},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis
                  using Contrastive Learning},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595111},
  doi          = {10.1145/3577163.3595111},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WenGFZJX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/XiangYTBD23,
  author       = {Ziyue Xiang and
                  Amit Kumar Singh Yadav and
                  Stefano Tubaro and
                  Paolo Bestagini and
                  Edward J. Delp},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Extracting Efficient Spectrograms From {MP3} Compressed Speech Signals
                  for Synthetic Speech Detection},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {163--168},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595104},
  doi          = {10.1145/3577163.3595104},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/XiangYTBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Xu023,
  author       = {Nanqing Xu and
                  Weiwei Feng},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {MetaFake: Few-shot Face Forgery Detection with Meta Learning},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {151--156},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595108},
  doi          = {10.1145/3577163.3595108},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Xu023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangHDLY23,
  author       = {Dengyong Zhang and
                  Pu Huang and
                  Xiangling Ding and
                  Feng Li and
                  Gaobo Yang},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Video Frame Interpolation via Multi-scale Expandable Deformable Convolution},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595098},
  doi          = {10.1145/3577163.3595098},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangHDLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoC0Y0Y23,
  author       = {Na Zhao and
                  Kejiang Chen and
                  Chuan Qin and
                  Yi Yin and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Calibration-based Steganalysis for Neural Network Steganography},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595100},
  doi          = {10.1145/3577163.3595100},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoC0Y0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoQL0C23,
  author       = {Gejian Zhao and
                  Chuan Qin and
                  Xiangyang Luo and
                  Xinpeng Zhang and
                  Chin{-}Chen Chang},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Perceptual Robust Hashing for Video Copy Detection with Unsupervised
                  Learning},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595110},
  doi          = {10.1145/3577163.3595110},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoQL0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhouFAD23,
  author       = {Yue Zhou and
                  Bing Fan and
                  Pradeep K. Atrey and
                  Feng Ding},
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention
                  and Frequency Analysis},
  booktitle    = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163.3595103},
  doi          = {10.1145/3577163.3595103},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhouFAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2023,
  editor       = {Daniel Moreira and
                  Aparna Bharati and
                  Cecilia Pasquini and
                  Yassine Yousfi},
  title        = {Proceedings of the 2023 {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2023, Chicago, IL, USA, June 28-30, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577163},
  doi          = {10.1145/3577163},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/001G22,
  author       = {Zhijun Wu and
                  Junjun Guo},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {{AMR} Steganalysis based on Adversarial Bi-GRU and Data Distillation},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {141--146},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532958},
  doi          = {10.1145/3531536.3532958},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/001G22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BenesHB22,
  author       = {Martin Benes and
                  Nora Hofer and
                  Rainer B{\"{o}}hme},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Know Your Library: How the libjpeg Version Influences Compression
                  and Decompression Results},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {19--25},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532962},
  doi          = {10.1145/3531536.3532962},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BenesHB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BertaDHJ22,
  author       = {{\'{A}}rp{\'{a}}d Berta and
                  G{\'{a}}bor Danner and
                  Istv{\'{a}}n Heged{\"{u}}s and
                  M{\'{a}}rk Jelasity},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Hiding Needles in a Haystack: Towards Constructing Neural Networks
                  that Evade Verification},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532966},
  doi          = {10.1145/3531536.3532966},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BertaDHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraB22,
  author       = {Jan Butora and
                  Patrick Bas},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Fighting the Reverse {JPEG} Compatibility Attack: Pick your Side},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {113--121},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532955},
  doi          = {10.1145/3531536.3532955},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChewNBBC22,
  author       = {Daniel Chew and
                  Christine Nguyen and
                  Samuel Berhanu and
                  Chris Baumgart and
                  A. Brinton Cooper},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Covert Communications through Imperfect Cancellation},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532959},
  doi          = {10.1145/3531536.3532959},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChewNBBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/IbarrondoCDO22,
  author       = {Alberto Ibarrondo and
                  Herv{\'{e}} Chabanne and
                  Vincent Despiegel and
                  Melek {\"{O}}nen},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Colmade: Collaborative Masking in Auditable Decryption for BFV-based
                  Homomorphic Encryption},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {129--139},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532952},
  doi          = {10.1145/3531536.3532952},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/IbarrondoCDO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JoudehS22,
  author       = {Basheer Joudeh and
                  Boris Skoric},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Collusion-resistant Fingerprinting of Parallel Content Channels},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {81--89},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532953},
  doi          = {10.1145/3531536.3532953},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JoudehS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker22,
  author       = {Andrew D. Ker},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Capacity Laws for Steganography in a Crowd},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {147--156},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532948},
  doi          = {10.1145/3531536.3532948},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Ker22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KiltzAD22,
  author       = {Stefan Kiltz and
                  Robert Altschaffel and
                  Jana Dittmann},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams
                  as a Means for Data Hiding With the Help of {UEFI} {NVRAM} and Implications
                  for {IT} Forensics},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {107--112},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532965},
  doi          = {10.1145/3531536.3532965},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KiltzAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Koushanfar22,
  author       = {Farinaz Koushanfar},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Intellectual Property {(IP)} Protection for Deep Learning and Federated
                  Learning Models},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532957},
  doi          = {10.1145/3531536.3532957},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Koushanfar22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kruegel22,
  author       = {Christopher Kruegel},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Looking for Signals: {A} Systems Security Perspective},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3533774},
  doi          = {10.1145/3531536.3533774},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kruegel22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LamshoftD22,
  author       = {Kevin Lamsh{\"{o}}ft and
                  Jana Dittmann},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Covert Channels in Network Time Security},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {69--79},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532947},
  doi          = {10.1145/3531536.3532947},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LamshoftD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiWKSHH022,
  author       = {Denghao Li and
                  Jianzong Wang and
                  Lingwei Kong and
                  Shijing Si and
                  Zhangcheng Huang and
                  Chenyu Huang and
                  Jing Xiao},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {A Nearest Neighbor Under-sampling Strategy for Vertical Federated
                  Learning in Financial Domain},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {123--128},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532960},
  doi          = {10.1145/3531536.3532960},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiWKSHH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiZCPLZ22,
  author       = {Gen Li and
                  Xianfeng Zhao and
                  Yun Cao and
                  Pengfei Pei and
                  Jinchuan Li and
                  Zeyu Zhang},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {{FMFCC-V:} An Asian Large-Scale Challenging Dataset for DeepFake Detection},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {7--18},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532946},
  doi          = {10.1145/3531536.3532946},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/LiZCPLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LouniciOET22,
  author       = {Sofiane Lounici and
                  Melek {\"{O}}nen and
                  Orhan Ermis and
                  Slim Trabelsi},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {BlindSpot: Watermarking Through Fairness},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532950},
  doi          = {10.1145/3531536.3532950},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LouniciOET22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Lu22,
  author       = {Chun{-}Shien Lu},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Sparse Trigger Pattern Guided Deep Learning Model Watermarking},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532961},
  doi          = {10.1145/3531536.3532961},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Lu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ShenZQ22,
  author       = {Dongyao Shen and
                  Youjian Zhao and
                  Chengbin Quan},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Identity-Referenced Deepfake Detection with Contrastive Learning},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532964},
  doi          = {10.1145/3531536.3532964},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ShenZQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Verdoliva22,
  author       = {Luisa Verdoliva},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Towards Generalization in Deepfake Detection},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532956},
  doi          = {10.1145/3531536.3532956},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Verdoliva22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WenZYX22,
  author       = {Juan Wen and
                  Ziwei Zhang and
                  Yu Yang and
                  Yiming Xue},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Few-shot Text Steganalysis Based on Attentional Meta-learner},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {97--106},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532949},
  doi          = {10.1145/3531536.3532949},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WenZYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/XueYDPW22,
  author       = {Yiming Xue and
                  Boya Yang and
                  Yaqian Deng and
                  Wanli Peng and
                  Juan Wen},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Domain Adaptational Text Steganalysis Based on Transductive Learning},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532963},
  doi          = {10.1145/3531536.3532963},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/XueYDPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YousfiDF22,
  author       = {Yassine Yousfi and
                  Eli Dworetzky and
                  Jessica J. Fridrich},
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {Detector-Informed Batch Steganography and Pooled Steganalysis},
  booktitle    = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536.3532951},
  doi          = {10.1145/3531536.3532951},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YousfiDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2022,
  editor       = {B. S. Manjunath and
                  Jan Butora and
                  Benedetta Tondi and
                  Claus Vielhauer},
  title        = {IH{\&}MMSec '22: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Santa Barbara, CA, USA, June 27 - 28, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3531536},
  doi          = {10.1145/3531536},
  isbn         = {978-1-4503-9355-3},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AdhataraoL21,
  author       = {Supriya Adhatarao and
                  C{\'{e}}dric Lauradoux},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Exploitation and Sanitization of Hidden Data in {PDF} Files: Do Security
                  Agencies Sanitize Their {PDF} Files?},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460405},
  doi          = {10.1145/3437880.3460405},
  timestamp    = {Wed, 07 Jul 2021 17:13:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AdhataraoL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AltschaffelHKD21,
  author       = {Robert Altschaffel and
                  Jonas Hielscher and
                  Stefan Kiltz and
                  Jana Dittmann},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Meta and Media Data Stream Forensics in the Encrypted Domain of Video
                  Conferences},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {23--33},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460412},
  doi          = {10.1145/3437880.3460412},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AltschaffelHKD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ArefinS21,
  author       = {Sayed Erfan Arefin and
                  Abdul Serwadda},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network
                  Architecture!},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460415},
  doi          = {10.1145/3437880.3460415},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ArefinS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BarniPT21,
  author       = {Mauro Barni and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Benedetta Tondi},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {{DNN} Watermarking: Four Challenges and a Funeral},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {189--196},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460399},
  doi          = {10.1145/3437880.3460399},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BarniPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BernardBPK21,
  author       = {Sol{\`{e}}ne Bernard and
                  Patrick Bas and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  John Klein},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Optimizing Additive Approximations of Non-additive Distortion Functions},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {105--112},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460407},
  doi          = {10.1145/3437880.3460407},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BernardBPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BukerH21,
  author       = {Aykut B{\"{u}}ker and
                  Cemal Hanil{\c{c}}i},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Angular Margin Softmax Loss and Its Variants for Double Compressed
                  {AMR} Audio Detection},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460414},
  doi          = {10.1145/3437880.3460414},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BukerH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraF21,
  author       = {Jan Butora and
                  Jessica J. Fridrich},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Revisiting Perturbed Quantization},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {125--136},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460396},
  doi          = {10.1145/3437880.3460396},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraYF21,
  author       = {Jan Butora and
                  Yassine Yousfi and
                  Jessica J. Fridrich},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {How to Pretrain for Steganalysis},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {143--148},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460395},
  doi          = {10.1145/3437880.3460395},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Carlini21,
  author       = {Nicholas Carlini},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {How Private is Machine Learning?},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3458440},
  doi          = {10.1145/3437880.3458440},
  timestamp    = {Fri, 10 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Carlini21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/IbarrondoCO21,
  author       = {Alberto Ibarrondo and
                  Herv{\'{e}} Chabanne and
                  Melek {\"{O}}nen},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Banners: Binarized Neural Networks with Replicated Secret Sharing},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460394},
  doi          = {10.1145/3437880.3460394},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/IbarrondoCO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KapustaTBBS21,
  author       = {Katarzyna Kapusta and
                  Vincent Thouvenot and
                  Olivier Bettan and
                  Hugo Beguinet and
                  Hugo Senet},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {A Protocol for Secure Verification of Watermarks Embedded into Machine
                  Learning Models},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {171--176},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460409},
  doi          = {10.1145/3437880.3460409},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KapustaTBBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KuribayashiTSYF21,
  author       = {Minoru Kuribayashi and
                  Takuro Tanaka and
                  Shunta Suzuki and
                  Tatsuya Yasui and
                  Nobuo Funabiki},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning
                  Model},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460402},
  doi          = {10.1145/3437880.3460402},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KuribayashiTSYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LamshoftNKVD21,
  author       = {Kevin Lamsh{\"{o}}ft and
                  Tom Neubert and
                  Christian Kr{\"{a}}tzer and
                  Claus Vielhauer and
                  Jana Dittmann},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Information Hiding in Cyber Physical Systems: Challenges for Embedding,
                  Retrieval and Detection using Sensor Data of the {SWAT} Dataset},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {113--124},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460413},
  doi          = {10.1145/3437880.3460413},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LamshoftNKVD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LinortnerU21,
  author       = {Michael Linortner and
                  Andreas Uhl},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Towards Match-on-Card Finger Vein Recognition},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460406},
  doi          = {10.1145/3437880.3460406},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LinortnerU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LugsteinBBU21,
  author       = {Florian Lugstein and
                  Simon Baier and
                  Gregor Bachinger and
                  Andreas Uhl},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {PRNU-based Deepfake Detection},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460400},
  doi          = {10.1145/3437880.3460400},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LugsteinBBU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MakrushinKKSKUD21,
  author       = {Andrey Makrushin and
                  Christof Kauba and
                  Simon Kirchgasser and
                  Stefan Seidlitz and
                  Christian Kraetzer and
                  Andreas Uhl and
                  Jana Dittmann},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {General Requirements on Synthetic Fingerprint Images for Biometric
                  Authentication and Forensic Investigations},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460410},
  doi          = {10.1145/3437880.3460410},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MakrushinKKSKUD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MaungK21,
  author       = {April Pyone Maung Maung and
                  Hitoshi Kiya},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Piracy-Resistant {DNN} Watermarking by Block-Wise Image Transformation
                  with Secret Key},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460398},
  doi          = {10.1145/3437880.3460398},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MaungK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Sablayrolles21,
  author       = {Alexandre Sablayrolles},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Tracing Data through Learning with Watermarking},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3458442},
  doi          = {10.1145/3437880.3458442},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Sablayrolles21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchloglKB21,
  author       = {Alexander Schl{\"{o}}gl and
                  Tobias Kupek and
                  Rainer B{\"{o}}hme},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {iNNformant: Boundary Samples as Telltale Watermarks},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {81--86},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460411},
  doi          = {10.1145/3437880.3460411},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SchloglKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ShafieinejadLWL21,
  author       = {Masoumeh Shafieinejad and
                  Nils Lukas and
                  Jiaqi Wang and
                  Xinda Li and
                  Florian Kerschbaum},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {On the Robustness of Backdoor-based Watermarking in Deep Neural Networks},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {177--188},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460401},
  doi          = {10.1145/3437880.3460401},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ShafieinejadLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Standaert21,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Evaluating and Designing against Side-Channel Leakage: White Box or
                  Black Box?},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3458441},
  doi          = {10.1145/3437880.3458441},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Standaert21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangYHYH21,
  author       = {Huili Wang and
                  Zhongliang Yang and
                  Yuting Hu and
                  Zhen Yang and
                  Yongfeng Huang},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Fast Detection of Heterogeneous Parallel Steganography for Streaming
                  Voice},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {137--142},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460404},
  doi          = {10.1145/3437880.3460404},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangYHYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YousfiBFT21,
  author       = {Yassine Yousfi and
                  Jan Butora and
                  Jessica J. Fridrich and
                  Cl{\'{e}}ment Fuji Tsang},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Improving EfficientNet for {JPEG} Steganalysis},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {149--157},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460397},
  doi          = {10.1145/3437880.3460397},
  timestamp    = {Sun, 22 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YousfiBFT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangYZ21,
  author       = {Zhenyu Zhang and
                  Xiaowei Yi and
                  Xianfeng Zhao},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {Fake Speech Detection Using Residual Network with Transformer Encoder},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460408},
  doi          = {10.1145/3437880.3460408},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoWLLM21,
  author       = {Chen Zhao and
                  Yu Wen and
                  Shuailou Li and
                  Fucheng Liu and
                  Dan Meng},
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {FederatedReverse: {A} Detection and Defense Method Against Backdoor
                  Attacks in Federated Learning},
  booktitle    = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880.3460403},
  doi          = {10.1145/3437880.3460403},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoWLLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2021,
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880},
  doi          = {10.1145/3437880},
  isbn         = {978-1-4503-8295-3},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Abu-gellbanNMPJ20,
  author       = {Hashim Abu{-}gellban and
                  Long Hoang Nguyen and
                  Mahdi Moghadasi and
                  Zhenhe Pan and
                  Fang Jin},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {LiveDI: An Anti-theft Model Based on Driving Behavior},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395069},
  doi          = {10.1145/3369412.3395069},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Abu-gellbanNMPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AgarwalF20,
  author       = {Shruti Agarwal and
                  Hany Farid},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Photo Forensics From Rounding Artifacts},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {103--114},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395059},
  doi          = {10.1145/3369412.3395059},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AgarwalF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AmeriniC20,
  author       = {Irene Amerini and
                  Roberto Caldelli},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers
                  to Detect Deepfake Videos},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {97--102},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395070},
  doi          = {10.1145/3369412.3395070},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AmeriniC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BonnetFB20,
  author       = {Beno{\^{\i}}t Bonnet and
                  Teddy Furon and
                  Patrick Bas},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {What if Adversarial Samples were Digital Images?},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395062},
  doi          = {10.1145/3369412.3395062},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BonnetFB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraYF20,
  author       = {Jan Butora and
                  Yassine Yousfi and
                  Jessica J. Fridrich},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Turning Cost-Based Steganography into Model-Based},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {151--159},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395065},
  doi          = {10.1145/3369412.3395065},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraYF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CogranneGB20,
  author       = {R{\'{e}}mi Cogranne and
                  Quentin Giboulot and
                  Patrick Bas},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Steganography by Minimizing Statistical Detectability: The cases of
                  {JPEG} and Color Images},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {161--167},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395075},
  doi          = {10.1145/3369412.3395075},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CogranneGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FanZCXZ20,
  author       = {Pingan Fan and
                  Hong Zhang and
                  Yifan Cai and
                  Pei Xie and
                  Xianfeng Zhao},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {A Robust Video Steganographic Method against Social Networking Transcoding
                  Based on Steganographic Side Channel},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {127--137},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395066},
  doi          = {10.1145/3369412.3395066},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FanZCXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HildebrandtLDNV20,
  author       = {Mario Hildebrandt and
                  Kevin Lamsh{\"{o}}ft and
                  Jana Dittmann and
                  Tom Neubert and
                  Claus Vielhauer},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Information Hiding in Industrial Control Systems: An {OPC} {UA} based
                  Supply Chain Attack and its Detection},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395068},
  doi          = {10.1145/3369412.3395068},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HildebrandtLDNV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JangOK20,
  author       = {Haneol Jang and
                  Tae{-}Woo Oh and
                  Kibom Kim},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Feature Aggregation Networks for Image Steganalysis},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395072},
  doi          = {10.1145/3369412.3395072},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JangOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JerkovitsGSK20,
  author       = {Thomas Jerkovits and
                  Onur G{\"{u}}nl{\"{u}} and
                  Vladimir Sidorenko and
                  Gerhard Kramer},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {79--89},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395063},
  doi          = {10.1145/3369412.3395063},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JerkovitsGSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kiekintveld20,
  author       = {Christopher Kiekintveld},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Game-Theoretic Perspectives and Algorithms for Cybersecurity},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3396883},
  doi          = {10.1145/3369412.3396883},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kiekintveld20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kin-CleavesK20,
  author       = {Christy Kin{-}Cleaves and
                  Andrew D. Ker},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Simulating Suboptimal Steganographic Embedding},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {121--126},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395071},
  doi          = {10.1145/3369412.3395071},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kin-CleavesK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KupekPB20,
  author       = {Tobias Kupek and
                  Cecilia Pasquini and
                  Rainer B{\"{o}}hme},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {On the Difficulty of Hiding Keys in Neural Networks},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {73--78},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395076},
  doi          = {10.1145/3369412.3395076},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/KupekPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeeOK20,
  author       = {Daewon Lee and
                  Tae{-}Woo Oh and
                  Kibom Kim},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Deep Audio Steganalysis in Time Domain},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {11--21},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395064},
  doi          = {10.1145/3369412.3395064},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeeOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MakrushinSD20,
  author       = {Andrey Makrushin and
                  Dennis Siegel and
                  Jana Dittmann},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Simulation of Border Control in an Ongoing Web-based Experiment for
                  Estimating Morphing Detection Performance of Humans},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395073},
  doi          = {10.1145/3369412.3395073},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MakrushinSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TaburetBSC20,
  author       = {Th{\'{e}}o Taburet and
                  Patrick Bas and
                  Wadih Sawaya and
                  R{\'{e}}mi Cogranne},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {{JPEG} Steganography and Synchronization of {DCT} Coefficients for
                  a Given Development Pipeline},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {139--149},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395074},
  doi          = {10.1145/3369412.3395074},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TaburetBSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangMH20,
  author       = {Chen Wang and
                  Jingjing Mu and
                  Long Huang},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Protecting Smartphone Screen Notification Privacy by Verifying the
                  Gripping Hand},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395077},
  doi          = {10.1145/3369412.3395077},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Wu20,
  author       = {Min Wu},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Exploiting Micro-Signals for Physiological Forensics},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3396882},
  doi          = {10.1145/3369412.3396882},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Wu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangBYLHJ20,
  author       = {Hao Yang and
                  YongJian Bao and
                  Zhongliang Yang and
                  Sheng Liu and
                  Yongfeng Huang and
                  Saimei Jiao},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Linguistic Steganalysis via Densely Connected {LSTM} with Feature
                  Pyramid},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {5--10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395067},
  doi          = {10.1145/3369412.3395067},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/YangBYLHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangLXKS20,
  author       = {Jianhua Yang and
                  Beiling Lu and
                  Liang Xiao and
                  Xiangui Kang and
                  Yunqing Shi},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Reinforcement Learning Aided Network Architecture Generation for {JPEG}
                  Image Steganalysis},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395060},
  doi          = {10.1145/3369412.3395060},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YangLXKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YedroudjCCAB20,
  author       = {Mehdi Yedroudj and
                  Marc Chaumont and
                  Fr{\'{e}}d{\'{e}}ric Comby and
                  Ahmed Oulad Amara and
                  Patrick Bas},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Pixels-off: Data-augmentation Complementary Solution for Deep-learning
                  Steganalysis},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3395061},
  doi          = {10.1145/3369412.3395061},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YedroudjCCAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2020,
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412},
  doi          = {10.1145/3369412},
  isbn         = {978-1-4503-7050-9},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AbazidHG19,
  author       = {Majd Abazid and
                  Nesma Houmani and
                  Sonia Garcia{-}Salicetti},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Impact of Spatial Constraints when Signing in Uncontrolled Mobile
                  Conditions},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {89--94},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335720},
  doi          = {10.1145/3335203.3335720},
  timestamp    = {Fri, 22 Oct 2021 09:07:11 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AbazidHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BernardPBK19,
  author       = {Sol{\`{e}}ne Bernard and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Patrick Bas and
                  John Klein},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Exploiting Adversarial Embeddings for Better Steganography},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {216--221},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335737},
  doi          = {10.1145/3335203.3335737},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BernardPBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ButoraF19,
  author       = {Jan Butora and
                  Jessica J. Fridrich},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Effect of {JPEG} Quality on Steganographic Security},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335714},
  doi          = {10.1145/3335203.3335714},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ButoraF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CamachoW19,
  author       = {Ivan Castillo Camacho and
                  Kai Wang},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {A Simple and Effective Initialization of {CNN} for Forensics of Image
                  Processing Operations},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {107--112},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335723},
  doi          = {10.1145/3335203.3335723},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CamachoW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenBF19,
  author       = {Mo Chen and
                  Mehdi Boroumand and
                  Jessica J. Fridrich},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Reference Channels for Steganalysis of Images with Convolutional Neural
                  Networks},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {188--197},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335733},
  doi          = {10.1145/3335203.3335733},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenLZ19,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Peijia Zheng},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Enhancing Steganography via Stego Post-processing by Reducing Image
                  Residual Difference},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335716},
  doi          = {10.1145/3335203.3335716},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CogranneGB19,
  author       = {R{\'{e}}mi Cogranne and
                  Quentin Giboulot and
                  Patrick Bas},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {The {ALASKA} Steganalysis Challenge: {A} First Step Towards Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {125--137},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335726},
  doi          = {10.1145/3335203.3335726},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CogranneGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DengCLL19,
  author       = {Xiaoqing Deng and
                  Bolin Chen and
                  Weiqi Luo and
                  Da Luo},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Fast and Effective Global Covariance Pooling Network for Image Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {230--234},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335739},
  doi          = {10.1145/3335203.3335739},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DengCLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Furon19,
  author       = {Teddy Furon},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Watermarking Error Exponents in the Presence of Noise: The Case of
                  the Dual Hypercone Detector},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {173--181},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335731},
  doi          = {10.1145/3335203.3335731},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Furon19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/GongYZM19,
  author       = {Chen Gong and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Yi Ma},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Recurrent Convolutional Neural Networks for {AMR} Steganalysis Based
                  on Pulse Position},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {2--13},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335708},
  doi          = {10.1145/3335203.3335708},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/GongYZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HosseiniG19,
  author       = {Morteza Darvish Morshedi Hosseini and
                  Miroslav Goljan},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Camera Identification from {HDR} Images},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335717},
  doi          = {10.1145/3335203.3335717},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HosseiniG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HuangNWY19,
  author       = {Junwen Huang and
                  Jiangqun Ni and
                  Linhong Wan and
                  Jingwen Yan},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {A Customized Convolutional Neural Network with Low Model Complexity
                  for {JPEG} Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {198--203},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335734},
  doi          = {10.1145/3335203.3335734},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HuangNWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Laarhoven19,
  author       = {Thijs Laarhoven},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Nearest Neighbor Decoding for Tardos Fingerprinting Codes},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {182--187},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335732},
  doi          = {10.1145/3335203.3335732},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Laarhoven19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Lerch-HostalotM19,
  author       = {Daniel Lerch{-}Hostalot and
                  David Meg{\'{\i}}as},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Detection of Classifier Inconsistencies in Image Steganalysis},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {222--229},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335738},
  doi          = {10.1145/3335203.3335738},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Lerch-HostalotM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiL19,
  author       = {Yuezun Li and
                  Siwei Lyu},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {De-identification Without Losing Faces},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {83--88},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335719},
  doi          = {10.1145/3335203.3335719},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LinWYDZ19,
  author       = {Yuzhen Lin and
                  Rangding Wang and
                  Diqun Yan and
                  Li Dong and
                  Xueyuan Zhang},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Audio Steganalysis with Improved Convolutional Neural Network},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {210--215},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335736},
  doi          = {10.1145/3335203.3335736},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/LinWYDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiuK19,
  author       = {Chang Liu and
                  Matthias Kirchner},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {CNN-based Rescaling Factor Estimation},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335725},
  doi          = {10.1145/3335203.3335725},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LorchR19,
  author       = {Benedikt Lorch and
                  Christian Riess},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Image Forensics from Chroma Subsampling of High-Quality {JPEG} Images},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {101--106},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335722},
  doi          = {10.1145/3335203.3335722},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LorchR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MatyuninW019,
  author       = {Nikolay Matyunin and
                  Yujue Wang and
                  Stefan Katzenbeisser},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Vibrational Covert Channels using Low-Frequency Acoustic Signals},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335712},
  doi          = {10.1145/3335203.3335712},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MatyuninW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Morel19,
  author       = {Jean{-}Michel Morel},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Reverse Engineering: What Can We Learn From a Digital Image About
                  Its Own History ?},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335707},
  doi          = {10.1145/3335203.3335707},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Morel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NandakumarRP19,
  author       = {Karthik Nandakumar and
                  Nalini K. Ratha and
                  Sharathchandra Pankanti},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Proving Multimedia Integrity using Sanitizable Signatures Recorded
                  on Blockchain},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {151--160},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335729},
  doi          = {10.1145/3335203.3335729},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NandakumarRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NeubertKD19,
  author       = {Tom Neubert and
                  Christian Kraetzer and
                  Jana Dittmann},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {A Face Morphing Detection Concept with a Frequency and a Spatial Domain
                  Feature Space for Images on eMRTD},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {95--100},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335721},
  doi          = {10.1145/3335203.3335721},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NeubertKD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Pedrouzo-UlloaT19,
  author       = {Alberto Pedrouzo{-}Ulloa and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Revisiting Multivariate Lattices for Encrypted Signal Processing},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {161--172},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335730},
  doi          = {10.1145/3335203.3335730},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Pedrouzo-UlloaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RyabkoF19,
  author       = {Boris Ryabko and
                  Andrey Fionov},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Linear Hash Functions as a Means of Distortion-Rate Optimization in
                  Data Embedding},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {235--238},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335740},
  doi          = {10.1145/3335203.3335740},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/RyabkoF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Shokri19,
  author       = {Reza Shokri},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Trusting Machine Learning: Privacy, Robustness, and Transparency Challenges},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {150},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335728},
  doi          = {10.1145/3335203.3335728},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Shokri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TaburetBFS19,
  author       = {Th{\'{e}}o Taburet and
                  Patrick Bas and
                  Jessica J. Fridrich and
                  Wadih Sawaya},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Computing Dependencies between {DCT} Coefficients for Natural Steganography
                  in {JPEG} Domain},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335715},
  doi          = {10.1145/3335203.3335715},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TaburetBFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Xie0YZYM19,
  author       = {Pei Xie and
                  Hong Zhang and
                  Weike You and
                  Xianfeng Zhao and
                  Jianchang Yu and
                  Yi Ma},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Adaptive {VP8} Steganography Based on Deblocking Filtering},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335711},
  doi          = {10.1145/3335203.3335711},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Xie0YZYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YadavTTF19,
  author       = {Rohit Yadav and
                  Iuliia Tkachenko and
                  Alain Tr{\'{e}}meau and
                  Thierry Fournel},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Estimation of Copy-sensitive Codes Using a Neural Approach},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335718},
  doi          = {10.1145/3335203.3335718},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YadavTTF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangLQL19,
  author       = {Xin Yang and
                  Yuezun Li and
                  Honggang Qi and
                  Siwei Lyu},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Exposing GAN-synthesized Faces Using Landmark Locations},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {113--118},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335724},
  doi          = {10.1145/3335203.3335724},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YangLQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangRKS19,
  author       = {Jianhua Yang and
                  Danyang Ruan and
                  Xiangui Kang and
                  Yun{-}Qing Shi},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Towards Automatic Embedding Cost Learning for {JPEG} Steganography},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335713},
  doi          = {10.1145/3335203.3335713},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YangRKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangWYZM19,
  author       = {Yunzhao Yang and
                  Yuntao Wang and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Yi Ma},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Defining Joint Embedding Distortion for Adaptive {MP3} Steganography},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {14--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335710},
  doi          = {10.1145/3335203.3335710},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YangWYZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YangYH19,
  author       = {Hao Yang and
                  Zhongliang Yang and
                  Yongfeng Huang},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Steganalysis of VoIP Streams with {CNN-LSTM} Network},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {204--209},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335735},
  doi          = {10.1145/3335203.3335735},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/YangYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YousfiBFG19,
  author       = {Yassine Yousfi and
                  Jan Butora and
                  Jessica J. Fridrich and
                  Quentin Giboulot},
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Breaking {ALASKA:} Color Separation for Steganalysis in {JPEG} Domain},
  booktitle    = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  pages        = {138--149},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203.3335727},
  doi          = {10.1145/3335203.3335727},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/YousfiBFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2019,
  editor       = {R{\'{e}}mi Cogranne and
                  Luisa Verdoliva and
                  Siwei Lyu and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Xinpeng Zhang},
  title        = {Proceedings of the {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2019, Paris, France, July 3-5, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335203},
  doi          = {10.1145/3335203},
  isbn         = {978-1-4503-6821-6},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Anderson18,
  author       = {Ross Anderson},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Covert and Deniable Communications},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206023},
  doi          = {10.1145/3206004.3206023},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Anderson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BorghysBB18,
  author       = {Dirk Borghys and
                  Patrick Bas and
                  Helena Bruyninckx},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Facing the Cover-Source Mismatch on JPHide using Training-Set Design},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206021},
  doi          = {10.1145/3206004.3206021},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BorghysBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CaoWZZX18,
  author       = {Yun Cao and
                  Yu Wang and
                  Xianfeng Zhao and
                  Meineng Zhu and
                  Zhoujun Xu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Cover Block Decoupling for Content-Adaptive {H.264} Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206014},
  doi          = {10.1145/3206004.3206014},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CaoWZZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenKWZ18,
  author       = {Yifang Chen and
                  Xiangui Kang and
                  Z. Jane Wang and
                  Qiong Zhang},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Densely Connected Convolutional Neural Network for Multi-purpose Image
                  Forensics under Anti-forensic Attacks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206013},
  doi          = {10.1145/3206004.3206013},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenKWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenLL18,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Da Luo},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Identification of Audio Processing Operations Based on Convolutional
                  Neural Network},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {73--77},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206005},
  doi          = {10.1145/3206004.3206005},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HofbauerU18,
  author       = {Heinz Hofbauer and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Applicability of No-Reference Visual Quality Indices for Visual Security
                  Assessment},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206007},
  doi          = {10.1145/3206004.3206007},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HofbauerU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HollerU18,
  author       = {Yvonne H{\"{o}}ller and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Do EEG-Biometric Templates Threaten User Privacy?},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206006},
  doi          = {10.1145/3206004.3206006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HollerU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker18,
  author       = {Andrew D. Ker},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {On the Relationship Between Embedding Costs and Steganographic Capacity},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206017},
  doi          = {10.1145/3206004.3206017},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Ker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiZCZY18,
  author       = {Weixiang Li and
                  Weiming Zhang and
                  Kejiang Chen and
                  Wenbo Zhou and
                  Nenghai Yu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Defining Joint Distortion for {JPEG} Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {5--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206008},
  doi          = {10.1145/3206004.3206008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiZCZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiuGZC18,
  author       = {Yaqi Liu and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Yun Cao},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Image Forgery Localization based on Multi-Scale Convolutional Neural
                  Networks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206010},
  doi          = {10.1145/3206004.3206010},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiuGZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MakrushinKND18,
  author       = {Andrey Makrushin and
                  Christian Kraetzer and
                  Tom Neubert and
                  Jana Dittmann},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Generalized Benford's Law for Blind Detection of Morphed Face Images},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206018},
  doi          = {10.1145/3206004.3206018},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MakrushinKND18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MayerBS18,
  author       = {Owen Mayer and
                  Belhassen Bayar and
                  Matthew C. Stamm},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Learning Unified Deep-Features for Multiple Forensic Tasks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {79--84},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206022},
  doi          = {10.1145/3206004.3206022},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MayerBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MoCL18,
  author       = {Huaxiao Mo and
                  Bolin Chen and
                  Weiqi Luo},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Fake Faces Identification via Convolutional Neural Network},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {43--47},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206009},
  doi          = {10.1145/3206004.3206009},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MoCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PevnyK18,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Andrew D. Ker},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Exploring Non-Additive Distortion in Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206015},
  doi          = {10.1145/3206004.3206015},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PevnyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RichterESS18,
  author       = {Timo Richter and
                  Stephan Escher and
                  Dagmar Sch{\"{o}}nfeld and
                  Thorsten Strufe},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Forensic Analysis and Anonymisation of Printed Documents},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206019},
  doi          = {10.1145/3206004.3206019},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/RichterESS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchramlDU18,
  author       = {Rudolf Schraml and
                  Luca Debiasi and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Real or Fake: Mobile Device Drug Packaging Authentication},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {121--126},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206016},
  doi          = {10.1145/3206004.3206016},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SchramlDU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Verdoliva18,
  author       = {Luisa Verdoliva},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Deep Learning in Multimedia Forensics},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206024},
  doi          = {10.1145/3206004.3206024},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Verdoliva18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangCZXZ18,
  author       = {Yu Wang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Zhoujun Xu and
                  Meineng Zhu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography
                  by Constructing Isolated Channels in {HEVC}},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206020},
  doi          = {10.1145/3206004.3206020},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangCZXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangYYZX18,
  author       = {Yuntao Wang and
                  Kun Yang and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Zhoujun Xu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {CNN-based Steganalysis of {MP3} Steganography in the Entropy Code
                  Domain},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {55--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206011},
  doi          = {10.1145/3206004.3206011},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangYYZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangZCLLY18,
  author       = {Yiwei Zhang and
                  Weiming Zhang and
                  Kejiang Chen and
                  Jiayang Liu and
                  Yujia Liu and
                  Nenghai Yu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Adversarial Examples Against Deep Neural Network based Steganalysis},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206012},
  doi          = {10.1145/3206004.3206012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangZCLLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2018,
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004},
  doi          = {10.1145/3206004},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BayarS17,
  author       = {Belhassen Bayar and
                  Matthew C. Stamm},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {A Generic Approach Towards Image Manipulation Parameter Estimation
                  Using Convolutional Neural Networks},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {147--157},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083249},
  doi          = {10.1145/3082031.3083249},
  timestamp    = {Tue, 06 Nov 2018 16:59:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BayarS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BoroumandF17,
  author       = {Mehdi Boroumand and
                  Jessica J. Fridrich},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Nonlinear Feature Normalization in Steganalysis},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {45--54},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083239},
  doi          = {10.1145/3082031.3083239},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BoroumandF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenLL17,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Haodong Li},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Audio Steganalysis with Convolutional Neural Network},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083234},
  doi          = {10.1145/3082031.3083234},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ChenLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenSBF17,
  author       = {Mo Chen and
                  Vahid Sedighi and
                  Mehdi Boroumand and
                  Jessica J. Fridrich},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of
                  {JPEG} Images},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083248},
  doi          = {10.1145/3082031.3083248},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ChenSBF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CozzolinoPV17,
  author       = {Davide Cozzolino and
                  Giovanni Poggi and
                  Luisa Verdoliva},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Recasting Residual-based Local Descriptors as Convolutional Neural
                  Networks: an Application to Image Forgery Detection},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083247},
  doi          = {10.1145/3082031.3083247},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/CozzolinoPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Das17,
  author       = {Anupam Das},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Every Move You Make: Tracking Smartphone Users through Motion Sensors},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3092568},
  doi          = {10.1145/3082031.3092568},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Das17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/GortUN17,
  author       = {Maikel L. P{\'{e}}rez Gort and
                  Claudia Feregrino Uribe and
                  Jyrki Nummenmaa},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {A Minimum Distortion: High Capacity Watermarking Technique for Relational
                  Data},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {111--121},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083241},
  doi          = {10.1145/3082031.3083241},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/GortUN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Greenstadt17,
  author       = {Rachel Greenstadt},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Using Stylometry to Attribute Programmers and Writers},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {91},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3092567},
  doi          = {10.1145/3082031.3092567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Greenstadt17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HalvaniSG17,
  author       = {Oren Halvani and
                  Martin Steinebach and
                  Lukas Graner},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Towards Imperceptible Natural Language Watermarking for German},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {93--98},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3084682},
  doi          = {10.1145/3082031.3084682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HalvaniSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker17,
  author       = {Andrew D. Ker},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {The Square Root Law of Steganography: Bringing Theory Closer to Practice},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083235},
  doi          = {10.1145/3082031.3083235},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Ker17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KraetzerMNHD17,
  author       = {Christian Kraetzer and
                  Andrey Makrushin and
                  Tom Neubert and
                  Mario Hildebrandt and
                  Jana Dittmann},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Modeling Attacks on Photo-ID Documents and Applying Media Forensics
                  for the Detection of Facial Morphing},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083244},
  doi          = {10.1145/3082031.3083244},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KraetzerMNHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LuoH17,
  author       = {Yubo Luo and
                  Yongfeng Huang},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Text Steganography with High Embedding Rate: Using Recurrent Neural
                  Networks to Generate Chinese Classic Poetry},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {99--104},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083240},
  doi          = {10.1145/3082031.3083240},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/LuoH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MayerS17,
  author       = {Owen Mayer and
                  Matthew C. Stamm},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Countering Anti-Forensics of Lateral Chromatic Aberration},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083242},
  doi          = {10.1145/3082031.3083242},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MayerS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Menendez-OrtizU17,
  author       = {Alejandra Menendez{-}Ortiz and
                  Claudia Feregrino Uribe and
                  Jose Juan Garcia{-}Hernandez},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Audio Reversible Watermarking Scheme in the intDCT Domain with Modified
                  Prediction Error Expansion},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083246},
  doi          = {10.1145/3082031.3083246},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Menendez-OrtizU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PasquiniB17,
  author       = {Cecilia Pasquini and
                  Rainer B{\"{o}}hme},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Information-theoretic Bounds of Resampling Forensics: New Evidence
                  for Traces Beyond Cyclostationarity},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083233},
  doi          = {10.1145/3082031.3083233},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/PasquiniB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangCZZ17,
  author       = {Peipei Wang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Meineng Zhu},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for
                  {H.264/AVC} Videos},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083245},
  doi          = {10.1145/3082031.3083245},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WangCZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/XiaGZXM17,
  author       = {Chao Xia and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Zhoujun Xu and
                  Yi Ma},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Improving {GFR} Steganalysis Features by Using Gabor Symmetry and
                  Weighted Histograms},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083243},
  doi          = {10.1145/3082031.3083243},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/XiaGZXM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Xu17,
  author       = {Guanshuo Xu},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Deep Convolutional Neural Network to Detect {J-UNIWARD}},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {67--73},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083236},
  doi          = {10.1145/3082031.3083236},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Xu17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaiWR17,
  author       = {Liming Zhai and
                  Lina Wang and
                  Yanzhen Ren},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Combined and Calibrated Features for Steganalysis of Motion Vector-Based
                  Steganography in {H.264/AVC}},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {135--146},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083237},
  doi          = {10.1145/3082031.3083237},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaiWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhanCZK17,
  author       = {Yifeng Zhan and
                  Yifang Chen and
                  Qiong Zhang and
                  Xiangui Kang},
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Image Forensics Based on Transfer Learning and Convolutional Neural
                  Network},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031.3083250},
  doi          = {10.1145/3082031.3083250},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ZhanCZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2017,
  editor       = {Matthew C. Stamm and
                  Matthias Kirchner and
                  Sviatoslav Voloshynovskiy},
  title        = {Proceedings of the 5th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2017, Philadelphia, PA, USA, June 20-22,
                  2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3082031},
  doi          = {10.1145/3082031},
  isbn         = {978-1-4503-5061-7},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AbdulrahmanCMM16,
  author       = {Hasan Abdulrahman and
                  Marc Chaumont and
                  Philippe Montesinos and
                  Baptiste Magnier},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Color Image Steganalysis Based On Steerable Gaussian Filters Bank},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930799},
  doi          = {10.1145/2909827.2930799},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AbdulrahmanCMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BaluF16,
  author       = {Raghavendran Balu and
                  Teddy Furon},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Differentially Private Matrix Factorization using Sketching Techniques},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930793},
  doi          = {10.1145/2909827.2930793},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BaluF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BayarS16,
  author       = {Belhassen Bayar and
                  Matthew C. Stamm},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {A Deep Learning Approach to Universal Image Manipulation Detection
                  Using a New Convolutional Layer},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {5--10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930786},
  doi          = {10.1145/2909827.2930786},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BayarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BerndtL16,
  author       = {Sebastian Berndt and
                  Maciej Liskiewicz},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Provable Secure Universal Steganography of Optimal Rate: Provably
                  Secure Steganography does not Necessarily Imply One-Way Functions},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930796},
  doi          = {10.1145/2909827.2930796},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BerndtL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Biggio16,
  author       = {Battista Biggio},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Machine Learning under Attack: Vulnerability Exploitation and Security
                  Measures},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930784},
  doi          = {10.1145/2909827.2930784},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Biggio16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BoroumandF16,
  author       = {Mehdi Boroumand and
                  Jessica J. Fridrich},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Boosting Steganalysis with Explicit Feature Maps},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {149--157},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930803},
  doi          = {10.1145/2909827.2930803},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BoroumandF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CarraraA16,
  author       = {Brent Carrara and
                  Carlisle Adams},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {A Survey and Taxonomy Aimed at the Detection and Measurement of Covert
                  Channels},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {115--126},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930800},
  doi          = {10.1145/2909827.2930800},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CarraraA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChabanneKL16,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Roch Lescuyer},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Study of a Verifiable Biometric Matching},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {183--184},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2931097},
  doi          = {10.1145/2909827.2931097},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ChabanneKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DangCBC16,
  author       = {Hung Dang and
                  Yun Long Chong and
                  Francois Brun and
                  Ee{-}Chien Chang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Practical and Scalable Sharing of Encrypted Data in Cloud Storage
                  with Key Aggregation},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930795},
  doi          = {10.1145/2909827.2930795},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DangCBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DuanZL16,
  author       = {Jia Duan and
                  Jiantao Zhou and
                  Yuanman Li},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization
                  {(NMF)}},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930794},
  doi          = {10.1145/2909827.2930794},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DuanZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HeBG16,
  author       = {Kun He and
                  Christophe Bidan and
                  Ga{\"{e}}tan Le Guelvouit},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Privacy Protection for {JPEG} Content on Image-Sharing Platforms},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {185--186},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2933195},
  doi          = {10.1145/2909827.2933195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HeBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HouKSL16,
  author       = {Jong{-}Uk Hou and
                  Dongkyu Kim and
                  Hyun{-}Ji Song and
                  Heung{-}Kyu Lee},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Secure Image Display through Visual Cryptography: Exploiting Temporal
                  Responsibilities of the Human Eye},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930805},
  doi          = {10.1145/2909827.2930805},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HouKSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/IscenF16,
  author       = {Ahmet Iscen and
                  Teddy Furon},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Group Testing for Identification with Privacy},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930792},
  doi          = {10.1145/2909827.2930792},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/IscenF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Jerian16,
  author       = {Martino Jerian},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Bringing Multimedia Security from the Research Lab to the Forensic
                  Lab},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930785},
  doi          = {10.1145/2909827.2930785},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Jerian16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KaubaMU16,
  author       = {Christof Kauba and
                  Stefan Mayer and
                  Andreas Uhl},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Image Segmentation Based Visual Security Evaluation},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930806},
  doi          = {10.1145/2909827.2930806},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/KaubaMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KerPB16,
  author       = {Andrew D. Ker and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Patrick Bas},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Rethinking Optimal Embedding},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930797},
  doi          = {10.1145/2909827.2930797},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KerPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KogaI16,
  author       = {Hiroki Koga and
                  Kaoru Itabashi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting
                  Codes against the Interleaving Attack},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {23--28},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930788},
  doi          = {10.1145/2909827.2930788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/KogaI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MaXS16,
  author       = {Bin Ma and
                  Jian Xu and
                  Yun Q. Shi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {A Novel {CDMA} Based High Performance Reversible Data Hiding Scheme},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {39--44},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930790},
  doi          = {10.1145/2909827.2930790},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MaXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MegiasQ16,
  author       = {David Meg{\'{\i}}as and
                  Amna Qureshi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting
                  in {P2P} Distribution Systems: [Extended Abstract]},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {181--182},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2931096},
  doi          = {10.1145/2909827.2931096},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MegiasQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NamaziTP16,
  author       = {Mina Namazi and
                  Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Dynamic Privacy-Preserving Genomic Susceptibility Testing},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930791},
  doi          = {10.1145/2909827.2930791},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NamaziTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PasquiniSBBP16,
  author       = {Cecilia Pasquini and
                  Pascal Sch{\"{o}}ttle and
                  Rainer B{\"{o}}hme and
                  Giulia Boato and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Forensics of High Quality and Nearly Identical {JPEG} Image Recompression},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {11--21},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930787},
  doi          = {10.1145/2909827.2930787},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/PasquiniSBBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangNZ16,
  author       = {Junxiang Wang and
                  Jiangqun Ni and
                  Xing Zhang},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Efficient {HS} based Reversible Data Hiding Using Multi-feature Complexity
                  Measure and Optimized Histogram},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930789},
  doi          = {10.1145/2909827.2930789},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WangNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangZCZ16,
  author       = {Peipei Wang and
                  Hong Zhang and
                  Yun Cao and
                  Xianfeng Zhao},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {A Novel Embedding Distortion for Motion Vector-Based Steganography
                  Considering Motion Characteristic, Local Optimality and Statistical
                  Distribution},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {127--137},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930801},
  doi          = {10.1145/2909827.2930801},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WangZCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WuWS16,
  author       = {Han{-}Zhou Wu and
                  Hong{-}Xia Wang and
                  Yun{-}Qing Shi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {PPE-Based Reversible Data Hiding},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {187--188},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2933196},
  doi          = {10.1145/2909827.2933196},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WuWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WullerKM16,
  author       = {Stefan W{\"{u}}ller and
                  Mari{\'{a}}n K{\"{u}}hnel and
                  Ulrike Meyer},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Information Hiding in the {RSA} Modulus},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {159--167},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930804},
  doi          = {10.1145/2909827.2930804},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WullerKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/XuWS16,
  author       = {Guanshuo Xu and
                  Han{-}Zhou Wu and
                  Yun Q. Shi},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Ensemble of CNNs for Steganalysis: An Empirical Study},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {103--107},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930798},
  doi          = {10.1145/2909827.2930798},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/XuWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoGZ16,
  author       = {Zengzhen Zhao and
                  Qingxiao Guan and
                  Xianfeng Zhao},
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Constructing Near-optimal Double-layered Syndrome-Trellis Codes for
                  Spatial Steganography},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827.2930802},
  doi          = {10.1145/2909827.2930802},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2016,
  editor       = {Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Patrick Bas and
                  Tanya Ignatenko and
                  Fran{\c{c}}ois Cayre},
  title        = {Proceedings of the 4th {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2016, Vigo, Galicia, Spain, June 20-22,
                  2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2909827},
  doi          = {10.1145/2909827},
  isbn         = {978-1-4503-4290-2},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ArndtKDF15,
  author       = {Christian Arndt and
                  Stefan Kiltz and
                  Jana Dittmann and
                  Robert Fischer},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {ForeMan, a Versatile and Extensible Database System for Digitized
                  Forensics Based on Benchmarking Properties},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756615},
  doi          = {10.1145/2756601.2756615},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ArndtKDF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Aucsmith15,
  author       = {David Aucsmith},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Implications of Cyber Warfare},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756622},
  doi          = {10.1145/2756601.2756622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Aucsmith15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BaroughiCM15,
  author       = {Alireza Farrokh Baroughi and
                  Scott Craver and
                  Mohammed Faizan Mohsin},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {A Negative Number Vulnerability for Histogram-based Face Recognition
                  Systems},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {155--160},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756617},
  doi          = {10.1145/2756601.2756617},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BaroughiCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BondA15,
  author       = {William F. Bond and
                  Ahmed Awad E. A.},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Touch-based Static Authentication Using a Virtual Grid},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {129--134},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756602},
  doi          = {10.1145/2756601.2756602},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BondA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BurgPB15,
  author       = {Sebastian Matthias Burg and
                  Dustin Peterson and
                  Oliver Bringmann},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {End-to-Display Encryption: {A} Pixel-Domain Encryption with Security
                  Benefit},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {123--128},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756613},
  doi          = {10.1145/2756601.2756613},
  timestamp    = {Fri, 29 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BurgPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CaoZZY15,
  author       = {Yun Cao and
                  Hong Zhang and
                  Xianfeng Zhao and
                  Haibo Yu},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Video Steganography Based on Optimized Motion Estimation Perturbation},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {25--31},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756609},
  doi          = {10.1145/2756601.2756609},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CaoZZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CarraraA15,
  author       = {Brent C. Carrara and
                  Carlisle M. Adams},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {On Characterizing and Measuring Out-of-Band Covert Channels},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {43--54},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756604},
  doi          = {10.1145/2756601.2756604},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/CarraraA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Chow15,
  author       = {Richard Chow},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {IoT Privacy: Can We Regain Control?},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756623},
  doi          = {10.1145/2756601.2756623},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Chow15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DenemarkF15,
  author       = {Tom{\'{a}}s Denemark and
                  Jessica J. Fridrich},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Improving Steganographic Security by Synchronizing the Selection Channel},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {5--14},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756620},
  doi          = {10.1145/2756601.2756620},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/DenemarkF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FischerV15,
  author       = {Robert Fischer and
                  Claus Vielhauer},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Automated Firearm Identification: On using a novel Multiple-Slice-Shape
                  {(MSS)} Approach for Comparison and Matching of Firing Pin Impression
                  Topography},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {161--171},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756619},
  doi          = {10.1145/2756601.2756619},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/FischerV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Hajj-AhmadBCD15,
  author       = {Adi Hajj{-}Ahmad and
                  S{\'{e}}verine Baudry and
                  Bertrand Chupeau and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Flicker Forensics for Pirate Device Identification},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756612},
  doi          = {10.1145/2756601.2756612},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Hajj-AhmadBCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HouKCL15,
  author       = {Jong{-}Uk Hou and
                  Do{-}Gon Kim and
                  Sunghee Choi and
                  Heung{-}Kyu Lee},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular
                  Shift Coding Structure},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {115--121},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756607},
  doi          = {10.1145/2756601.2756607},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HouKCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Laarhoven15,
  author       = {Thijs Laarhoven},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Optimal Sequential Fingerprinting: Wald vs. Tardos},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756603},
  doi          = {10.1145/2756601.2756603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Laarhoven15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiuWY15,
  author       = {Bei{-}Bei Liu and
                  Xingjie Wei and
                  Jeff Yan},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Enhancing Sensor Pattern Noise for Source Camera Identification: An
                  Empirical Evaluation},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756614},
  doi          = {10.1145/2756601.2756614},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiuWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NatarajKM15,
  author       = {Lakshmanan Nataraj and
                  S. Karthikeyan and
                  B. S. Manjunath},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {{SATTVA:} SpArsiTy inspired classificaTion of malware VAriants},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {135--140},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756616},
  doi          = {10.1145/2756601.2756616},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/NatarajKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RyuKY15,
  author       = {Eun{-}Kyung Ryu and
                  Dae{-}Soo Kim and
                  Kee{-}Young Yoo},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {On Elliptic Curve Based Untraceable {RFID} Authentication Protocols},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {147--153},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756610},
  doi          = {10.1145/2756601.2756610},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/RyuKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchaferMBS15,
  author       = {Marcel Sch{\"{a}}fer and
                  Sebastian Mair and
                  Waldemar Berchtold and
                  Martin Steinebach},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Universal Threshold Calculation for Fingerprinting Decoders using
                  Mixture Models},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756611},
  doi          = {10.1145/2756601.2756611},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/SchaferMBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SedighiF15,
  author       = {Vahid Sedighi and
                  Jessica J. Fridrich},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Effect of Imprecise Knowledge of the Selection Channel on Steganalysis},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756621},
  doi          = {10.1145/2756601.2756621},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SedighiF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ShenHWLYL15,
  author       = {Yao Shen and
                  Liusheng Huang and
                  Fei Wang and
                  Xiaorong Lu and
                  Wei Yang and
                  Lu Li},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {LiHB: Lost in {HTTP} Behaviors - {A} Behavior-Based Covert Channel
                  in {HTTP}},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756605},
  doi          = {10.1145/2756601.2756605},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ShenHWLYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SongLYLZ15,
  author       = {Xiaofeng Song and
                  Fenlin Liu and
                  Chunfang Yang and
                  Xiangyang Luo and
                  Yi Zhang},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Steganalysis of Adaptive {JPEG} Steganography Using 2D Gabor Filters},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {15--23},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756608},
  doi          = {10.1145/2756601.2756608},
  timestamp    = {Wed, 28 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SongLYLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WrightFL15,
  author       = {Charles V. Wright and
                  Wu{-}chi Feng and
                  Feng Liu},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Thumbnail-Preserving Encryption for {JPEG}},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {141--146},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756618},
  doi          = {10.1145/2756601.2756618},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/WrightFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/YoonKJLL15,
  author       = {Ji Won Yoon and
                  Hyoungshick Kim and
                  Hyun{-}Ju Jo and
                  Hyelim Lee and
                  Kwangsu Lee},
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Visual Honey Encryption: Application to Steganography},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  pages        = {65--74},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2756601.2756606},
  doi          = {10.1145/2756601.2756606},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/YoonKJLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2015,
  editor       = {Adnan M. Alattar and
                  Jessica J. Fridrich and
                  Ned M. Smith and
                  Pedro {Comesa{~{n}}a Alfaro}},
  title        = {Proceedings of the 3rd {ACM} Workshop on Information Hiding and Multimedia
                  Security, IH{\&}MMSec 2015, Portland, OR, USA, June 17 - 19, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2756601},
  isbn         = {978-1-4503-3587-4},
  timestamp    = {Thu, 18 Jun 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BringerCFP0Z14,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  M{\'{e}}lanie Favre and
                  Alain Patey and
                  Thomas Schneider and
                  Michael Zohner},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {{GSHADE:} faster privacy-preserving distance computation and biometric
                  identification},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {187--198},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600922},
  doi          = {10.1145/2600918.2600922},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BringerCFP0Z14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CarneinSB14,
  author       = {Matthias Carnein and
                  Pascal Sch{\"{o}}ttle and
                  Rainer B{\"{o}}hme},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Predictable rain?: steganalysis of public-key steganography using
                  wet paper codes},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600942},
  doi          = {10.1145/2600918.2600942},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/CarneinSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Clabian14,
  author       = {Markus Clabian},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {FastPass: automated border control as challenging combination of various
                  security technologies},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {61},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600944},
  doi          = {10.1145/2600918.2600944},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Clabian14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DragoiCC14,
  author       = {Ioan{-}Catalin Dragoi and
                  Dinu Coltuc and
                  Ion Caciula},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Gradient based prediction for reversible watermarking by difference
                  expansion},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {35--40},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600924},
  doi          = {10.1145/2600918.2600924},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/DragoiCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/EiblE14,
  author       = {G{\"{u}}nther Eibl and
                  Dominik Engel},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Influence of data granularity on nonintrusive appliance load monitoring},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {147--151},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600920},
  doi          = {10.1145/2600918.2600920},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/EiblE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FengXZX14,
  author       = {Chunhui Feng and
                  Zhengquan Xu and
                  Wenting Zhang and
                  Yanyan Xu},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Automatic location of frame deletion point for digital video forensics},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {171--179},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600923},
  doi          = {10.1145/2600918.2600923},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/FengXZX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FischerV14,
  author       = {Robert Fischer and
                  Claus Vielhauer},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Digital crime scene analysis: automatic matching of firing pin impressions
                  on cartridge bottoms using 2d and 3d spatial features},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {77--82},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600930},
  doi          = {10.1145/2600918.2600930},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/FischerV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/GhoshHD14,
  author       = {Sudeep Ghosh and
                  Jason D. Hiser and
                  Jack W. Davidson},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {What's the PointiSA?},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {23--34},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600928},
  doi          = {10.1145/2600918.2600928},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/GhoshHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HildebrandtD14,
  author       = {Mario Hildebrandt and
                  Jana Dittmann},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {From StirNark to StirTrace: benchmarking pattern recognition based
                  printed fingerprint detection},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {71--76},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600926},
  doi          = {10.1145/2600918.2600926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HildebrandtD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JelasityB14,
  author       = {M{\'{a}}rk Jelasity and
                  Kenneth P. Birman},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Distributional differential privacy for large-scale smart metering},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {141--146},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600919},
  doi          = {10.1145/2600918.2600919},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/JelasityB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KammerstetterLSK14,
  author       = {Markus Kammerstetter and
                  Lucie Langer and
                  Florian Skopik and
                  Wolfgang Kastner},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Architecture-driven smart grid security management},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {153--158},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600937},
  doi          = {10.1145/2600918.2600937},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/KammerstetterLSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Laarhoven14,
  author       = {Thijs Laarhoven},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Capacities and capacity-achieving decoders for various fingerprinting
                  games},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600925},
  doi          = {10.1145/2600918.2600925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Laarhoven14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PevnyK14,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Andrew D. Ker},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Steganographic key leakage through payload metadata},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600921},
  doi          = {10.1145/2600918.2600921},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PevnyK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/QiaoZCR14,
  author       = {Tong Qiao and
                  Cathel Zitzmann and
                  R{\'{e}}mi Cogranne and
                  Florent Retraint},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Detection of JSteg algorithm using hypothesis testing theory and a
                  statistical model with nuisance parameters},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {3--13},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600932},
  doi          = {10.1145/2600918.2600932},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/QiaoZCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/QiuLLH14,
  author       = {Xiaoqing Qiu and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {A universal image forensic strategy based on steganalytic model},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600941},
  doi          = {10.1145/2600918.2600941},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/QiuLLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/QuiringS14,
  author       = {Erwin Quiring and
                  Pascal Sch{\"{o}}ttle},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {On the combination of randomized thresholds and non-parametric boundaries
                  to protect digital watermarks against sensitivity attacks},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {41--48},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600939},
  doi          = {10.1145/2600918.2600939},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/QuiringS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RaghavendraB14,
  author       = {Ramachandra Raghavendra and
                  Christoph Busch},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Robust palmprint verification using sparse representation of binarized
                  statistical features: a comprehensive study},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {181--185},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600929},
  doi          = {10.1145/2600918.2600929},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/RaghavendraB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RenZWZ14,
  author       = {Yanzhen Ren and
                  Liming Zhai and
                  Lina Wang and
                  Tingting Zhu},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Video steganalysis based on subtractive probability of optimal matching
                  feature},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {83--90},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600938},
  doi          = {10.1145/2600918.2600938},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/RenZWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Schelkens14,
  author       = {Peter Schelkens},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Image security tools for {JPEG} standards},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600943},
  doi          = {10.1145/2600918.2600943},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Schelkens14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchneiderS14,
  author       = {Matthias Schneider and
                  Thomas Schneider},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Notes on non-interactive secure comparison in "image feature extraction
                  in the encrypted domain with privacy-preserving SIFT"},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {135--140},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600927},
  doi          = {10.1145/2600918.2600927},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SchneiderS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TangLLH14,
  author       = {Weixuan Tang and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Adaptive steganalysis against {WOW} embedding algorithm},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600935},
  doi          = {10.1145/2600918.2600935},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/TangLLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TiwariG14,
  author       = {Kamlesh Tiwari and
                  Phalguni Gupta},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Biometrics based observer free transferable E-cash},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600934},
  doi          = {10.1145/2600918.2600934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/TiwariG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/UnterwegerU14,
  author       = {Andreas Unterweger and
                  Andreas Uhl},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Slice groups for post-compression region of interest encryption in
                  {SVC}},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600940},
  doi          = {10.1145/2600918.2600940},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/UnterwegerU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/UrvoyA14,
  author       = {Matthieu Urvoy and
                  Florent Autrusseau},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Application of Grubbs' test for outliers to the detection of watermarks},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {49--60},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600931},
  doi          = {10.1145/2600918.2600931},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/UrvoyA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangCZZY14,
  author       = {Hong Zhang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Weiming Zhang and
                  Nenghai Yu},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Video steganography with perturbed macroblock partition},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {115--122},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600936},
  doi          = {10.1145/2600918.2600936},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangCZZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhaoCWM14,
  author       = {Hong Zhao and
                  Yifan Chen and
                  Rui Wang and
                  Hafiz Malik},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Audio source authentication and splicing detection using acoustic
                  environmental signature},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600933},
  doi          = {10.1145/2600918.2600933},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhaoCWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2014,
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2600918},
  isbn         = {978-1-4503-2647-6},
  timestamp    = {Tue, 16 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AmeriniBCC13,
  author       = {Irene Amerini and
                  Mauro Barni and
                  Roberto Caldelli and
                  Andrea Costanzo},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {{SIFT} keypoint removal and injection for countering matching-based
                  image forensics},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {123--130},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482524},
  doi          = {10.1145/2482513.2482524},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/AmeriniBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BerchtoldSS13,
  author       = {Waldemar Berchtold and
                  Marcel Sch{\"{a}}fer and
                  Martin Steinebach},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Leakage detection and tracing for databases},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {29--34},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482537},
  doi          = {10.1145/2482513.2482537},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BerchtoldSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BianchiRFRP13,
  author       = {Tiziano Bianchi and
                  Alessia De Rosa and
                  Marco Fontani and
                  Giovanni Rocciolo and
                  Alessandro Piva},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Detection and classification of double compressed {MP3} audio tracks},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482523},
  doi          = {10.1145/2482513.2482523},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/BianchiRFRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BouzidiZHP13,
  author       = {Ines Bouzidi and
                  Azza Ouled Zaid and
                  Meha Hachani and
                  William Puech},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Joint watermarking and progressive geometric compression of 3D meshes},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {209--214},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482530},
  doi          = {10.1145/2482513.2482530},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BouzidiZHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenXLH13,
  author       = {Jiaorong Chen and
                  Shijun Xiang and
                  Weiping Liu and
                  Hongbin Huang},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Exposing digital audio forgeries in time domain by using singularity
                  analysis with wavelets},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482516},
  doi          = {10.1145/2482513.2482516},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ChenXLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ColtucD13,
  author       = {Dinu Coltuc and
                  Ioan{-}Catalin Dragoi},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Context embedding for raster-scan rhombus based reversible watermarking},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {215--220},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482535},
  doi          = {10.1145/2482513.2482535},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/ColtucD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Engel13,
  author       = {Dominik Engel},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Privacy and security challenges in the smart grid user domain},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {85--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482966},
  doi          = {10.1145/2482513.2482966},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Engel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/EngelUU13,
  author       = {Dominik Engel and
                  Andreas Uhl and
                  Andreas Unterweger},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Region of interest signalling for encrypted {JPEG} images},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482518},
  doi          = {10.1145/2482513.2482518},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/EngelUU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/FanWCX13,
  author       = {Wei Fan and
                  Kai Wang and
                  Fran{\c{c}}ois Cayre and
                  Zhang Xiong},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {{JPEG} anti-forensics using non-parametric {DCT} quantization noise
                  estimation and natural image statistics},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {117--122},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482536},
  doi          = {10.1145/2482513.2482536},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/FanWCX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HalvaniSWZ13,
  author       = {Oren Halvani and
                  Martin Steinebach and
                  Patrick Wolf and
                  Ralf Zimmermann},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Natural language watermarking for german texts},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {193--202},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482522},
  doi          = {10.1145/2482513.2482522},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HalvaniSWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Hammerle-UhlPU13,
  author       = {Jutta H{\"{a}}mmerle{-}Uhl and
                  Elias Pschernig and
                  Andreas Uhl},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Non-invertible and revocable iris templates using key-dependent wavelet
                  transforms},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482532},
  doi          = {10.1145/2482513.2482532},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Hammerle-UhlPU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Hammerle-UhlPU13a,
  author       = {Jutta H{\"{a}}mmerle{-}Uhl and
                  Michael Pober and
                  Andreas Uhl},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Towards standardised fingerprint matching robustness assessment: the
                  StirMark toolkit - cross-database comparisons with minutiae-based
                  matching},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482531},
  doi          = {10.1145/2482513.2482531},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Hammerle-UhlPU13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HanilciE13,
  author       = {Cemal Hanil{\c{c}}i and
                  Figen Ertas},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Optimizing acoustic features for source cell-phone recognition using
                  speech signals},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {141--148},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482520},
  doi          = {10.1145/2482513.2482520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HanilciE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HasseGB13,
  author       = {Jakob Hasse and
                  Thomas Gloe and
                  Martin Beck},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Forensic identification of {GSM} mobile phones},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482529},
  doi          = {10.1145/2482513.2482529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HasseGB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ho13,
  author       = {Anthony T. S. Ho},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {On the intertwining of information hiding and multimedia security:
                  a personal perspective},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {191--192},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2484424},
  doi          = {10.1145/2482513.2484424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Ho13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HoHSB13,
  author       = {Anh Thu Phan Ho and
                  Bao An Mai Hoang and
                  Wadih Sawaya and
                  Patrick Bas},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Document authentication using graphical codes: impacts of the channel
                  model},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {87--94},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482538},
  doi          = {10.1145/2482513.2482538},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HoHSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HolubF13,
  author       = {Vojtech Holub and
                  Jessica J. Fridrich},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Digital image steganography using universal distortion},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482514},
  doi          = {10.1145/2482513.2482514},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HolubF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HuangLHS13,
  author       = {Fangjun Huang and
                  Weiqi Luo and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Distortion function designing for {JPEG} steganography with uncompressed
                  side-image},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482517},
  doi          = {10.1145/2482513.2482517},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HuangLHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JiangZHM13,
  author       = {Kai Jiang and
                  Kenny Q. Zhu and
                  Yan Huang and
                  Xiaobin Ma},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Watermarking road maps against crop and merge attacks},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {221--230},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482526},
  doi          = {10.1145/2482513.2482526},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/JiangZHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/KerBBCCFFP13,
  author       = {Andrew D. Ker and
                  Patrick Bas and
                  Rainer B{\"{o}}hme and
                  R{\'{e}}mi Cogranne and
                  Scott Craver and
                  Tom{\'{a}}s Filler and
                  Jessica J. Fridrich and
                  Tom{\'{a}}s Pevn{\'{y}}},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Moving steganography and steganalysis from the laboratory into the
                  real world},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {45--58},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482965},
  doi          = {10.1145/2482513.2482965},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/KerBBCCFFP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kuribayashi13,
  author       = {Minoru Kuribayashi},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {A simple tracing algorithm for binary fingerprinting code under averaging
                  attack},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482521},
  doi          = {10.1145/2482513.2482521},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kuribayashi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LaarhovenW13,
  author       = {Thijs Laarhoven and
                  Benne de Weger},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Discrete distributions in the tardos scheme, revisited},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482533},
  doi          = {10.1145/2482513.2482533},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/LaarhovenW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiHLL13,
  author       = {Zhenyu Li and
                  Zongyun Hu and
                  Xiangyang Luo and
                  Bin Lu},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Embedding change rate estimation based on ensemble learning},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482528},
  doi          = {10.1145/2482513.2482528},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiHLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MathonFAB13,
  author       = {Benjamin Mathon and
                  Teddy Furon and
                  Laurent Amsaleg and
                  Julien Bringer},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Secure and efficient approximate nearest neighbors search},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482539},
  doi          = {10.1145/2482513.2482539},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MathonFAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MerkelOCDVB13,
  author       = {Ronny Merkel and
                  Karen Otte and
                  Robert Clausing and
                  Jana Dittmann and
                  Claus Vielhauer and
                  Anja Br{\"{a}}utigam},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {First investigation of latent fingerprints long-term aging using chromatic
                  white light sensors},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {95--104},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482519},
  doi          = {10.1145/2482513.2482519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MerkelOCDVB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MoussakhaniSFR13,
  author       = {Babak Moussakhani and
                  Mohammad Ali Sedaghat and
                  John T. Fl{\aa}m and
                  Tor A. Ramstad},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {On optimal detection for matrix multiplicative data hiding},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {203--208},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482534},
  doi          = {10.1145/2482513.2482534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MoussakhaniSFR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/OosterwijkSD13,
  author       = {Jan{-}Jaap Oosterwijk and
                  Boris Skoric and
                  Jeroen Doumen},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Optimal suspicion functions for tardos traitor tracing schemes},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482527},
  doi          = {10.1145/2482513.2482527},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/OosterwijkSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Pehlivanoglu13,
  author       = {Serdar Pehlivanoglu},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {An asymmetric fingerprinting code for collusion-resistant buyer-seller
                  watermarking},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482525},
  doi          = {10.1145/2482513.2482525},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Pehlivanoglu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Troncoso13,
  author       = {Carmela Troncoso},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Bayesian inference to evaluate information leakage in complex scenarios},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2485731},
  doi          = {10.1145/2482513.2485731},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Troncoso13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WuODS13,
  author       = {Xiaotian Wu and
                  Duanhao Ou and
                  Lu Dai and
                  Wei Sun},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {XOR-based meaningful visual secret sharing by generalized random grids},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {181--190},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482515},
  doi          = {10.1145/2482513.2482515},
  timestamp    = {Mon, 05 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WuODS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2013,
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2482513},
  isbn         = {978-1-4503-2081-8},
  timestamp    = {Mon, 04 Aug 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Al-HassanJS12,
  author       = {Nadia Al{-}Hassan and
                  Sabah A. Jassim and
                  Harin Sellahewa},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Enhancing face recognition at a distance using super resolution},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361429},
  doi          = {10.1145/2361407.2361429},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Al-HassanJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ArndtKV12,
  author       = {Christian Arndt and
                  Christian Kraetzer and
                  Claus Vielhauer},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {First approach for a computer-aided textile fiber type determination
                  based on template matching using a 3D laser scanning microscope},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361417},
  doi          = {10.1145/2361407.2361417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ArndtKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BarniFT12,
  author       = {Mauro Barni and
                  Marco Fontani and
                  Benedetta Tondi},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {A universal technique to hide traces of histogram-based image manipulations},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {97--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361424},
  doi          = {10.1145/2361407.2361424},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BarniFT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Baudry12,
  author       = {S{\'{e}}verine Baudry},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Frame-accurate temporal registration for non-blind video watermarking},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361411},
  doi          = {10.1145/2361407.2361411},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Baudry12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BerchtoldS12,
  author       = {Waldemar Berchtold and
                  Marcel Sch{\"{a}}fer},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Performance and code length optimization of joint decoding tardos
                  fingerprinting},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361412},
  doi          = {10.1145/2361407.2361412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BerchtoldS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ClausingKDV12,
  author       = {Eric Clausing and
                  Christian Kraetzer and
                  Jana Dittmann and
                  Claus Vielhauer},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {A first approach for the contactless acquisition and automated detection
                  of toolmarks on pins of locking cylinders using 3D confocal microscopy},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {47--56},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361416},
  doi          = {10.1145/2361407.2361416},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ClausingKDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ErbilekF12,
  author       = {Meryem Erbilek and
                  Michael C. Fairhurst},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {A methodological framework for investigating age factors on the performance
                  of biometric systems},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {115--122},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361428},
  doi          = {10.1145/2361407.2361428},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ErbilekF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ErkinBVL12,
  author       = {Zekeriya Erkin and
                  Michael Beye and
                  Thijs Veugen and
                  Reginald L. Lagendijk},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Privacy-preserving content-based recommender system},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {77--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361420},
  doi          = {10.1145/2361407.2361420},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ErkinBVL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FischerV12,
  author       = {Robert Fischer and
                  Claus Vielhauer},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Forensic ballistic analysis using a 3D sensor device},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361418},
  doi          = {10.1145/2361407.2361418},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FischerV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GhianiMR12,
  author       = {Luca Ghiani and
                  Gian Luca Marcialis and
                  Fabio Roli},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Experimental results on the feature-level fusion of multiple fingerprint
                  liveness detection algorithms},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {157--164},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361434},
  doi          = {10.1145/2361407.2361434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GhianiMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GloePK12,
  author       = {Thomas Gloe and
                  Stefan Pfennig and
                  Matthias Kirchner},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Unexpected artefacts in PRNU-based camera identification: a 'Dresden
                  Image Database' case-study},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361426},
  doi          = {10.1145/2361407.2361426},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GloePK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GuanLH12,
  author       = {Yu Guan and
                  Chang{-}Tsun Li and
                  Yongjian Hu},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {An adaptive system for gait recognition in multi-view environments},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361431},
  doi          = {10.1145/2361407.2361431},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GuanLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/IzadiD12,
  author       = {M. Hamed Izadi and
                  Andrzej Drygajlo},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Embedding cylinder quality measures into minutia cylinder-code based
                  latent fingerprint matching},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361414},
  doi          = {10.1145/2361407.2361414},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/IzadiD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KaravarsamisPN12,
  author       = {Sotiris Karavarsamis and
                  Ioannis Pitas and
                  Nikos Ntarmos},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Recognizing pornographic images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {105--108},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361425},
  doi          = {10.1145/2361407.2361425},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KaravarsamisPN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KargelHD12,
  author       = {Rainer K{\"{a}}rgel and
                  Mario Hildebrandt and
                  Jana Dittmann},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {An evaluation of biometric fingerprint matchers in a forensic context
                  using latent impressions},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {133--138},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361430},
  doi          = {10.1145/2361407.2361430},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KargelHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KerP12,
  author       = {Andrew David Ker and
                  Tom{\'{a}}s Pevn{\'{y}}},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Batch steganography in the real world},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361409},
  doi          = {10.1145/2361407.2361409},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LazzerettiGB12,
  author       = {Riccardo Lazzeretti and
                  Jorge Guajardo and
                  Mauro Barni},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Privacy preserving {ECG} quality evaluation},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361435},
  doi          = {10.1145/2361407.2361435},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LazzerettiGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LubenkoK12,
  author       = {Ivans Lubenko and
                  Andrew D. Ker},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Steganalysis with mismatched covers: do simple classifiers help?},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361410},
  doi          = {10.1145/2361407.2361410},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LubenkoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MerkelV12,
  author       = {Ronny Merkel and
                  Claus Vielhauer},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {On using flat bed scanners for the age determination of latent fingerprints:
                  first results for the binary pixel feature},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {39--46},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361415},
  doi          = {10.1145/2361407.2361415},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MerkelV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/NambiarCS12,
  author       = {Athira M. Nambiar and
                  Paulo Lobato Correia and
                  Lu{\'{\i}}s Ducla Soares},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Frontal gait recognition combining 2D and 3D data},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361432},
  doi          = {10.1145/2361407.2361432},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/NambiarCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PanagakisK12,
  author       = {Yannis Panagakis and
                  Constantine Kotropoulos},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Automatic telephone handset identification by sparse representation
                  of random spectral features},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361422},
  doi          = {10.1145/2361407.2361422},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/PanagakisK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SattaFR12,
  author       = {Riccardo Satta and
                  Giorgio Fumera and
                  Fabio Roli},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Appearance-based people recognition by local dissimilarity representations},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {151--156},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361433},
  doi          = {10.1145/2361407.2361433},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SattaFR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/UnterwegerU12,
  author       = {Andreas Unterweger and
                  Andreas Uhl},
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Length-preserving bit-stream-based {JPEG} encryption},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2361407.2361421},
  doi          = {10.1145/2361407.2361421},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/UnterwegerU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2012,
  editor       = {Chang{-}Tsun Li and
                  Jana Dittmann and
                  Stefan Katzenbeisser and
                  Scott Craver},
  title        = {Multimedia and Security Workshop, MM{\&}Sec 2012, Coventry, United
                  Kingdom, September 6-7, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2361407},
  isbn         = {978-1-4503-1417-6},
  timestamp    = {Tue, 16 Dec 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/0001SKH11,
  author       = {Kun Qian and
                  Maik Schott and
                  Christian Kraetzer and
                  Matthias L. Hemmje},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Contextualizing security for digital long-term preservation},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037274},
  doi          = {10.1145/2037252.2037274},
  timestamp    = {Mon, 20 Dec 2021 11:32:07 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/0001SKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AhmadLAM11,
  author       = {Junaid Jameel Ahmad and
                  Shujun Li and
                  Ihab Amer and
                  Marco Mattavelli},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Building multimedia security applications in the {MPEG} reconfigurable
                  video coding {(RVC)} framework},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {121--130},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037275},
  doi          = {10.1145/2037252.2037275},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AhmadLAM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ChoiCL11,
  author       = {Chang{-}Hee Choi and
                  Jung{-}Ho Choi and
                  Heung{-}Kyu Lee},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {{CFA} pattern identification of digital cameras using intermediate
                  value counting},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037258},
  doi          = {10.1145/2037252.2037258},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/ChoiCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Franz011,
  author       = {Martin Franz and
                  Stefan Katzenbeisser},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Processing encrypted floating point signals},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037271},
  doi          = {10.1145/2037252.2037271},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Franz011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HildebrandtKDV11,
  author       = {Mario Hildebrandt and
                  Stefan Kiltz and
                  Jana Dittmann and
                  Claus Vielhauer},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Malicious fingerprint traces: a proposal for an automated analysis
                  of printed amino acid dots using houghcircles},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037260},
  doi          = {10.1145/2037252.2037260},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HildebrandtKDV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HildebrandtKGV11,
  author       = {Mario Hildebrandt and
                  Stefan Kiltz and
                  Ina Grossmann and
                  Claus Vielhauer},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Convergence of digital and traditional forensic disciplines: a first
                  exemplary study for digital dactyloscopy},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037254},
  doi          = {10.1145/2037252.2037254},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HildebrandtKGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KanadePD11,
  author       = {Sanjay Ganesh Kanade and
                  Dijana Petrovska{-}Delacr{\'{e}}taz and
                  Bernadette Dorizzi},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Multi-biometrics based crypto-biometric session key generation and
                  sharing protocol},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037272},
  doi          = {10.1145/2037252.2037272},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KanadePD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Kiertscher0V11,
  author       = {Tobias Kiertscher and
                  Robert Fischer and
                  Claus Vielhauer},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Latent fingerprint detection using a spectral texture feature},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037259},
  doi          = {10.1145/2037252.2037259},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Kiertscher0V11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KodovskyFH11,
  author       = {Jan Kodovsk{\'{y}} and
                  Jessica J. Fridrich and
                  Vojtech Holub},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {On dangers of overtraining steganography to incomplete cover model},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037266},
  doi          = {10.1145/2037252.2037266},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KodovskyFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KraetzerMACD11,
  author       = {Christian Kraetzer and
                  Ronny Merkel and
                  Robert Altschaffel and
                  Eric Clausing and
                  Jana Dittmann},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Semi-automated communication protocol security verification for watermarking
                  - pros and cons illustrated on a complex application scenario},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037270},
  doi          = {10.1145/2037252.2037270},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KraetzerMACD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC11,
  author       = {Enping Li and
                  Scott Craver},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {A square-root law for active wardens},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {87--92},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037268},
  doi          = {10.1145/2037252.2037268},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Liu11,
  author       = {Qingzhong Liu},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Steganalysis of DCT-embedding based adaptive steganography and {YASS}},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {77--86},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037267},
  doi          = {10.1145/2037252.2037267},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Liu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Lu011,
  author       = {Wenjun Lu and
                  Min Wu},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Seam carving estimation using forensic hash},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {9--14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037255},
  doi          = {10.1145/2037252.2037255},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Lu011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MerkelBKDV11,
  author       = {Ronny Merkel and
                  Anja Br{\"{a}}utigam and
                  Christian Kraetzer and
                  Jana Dittmann and
                  Claus Vielhauer},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Evaluation of binary pixel aging curves of latent fingerprint traces
                  for different surfaces using a chromatic white light {(CWL)} sensor},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037262},
  doi          = {10.1145/2037252.2037262},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MerkelBKDV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PanZL11,
  author       = {Xunyu Pan and
                  Xing Zhang and
                  Siwei Lyu},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Exposing image forgery with blind noise estimation},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037256},
  doi          = {10.1145/2037252.2037256},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/PanZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ScheidatV011,
  author       = {Tobias Scheidat and
                  Claus Vielhauer and
                  Robert Fischer},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Comparative study on fusion strategies for biometric handwriting},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {61--68},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037264},
  doi          = {10.1145/2037252.2037264},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ScheidatV011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SerwaddaPK11,
  author       = {Abdul Serwadda and
                  Vir V. Phoha and
                  Ankunda R. Kiremire},
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Using global knowledge of users' typing traits to attack keystroke
                  biometrics templates},
  booktitle    = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252.2037263},
  doi          = {10.1145/2037252.2037263},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SerwaddaPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2011,
  editor       = {Chad Heitzenrater and
                  Scott Craver and
                  Jana Dittmann},
  title        = {Proceedings of the thirteenth {ACM} multimedia workshop on Multimedia
                  and security, MM{\&}Sec '11, Buffalo, New York, USA, September
                  29-30, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037252},
  doi          = {10.1145/2037252},
  isbn         = {978-1-4503-0806-9},
  timestamp    = {Mon, 20 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Al-AssamSJ10,
  author       = {Hisham Al{-}Assam and
                  Harin Sellahewa and
                  Sabah Jassim},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Multi-factor biometrics for authentication: a false sense of security},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854246},
  doi          = {10.1145/1854229.1854246},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Al-AssamSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ArnoldBC10,
  author       = {Michael Arnold and
                  Peter G. Baum and
                  Xiao{-}Ming Chen},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Robust detection of audio watermarks after acoustic path transmission},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854253},
  doi          = {10.1145/1854229.1854253},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ArnoldBC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BarniBCRLFFLPSP10,
  author       = {Mauro Barni and
                  Tiziano Bianchi and
                  Dario Catalano and
                  Mario Di Raimondo and
                  Ruggero Donida Labati and
                  Pierluigi Failla and
                  Dario Fiore and
                  Riccardo Lazzeretti and
                  Vincenzo Piuri and
                  Fabio Scotti and
                  Alessandro Piva},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Privacy-preserving fingercode authentication},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854270},
  doi          = {10.1145/1854229.1854270},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/BarniBCRLFFLPSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BeaugeD10,
  author       = {Lionel Beaug{\'{e}} and
                  Andrzej Drygajlo},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Fully featured secure biometric smart card device for fingerprint-based
                  authentication and identification},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {181--186},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854263},
  doi          = {10.1145/1854229.1854263},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BeaugeD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BhowmikA10,
  author       = {Deepayan Bhowmik and
                  Charith Abhayaratne},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Video watermarking using motion compensated 2D+t+2D filtering},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {127--136},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854254},
  doi          = {10.1145/1854229.1854254},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BhowmikA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BringerC10,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Negative databases for biometric data},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {55--62},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854242},
  doi          = {10.1145/1854229.1854242},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BringerC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/CaoZNT10,
  author       = {Gang Cao and
                  Yao Zhao and
                  Rongrong Ni and
                  Huawei Tian},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Anti-forensics of contrast enhancement in digital images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854237},
  doi          = {10.1145/1854229.1854237},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/CaoZNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ChoiLLS10,
  author       = {Jung{-}Ho Choi and
                  Heung{-}Kyu Lee and
                  Hae{-}Yeoun Lee and
                  Young{-}Ho Suh},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Color laser printer forensics with noise texture analysis},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854235},
  doi          = {10.1145/1854229.1854235},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ChoiLLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FaillaSB10,
  author       = {Pierluigi Failla and
                  Yagiz Sutcu and
                  Mauro Barni},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {eSketch: a privacy-preserving fuzzy commitment scheme for authentication
                  using encrypted biometrics},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {241--246},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854271},
  doi          = {10.1145/1854229.1854271},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FaillaSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FengD10,
  author       = {Xiaoying Feng and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {FLD-based detection of re-compressed speech signals},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854239},
  doi          = {10.1145/1854229.1854239},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/FengD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FillerF10,
  author       = {Tom{\'{a}}s Filler and
                  Jessica J. Fridrich},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Steganography using Gibbs random fields},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {199--212},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854266},
  doi          = {10.1145/1854229.1854266},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FillerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FontaniRCFPCC10,
  author       = {Marco Fontani and
                  Alessia De Rosa and
                  Roberto Caldelli and
                  Francesco Filippini and
                  Alessandro Piva and
                  Matteo Consalvo and
                  Vito Cappellini},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Reversible watermarking for image integrity verification in hierarchical
                  {PACS}},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {161--168},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854259},
  doi          = {10.1145/1854229.1854259},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FontaniRCFPCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GaoZWL10,
  author       = {Xifeng Gao and
                  Caiming Zhang and
                  Yu Wei and
                  Weitao Li},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {A highly adaptable capacity and invisibility 3D watermarking based
                  on four-points sets},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {137--146},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854255},
  doi          = {10.1145/1854229.1854255},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GaoZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GreitansPF10,
  author       = {Modris Greitans and
                  Mihails Pudzs and
                  Rihards Fuksis},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Palm vein biometrics based on infrared imaging and complex matched
                  filtering},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {101--106},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854250},
  doi          = {10.1145/1854229.1854250},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/GreitansPF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Juels10,
  author       = {Ari Juels},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Biometrics in electronic travel documents},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854231},
  doi          = {10.1145/1854229.1854231},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Juels10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Ker10,
  author       = {Andrew D. Ker},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {The square root law does not require a linear key},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {213--224},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854267},
  doi          = {10.1145/1854229.1854267},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Ker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Kirchner10,
  author       = {Matthias Kirchner},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Linear row and column predictors for the analysis of resized images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854234},
  doi          = {10.1145/1854229.1854234},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Kirchner10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KodovskyF10,
  author       = {Jan Kodovsk{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Quantitative steganalysis of {LSB} embedding in {JPEG} domain},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {187--198},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854265},
  doi          = {10.1145/1854229.1854265},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KodovskyF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KraetzerMACSD10,
  author       = {Christian Kraetzer and
                  Ronny Merkel and
                  Robert Altschaffel and
                  Eric Clausing and
                  Maik Schott and
                  Jana Dittmann},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Modelling watermark communication protocols using the {CASPER} modelling
                  language},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854252},
  doi          = {10.1145/1854229.1854252},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KraetzerMACSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KummelV10,
  author       = {Karl K{\"{u}}mmel and
                  Claus Vielhauer},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Reverse-engineer methods on a biometric hash algorithm for dynamic
                  handwriting},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854244},
  doi          = {10.1145/1854229.1854244},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KummelV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LeeLORL10,
  author       = {Ji Won Lee and
                  Min{-}Jeong Lee and
                  Tae{-}Woo Oh and
                  Seung{-}Jin Ryu and
                  Heung{-}Kyu Lee},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Screenshot identification using combing artifact from interlaced video},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854240},
  doi          = {10.1145/1854229.1854240},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LeeLORL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LevettJA10,
  author       = {Chris P. Levett and
                  Arshad Jhumka and
                  Sarabjot Singh Anand},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Towards event ordering in digital forensics},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854238},
  doi          = {10.1145/1854229.1854238},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LevettJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Lyu10,
  author       = {Siwei Lyu},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Estimating vignetting function from a single image for image authentication},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854233},
  doi          = {10.1145/1854229.1854233},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Lyu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MakrushinVD10,
  author       = {Andrey Makrushin and
                  Claus Vielhauer and
                  Jana Dittmann},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {The impact of {ARTMAP} to appearance-based face verification},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {89--94},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854248},
  doi          = {10.1145/1854229.1854248},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/MakrushinVD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MeerwaldU10,
  author       = {Peter Meerwald and
                  Andreas Uhl},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Watermark detection on quantized transform coefficients using product
                  bernoulli distributions},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854261},
  doi          = {10.1145/1854229.1854261},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MeerwaldU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MuzzarelliCBE10,
  author       = {Michele Muzzarelli and
                  Marco Carli and
                  Giulia Boato and
                  Karen O. Egiazarian},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Reversible watermarking via histogram shifting and least square optimization},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {147--152},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854256},
  doi          = {10.1145/1854229.1854256},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MuzzarelliCBE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchaferBZS10,
  author       = {Marcel Sch{\"{a}}fer and
                  Waldemar Berchtold and
                  Sascha Zmudzinski and
                  Martin Steinebach},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Zero false positive 2-secure fingerprinting watermarking based on
                  combining hamming distance conditions and parent pair search},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854260},
  doi          = {10.1145/1854229.1854260},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchaferBZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchwambergerF10,
  author       = {Valentin Schwamberger and
                  Matthias O. Franz},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Simple algorithmic modifications for improving blind steganalysis
                  performance},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {225--230},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854268},
  doi          = {10.1145/1854229.1854268},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchwambergerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/StutzPAUH10,
  author       = {Thomas St{\"{u}}tz and
                  Vinod Pankajakshan and
                  Florent Autrusseau and
                  Andreas Uhl and
                  Heinz Hofbauer},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Subjective and objective quality assessment of transparently encrypted
                  {JPEG2000} images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {247--252},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854272},
  doi          = {10.1145/1854229.1854272},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/StutzPAUH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VelardoD10,
  author       = {Carmelo Velardo and
                  Jean{-}Luc Dugelay},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Face recognition with {DAISY} descriptors},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {95--100},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854249},
  doi          = {10.1145/1854229.1854249},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VelardoD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WillemsI10,
  author       = {Frans M. J. Willems and
                  Tanya Ignatenko},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Identification and secret-key generation in biometric systems with
                  protected templates},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {63--66},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854243},
  doi          = {10.1145/1854229.1854243},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/WillemsI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/XieFF10,
  author       = {Fuchun Xie and
                  Teddy Furon and
                  Caroline Fontaine},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Towards robust and secure watermarking},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {153--160},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854258},
  doi          = {10.1145/1854229.1854258},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/XieFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/XuV10,
  author       = {Haiyun Xu and
                  Raymond N. J. Veldhuis},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Binary spectral minutiae representation with multi-sample fusion for
                  fingerprint recognition},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {73--80},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854245},
  doi          = {10.1145/1854229.1854245},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/XuV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2010,
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1854229},
  isbn         = {978-1-4503-0286-9},
  timestamp    = {Thu, 22 Jan 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/0008CZX09,
  author       = {Ming Chen and
                  Zhenyong Chen and
                  Xiao Zeng and
                  Zhang Xiong},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Reversible data hiding using additive prediction-error expansion},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597822},
  doi          = {10.1145/1597817.1597822},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/0008CZX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AtakliCWC09,
  author       = {Idris M. Atakli and
                  Yu Chen and
                  Qing Wu and
                  Scott Craver},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {{BLINK:} pixel-domain encryption for secure document management},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {171--176},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597847},
  doi          = {10.1145/1597817.1597847},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AtakliCWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BasW09,
  author       = {Patrick Bas and
                  Andreas Westfeld},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Two key estimation techniques for the broken arrows watermarking scheme},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597819},
  doi          = {10.1145/1597817.1597819},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BasW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/CaoZF09,
  author       = {Yun Cao and
                  Xianfeng Zhao and
                  Dengguo Feng},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Entropy codec based on evolutionary {MHT} and its application in video
                  encryption},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {155--160},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597845},
  doi          = {10.1145/1597817.1597845},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/CaoZF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DAlessandroS09,
  author       = {Brian D'Alessandro and
                  Yun Q. Shi},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Mp3 bit rate quality detection through frequency spectrum analysis},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597828},
  doi          = {10.1145/1597817.1597828},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/DAlessandroS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DengBPP09,
  author       = {Mina Deng and
                  Tiziano Bianchi and
                  Alessandro Piva and
                  Bart Preneel},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {An efficient buyer-seller watermarking protocol based on composite
                  signal representation},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597820},
  doi          = {10.1145/1597817.1597820},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/DengBPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FanJH09,
  author       = {Na Fan and
                  Cheng Jin and
                  Yizhen Huang},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {A pixel-based digital photo authentication framework via demosaicking
                  inter-pixel correlation},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {125--130},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597839},
  doi          = {10.1145/1597817.1597839},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/FanJH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FranzRB09,
  author       = {Elke Franz and
                  Stefan R{\"{o}}nisch and
                  Robert Bartel},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Improved embedding based on a set of cover images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {141--150},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597842},
  doi          = {10.1145/1597817.1597842},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FranzRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FuronP09,
  author       = {Teddy Furon and
                  Luis P{\'{e}}rez{-}Freire},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {{EM} decoding of tardos traitor tracing codes},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597835},
  doi          = {10.1145/1597817.1597835},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FuronP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HofbauerU09,
  author       = {Heinz Hofbauer and
                  Andreas Uhl},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Selective encryption of the {MC} {EZBC} bitstream for {DRM} scenarios},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597846},
  doi          = {10.1145/1597817.1597846},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HofbauerU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Ker09,
  author       = {Andrew D. Ker},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {The square root law requires a linear key},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {85--92},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597832},
  doi          = {10.1145/1597817.1597832},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Ker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KodovskyF09,
  author       = {Jan Kodovsk{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Calibration revisited},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597830},
  doi          = {10.1145/1597817.1597830},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KodovskyF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KraetzerSD09,
  author       = {Christian Kraetzer and
                  Maik Schott and
                  Jana Dittmann},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Unweighted fusion in microphone forensics using a decision tree and
                  linear logistic regression models},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {49--56},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597827},
  doi          = {10.1145/1597817.1597827},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KraetzerSD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC09,
  author       = {Enping Li and
                  Scott Craver},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {A supraliminal channel in a wireless phone application},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {151--154},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597843},
  doi          = {10.1145/1597817.1597843},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Lin0B09,
  author       = {W. Sabrina Lin and
                  Shan He and
                  Jeffrey Bloom},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Performance study and improvement on ECC-based binary anti-collusion
                  forensic code for multimedia},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {93--98},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597834},
  doi          = {10.1145/1597817.1597834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Lin0B09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MathonBCM09,
  author       = {Benjamin Mathon and
                  Patrick Bas and
                  Fran{\c{c}}ois Cayre and
                  Beno{\^{\i}}t Macq},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Optimization of natural watermarking using transportation theory},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597824},
  doi          = {10.1145/1597817.1597824},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MathonBCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MeerwaldU09,
  author       = {Peter Meerwald and
                  Andreas Uhl},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Additive spread-spectrum watermark detection in demosaicked images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597823},
  doi          = {10.1145/1597817.1597823},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MeerwaldU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PevnyBF09,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Patrick Bas and
                  Jessica J. Fridrich},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Steganalysis by subtractive pixel adjacency matrix},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597831},
  doi          = {10.1145/1597817.1597831},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/PevnyBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SachnevKZ09,
  author       = {Vasiliy Sachnev and
                  Hyoung Joong Kim and
                  Rongyue Zhang},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Less detectable {JPEG} steganography method based on heuristic optimization
                  and {BCH} syndrome coding},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597841},
  doi          = {10.1145/1597817.1597841},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SachnevKZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SarkarNM09,
  author       = {Anindya Sarkar and
                  Lakshmanan Nataraj and
                  B. S. Manjunath},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Detection of seam carving and localization of seam insertions in digital
                  images},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597837},
  doi          = {10.1145/1597817.1597837},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SarkarNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WangF09,
  author       = {Weihong Wang and
                  Hany Farid},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Exposing digital forgeries in video by detecting double quantization},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597826},
  doi          = {10.1145/1597817.1597826},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/WangF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YangSH09,
  author       = {Rui Yang and
                  Yun{-}Qing Shi and
                  Jiwu Huang},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Defeating fake-quality {MP3}},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597838},
  doi          = {10.1145/1597817.1597838},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/YangSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2009,
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {http://dl.acm.org/citation.cfm?id=1597817},
  isbn         = {978-1-60558-492-8},
  timestamp    = {Mon, 04 Aug 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AgarwalP08,
  author       = {Parag Agarwal and
                  Balakrishnan Prabhakaran},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Tamper proofing mechanisms for motion capture data},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {91--100},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411346},
  doi          = {10.1145/1411328.1411346},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/AgarwalP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BasD08,
  author       = {Patrick Bas and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Evaluation of an optimal watermark tampering attack against dirty
                  paper trellis schemes},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {227--232},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411366},
  doi          = {10.1145/1411328.1411366},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/BasD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BianchiPB08,
  author       = {Tiziano Bianchi and
                  Alessandro Piva and
                  Mauro Barni},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Efficient pointwise and blockwise encrypted operations},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411344},
  doi          = {10.1145/1411328.1411344},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BianchiPB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BiermannHDV08,
  author       = {Michael Biermann and
                  Tobias Hoppe and
                  Jana Dittmann and
                  Claus Vielhauer},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Vehicle systems: comfort {\&} security enhancement of face/speech
                  fusion with compensational biometric modalities},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411360},
  doi          = {10.1145/1411328.1411360},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BiermannHDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Cox08,
  author       = {Ingemar J. Cox},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Watermarking, steganography and content forensics},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411330},
  doi          = {10.1145/1411328.1411330},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Cox08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Diehl08,
  author       = {Malte Diehl},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Secure covert channels in multiplayer games},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {117--122},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411350},
  doi          = {10.1145/1411328.1411350},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Diehl08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Hammerle-UhlUW08,
  author       = {Jutta H{\"{a}}mmerle{-}Uhl and
                  Andreas Uhl and
                  Hartmut Wernisch},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Multiple re-watermarking using varying non-stationary mra with parameterized
                  wavelet filters},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411340},
  doi          = {10.1145/1411328.1411340},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Hammerle-UhlUW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KeeF08,
  author       = {Eric Kee and
                  Hany Farid},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Printer profiling for forensics and ballistics},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {3--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411332},
  doi          = {10.1145/1411328.1411332},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KeeF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Ker08,
  author       = {Andrew D. Ker},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Locating steganographic payload via ws residuals},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411335},
  doi          = {10.1145/1411328.1411335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Ker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KerPKF08,
  author       = {Andrew D. Ker and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Jan Kodovsk{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {The square root law of steganographic capacity},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411349},
  doi          = {10.1145/1411328.1411349},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KerPKF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KimLLS08,
  author       = {Kyung{-}Su Kim and
                  Min{-}Jeong Lee and
                  Heung{-}Kyu Lee and
                  Young{-}Ho Suh},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Histogram-based reversible data hiding technique using subsampling},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {69--74},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411341},
  doi          = {10.1145/1411328.1411341},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KimLLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Kirchner08,
  author       = {Matthias Kirchner},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Fast and reliable resampling detection by spectral analysis of fixed
                  linear predictor residue},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411333},
  doi          = {10.1145/1411328.1411333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Kirchner08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KodovskyF08,
  author       = {Jan Kodovsk{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On completeness of feature spaces in blind steganalysis},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411352},
  doi          = {10.1145/1411328.1411352},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KodovskyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KovalVP08,
  author       = {Oleksiy J. Koval and
                  Sviatoslav Voloshynovskiy and
                  Thierry Pun},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Privacy-preserving multimodal person and object identification},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {177--184},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411359},
  doi          = {10.1145/1411328.1411359},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KovalVP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KraetzerD08,
  author       = {Christian Kr{\"{a}}tzer and
                  Jana Dittmann},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Impact of feature selection in classification for hidden channel detection
                  on the example of audio data hiding},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {159--166},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411356},
  doi          = {10.1145/1411328.1411356},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KraetzerD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KwittMU08,
  author       = {Roland Kwitt and
                  Peter Meerwald and
                  Andreas Uhl},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A lightweight rao-cauchy detector for additive watermarking in the
                  dwt-domain},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411337},
  doi          = {10.1145/1411328.1411337},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KwittMU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiSH08,
  author       = {Bin Li and
                  Yun Q. Shi and
                  Jiwu Huang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Steganalysis of {YASS}},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411354},
  doi          = {10.1145/1411328.1411354},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiZY08,
  author       = {Xiaolong Li and
                  Tieyong Zeng and
                  Bin Yang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Detecting {LSB} matching by applying calibration technique for difference
                  image},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {133--138},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411353},
  doi          = {10.1145/1411328.1411353},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiuPG08,
  author       = {Yang Liu and
                  Balakrishnan Prabhakaran and
                  Xiaohu Guo},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A robust spectral approach for blind watermarking of manifold surfaces},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411338},
  doi          = {10.1145/1411328.1411338},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiuPG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Malik08,
  author       = {Hafiz Malik},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Steganalysis of {QIM} steganography using irregularity measure},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411355},
  doi          = {10.1145/1411328.1411355},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Malik08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PevnyF08,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Jessica J. Fridrich},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Novelty detection in blind steganalysis},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {167--176},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411357},
  doi          = {10.1145/1411328.1411357},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/PevnyF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Schaathun08,
  author       = {Hans Georg Schaathun},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A key-recovery attack on authentication watermarking by li and yuan},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {221--226},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411365},
  doi          = {10.1145/1411328.1411365},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Schaathun08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchlauwegPZM08,
  author       = {Mathias Schlauweg and
                  Dima Pr{\"{o}}frock and
                  Benedikt Zeibich and
                  Erika M{\"{u}}ller},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Self-synchronizing robust texel watermarking in gaussian scale-space},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411339},
  doi          = {10.1145/1411328.1411339},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchlauwegPZM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VoloshynovskiyKP08,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Thierry Pun},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Multimodal authentication based on random projections and source coding},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411361},
  doi          = {10.1145/1411328.1411361},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VoloshynovskiyKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Westfeld08,
  author       = {Andreas Westfeld},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A regression-based restoration technique for automated watermark removal},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {215--220},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411364},
  doi          = {10.1145/1411328.1411364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Westfeld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WilliamsTHC08,
  author       = {David M. Williams and
                  Helen Treharne and
                  Anthony T. S. Ho and
                  Chris Culnane},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Using a formal analysis technique to identify an unbinding attack
                  on a buyer-seller watermarking protocol},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {205--214},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411363},
  doi          = {10.1145/1411328.1411363},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/WilliamsTHC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/XieFF08,
  author       = {Fuchun Xie and
                  Teddy Furon and
                  Caroline Fontaine},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On-off keying modulation and tardos fingerprinting},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {101--106},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411347},
  doi          = {10.1145/1411328.1411347},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/XieFF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YangQH08,
  author       = {Rui Yang and
                  Zhenhua Qu and
                  Jiwu Huang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Detecting digital audio forgeries by checking frame offsets},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411334},
  doi          = {10.1145/1411328.1411334},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/YangQH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ZmudzinskiS08,
  author       = {Sascha Zmudzinski and
                  Martin Steinebach},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Psycho-acoustic model-based message authentication coding for audio
                  data},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411343},
  doi          = {10.1145/1411328.1411343},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ZmudzinskiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2008,
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-058-6},
  timestamp    = {Tue, 25 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AgarwalP07,
  author       = {Parag Agarwal and
                  Balakrishnan Prabhakaran},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robust blind watermarking mechanism for point sampled geometry},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288894},
  doi          = {10.1145/1288869.1288894},
  timestamp    = {Mon, 22 Apr 2024 21:24:22 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/AgarwalP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BaligaK07,
  author       = {Arati Baliga and
                  Joe Kilian},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On covert collaboration},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288874},
  doi          = {10.1145/1288869.1288874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BaligaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BarniDM07,
  author       = {Mauro Barni and
                  Angela D'Angelo and
                  Neri Merhav},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Expanding the class of watermark de-synchronization attacks},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288897},
  doi          = {10.1145/1288869.1288897},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BarniDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ComesanaP07,
  author       = {Pedro Comesa{\~{n}}a and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On the capacity of stegosystems},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288873},
  doi          = {10.1145/1288869.1288873},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/ComesanaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/CzarlinskaK07,
  author       = {Alexandra Czarlinska and
                  Deepa Kundur},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Attack vs. failure detection in event-driven wireless visual sensor
                  networks},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {215--220},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288899},
  doi          = {10.1145/1288869.1288899},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/CzarlinskaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DybalaJL07,
  author       = {Brandon Dybala and
                  Brian Jennings and
                  David Letscher},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Detecting filtered cloning in digital images},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288877},
  doi          = {10.1145/1288869.1288877},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/DybalaJL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/EngelSU07,
  author       = {Dominik Engel and
                  Thomas St{\"{u}}tz and
                  Andreas Uhl},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Format-compliant jpeg2000 encryption with combined packet header and
                  packet body protection},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {87--96},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288882},
  doi          = {10.1145/1288869.1288882},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/EngelSU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FridrichPK07,
  author       = {Jessica J. Fridrich and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Jan Kodovsk{\'{y}}},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Statistically undetectable jpeg steganography: dead ends challenges,
                  and opportunities},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288872},
  doi          = {10.1145/1288869.1288872},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/FridrichPK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/JacobJV07,
  author       = {Matthias Jacob and
                  Mariusz H. Jakubowski and
                  Ramarathnam Venkatesan},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Towards integral binary execution: implementing oblivious hashing
                  using overlapped instruction encodings},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {129--140},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288887},
  doi          = {10.1145/1288869.1288887},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/JacobJV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/JainskyKH07,
  author       = {Julien S. Jainsky and
                  Deepa Kundur and
                  Don R. Halverson},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Towards digital video steganalysis using asymptotic memoryless detection},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {161--168},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288891},
  doi          = {10.1145/1288869.1288891},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/JainskyKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Ker07,
  author       = {Andrew D. Ker},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {The ultimate steganalysis benchmark?},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {141--148},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288889},
  doi          = {10.1145/1288869.1288889},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Ker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KratzerODL07,
  author       = {Christian Kr{\"{a}}tzer and
                  Andrea Oermann and
                  Jana Dittmann and
                  Andreas Lang},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Digital audio forensics: a first practical evaluation on microphone
                  and environment classification},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288879},
  doi          = {10.1145/1288869.1288879},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KratzerODL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LuhK07,
  author       = {William Luh and
                  Deepa Kundur},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Distributed keyless security for correlated data with applications
                  in visual sensor networks},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {75--86},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288881},
  doi          = {10.1145/1288869.1288881},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LuhK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MaheshwariAP07,
  author       = {Puneet Maheshwari and
                  Parag Agarwal and
                  Balakrishnan Prabhakaran},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Progressive compression invariant semi-fragile watermarks for 3d meshes},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {245--250},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288904},
  doi          = {10.1145/1288869.1288904},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/MaheshwariAP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MalikSC07,
  author       = {Hafiz Malik and
                  K. P. Subbalakshmi and
                  Rajarathnam Chandramouli},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Steganalysis of GIM-based data hiding using kernel density estimation},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288890},
  doi          = {10.1145/1288869.1288890},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/MalikSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MathonBC07,
  author       = {Benjamin Mathon and
                  Patrick Bas and
                  Fran{\c{c}}ois Cayre},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Practical performance analysis of secure modulations for woa spread-spectrum
                  based image watermarking},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {237--244},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288903},
  doi          = {10.1145/1288869.1288903},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MathonBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Nafornita07,
  author       = {Corina Nafornita},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A new pixel-wise mask for watermarking},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {221--228},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288901},
  doi          = {10.1145/1288869.1288901},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Nafornita07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/NoorkamiM07,
  author       = {Maneli Noorkami and
                  Russell M. Mersereau},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Video watermark detection with controllable performance with and without
                  knowledge of watermark location},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {229--236},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288902},
  doi          = {10.1145/1288869.1288902},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/NoorkamiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ProfrockSM07,
  author       = {Dima Pr{\"{o}}frock and
                  Mathias Schlauweg and
                  Erika M{\"{u}}ller},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Geometric warping watermarking extended concerning geometric attacks
                  and embedding artifacts},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {169--174},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288893},
  doi          = {10.1145/1288869.1288893},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ProfrockSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SencarLM07,
  author       = {Husrev T. Sencar and
                  Qiming Li and
                  Nasir D. Memon},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A new approach to countering ambiguity attacks},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {205--214},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288898},
  doi          = {10.1145/1288869.1288898},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SencarLM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ShiCC07,
  author       = {Yun Q. Shi and
                  Chunhua Chen and
                  Wen Chen},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A natural image model approach to splicing detection},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288878},
  doi          = {10.1145/1288869.1288878},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/ShiCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/StutzU07,
  author       = {Thomas St{\"{u}}tz and
                  Andreas Uhl},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On efficient transparent jpeg2000 encryption},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288883},
  doi          = {10.1145/1288869.1288883},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/StutzU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Thuraisingham07,
  author       = {Bhavani Thuraisingham},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Multimedia systems security},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288870},
  doi          = {10.1145/1288869.1288870},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/Thuraisingham07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Troncoso-PastorizaKCL07,
  author       = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Stefan Katzenbeisser and
                  Mehmet Utku Celik and
                  Aweke N. Lemma},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A secure multidimensional point inclusion protocol},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288884},
  doi          = {10.1145/1288869.1288884},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Troncoso-PastorizaKCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VielhauerS07,
  author       = {Claus Vielhauer and
                  Maik Schott},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Nested object watermarking: from the rectangular con-straint to polygonal
                  and private annotations},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {187--194},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288895},
  doi          = {10.1145/1288869.1288895},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VielhauerS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WangF07,
  author       = {Weihong Wang and
                  Hany Farid},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Exposing digital forgeries in video by detecting duplication},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288876},
  doi          = {10.1145/1288869.1288876},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/WangF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/XiangKH07,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim and
                  Jiwu Huang},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Histogram-based image hashing scheme robust against geometric deformations},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {121--128},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288886},
  doi          = {10.1145/1288869.1288886},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/XiangKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2007,
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-857-2},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AgarwalAP06,
  author       = {Parag Agarwal and
                  Ketaki Adi and
                  B. Prabhakaran},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robust blind watermarking mechanism for motion data streams},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {230--235},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161407},
  doi          = {10.1145/1161366.1161407},
  timestamp    = {Fri, 26 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AgarwalAP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Barni06,
  author       = {Mauro Barni},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Processing encrypted signals: a new frontier for multimedia security},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161367},
  doi          = {10.1145/1161366.1161367},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Barni06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BarniOP06,
  author       = {Mauro Barni and
                  Claudio Orlandi and
                  Alessandro Piva},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A privacy-preserving protocol for neural-network-based computation},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {146--151},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161393},
  doi          = {10.1145/1161366.1161393},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BarniOP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BasC06,
  author       = {Patrick Bas and
                  Fran{\c{c}}ois Cayre},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Achieving subspace or key security for {WOA} using natural or circular
                  watermarking},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {80--88},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161381},
  doi          = {10.1145/1161366.1161381},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BasC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/EngelKU06,
  author       = {Dominik Engel and
                  Rade Kutil and
                  Andreas Uhl},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A symbolic transform attack on lightweight encryption based on wavelet
                  filter parameterization},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {202--207},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161402},
  doi          = {10.1145/1161366.1161402},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/EngelKU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Farid06,
  author       = {Hany Farid},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Exposing digital forgeries in scientific images},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161374},
  doi          = {10.1145/1161366.1161374},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Farid06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Fridrich06,
  author       = {Jessica J. Fridrich},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Minimizing the embedding impact in steganography},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {2--10},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161369},
  doi          = {10.1145/1161366.1161369},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Fridrich06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Furon06,
  author       = {Teddy Furon},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Hermite polynomials as provably good functions to watermark white
                  gaussian hosts},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {224--229},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161406},
  doi          = {10.1145/1161366.1161406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Furon06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HuangCW06,
  author       = {Chun{-}Hsiang Huang and
                  Shang{-}Chih Chuang and
                  Ja{-}Ling Wu},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Digital invisible ink and its applications in steganography},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {23--28},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161372},
  doi          = {10.1145/1161366.1161372},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HuangCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/JohnsonF06,
  author       = {Micah K. Johnson and
                  Hany Farid},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Exposing digital forgeries through chromatic aberration},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {48--55},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161376},
  doi          = {10.1145/1161366.1161376},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/JohnsonF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KangILS06,
  author       = {In Koo Kang and
                  Dong{-}Hyuck Im and
                  Heung{-}Kyu Lee and
                  Young{-}Ho Suh},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Implementation of real-time watermarking scheme for high-quality video},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {124--129},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161388},
  doi          = {10.1145/1161366.1161388},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KangILS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KovalVHP06,
  author       = {Oleksiy J. Koval and
                  Sviatoslav Voloshynovskiy and
                  Taras Holotyak and
                  Thierry Pun},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Information-theoretic analysis of steganalysis in real images},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {11--16},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161370},
  doi          = {10.1145/1161366.1161370},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KovalVHP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KratzerDLK06,
  author       = {Christian Kr{\"{a}}tzer and
                  Jana Dittmann and
                  Andreas Lang and
                  Tobias K{\"{u}}hne},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {{WLAN} steganography: a first practical review},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161371},
  doi          = {10.1145/1161366.1161371},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KratzerDLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LangD06,
  author       = {Andreas Lang and
                  Jana Dittmann},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Transparency and complexity benchmarking of audio watermarking algorithms
                  issues},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {190--201},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161401},
  doi          = {10.1145/1161366.1161401},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LangD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC06,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robust, short and sensitive authentication tags using secure sketch},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {56--61},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161377},
  doi          = {10.1145/1161366.1161377},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiC06a,
  author       = {Qiming Li and
                  Ee{-}Chien Chang},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Zero-knowledge watermark detection resistant to ambiguity attacks},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {158--163},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161395},
  doi          = {10.1145/1161366.1161395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiC06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MeixnerU06,
  author       = {Albert Meixner and
                  Andreas Uhl},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robustness and security of a wavelet-based {CBIR} hashing algorithm},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {140--145},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161392},
  doi          = {10.1145/1161366.1161392},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MeixnerU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/NakashimaTNB06,
  author       = {Yuta Nakashima and
                  Ryuki Tachibana and
                  Masafumi Nishimura and
                  Noboru Babaguchi},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Estimation of recording location using audio watermarking},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {108--113},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161385},
  doi          = {10.1145/1161366.1161385},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/NakashimaTNB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Perez-FreirePF06,
  author       = {Luis P{\'{e}}rez{-}Freire and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Teddy Furon},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On achievable security levels for lattice data hiding in the known
                  message attack scenario},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {68--79},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161380},
  doi          = {10.1145/1161366.1161380},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Perez-FreirePF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PetrovicTW06,
  author       = {Rade Petrovic and
                  Babak Tehranchi and
                  Joseph M. Winograd},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Digital watermarking security considerations},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {152--157},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161394},
  doi          = {10.1145/1161366.1161394},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/PetrovicTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ScheidatEV06,
  author       = {Tobias Scheidat and
                  Andreas Engel and
                  Claus Vielhauer},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Parameter optimization for biometric fingerprint recognition using
                  genetic algorithms},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {130--134},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161389},
  doi          = {10.1145/1161366.1161389},
  timestamp    = {Sat, 09 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ScheidatEV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchlauwegPM06,
  author       = {Mathias Schlauweg and
                  Dima Pr{\"{o}}frock and
                  Erika M{\"{u}}ller},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {JPEG2000-based secure image authentication},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {62--67},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161378},
  doi          = {10.1145/1161366.1161378},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchlauwegPM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SocekSMC06,
  author       = {Daniel Socek and
                  Michal Sramka and
                  Oge Marques and
                  Dubravko Culibrk},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {An improvement to a biometric.based multimedia content protection
                  scheme},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {135--139},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161390},
  doi          = {10.1145/1161366.1161390},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SocekSMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ThiemertSW06,
  author       = {Stefan Thiemert and
                  Martin Steinebach and
                  Patrick Wolf},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A digital watermark for vector-based fonts},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {120--123},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161387},
  doi          = {10.1145/1161366.1161387},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ThiemertSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/TopkaraTA06,
  author       = {Umut Topkara and
                  Mercan Topkara and
                  Mikhail J. Atallah},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {The hiding virtues of ambiguity: quantifiably resilient watermarking
                  of natural language text through synonym substitutions},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {164--174},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161397},
  doi          = {10.1145/1161366.1161397},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/TopkaraTA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Troncoso-PastorizaP06,
  author       = {Juan Ram{\'{o}}n Troncoso{-}Pastoriza and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Zero-knowledge watermark detector robust to sensitivity attacks},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161383},
  doi          = {10.1145/1161366.1161383},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Troncoso-PastorizaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VielhauerS06,
  author       = {Claus Vielhauer and
                  Maik Schott},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Image annotation watermarking: nested object embedding using hypergraph
                  model},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {182--189},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161399},
  doi          = {10.1145/1161366.1161399},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VielhauerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VinodDB06,
  author       = {P. Vinod and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Prabin Kumar Bora},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Assessing motion-coherency in video watermarking},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {114--119},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161386},
  doi          = {10.1145/1161366.1161386},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/VinodDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VoloshynovskiyKTVP06,
  author       = {Sviatoslav Voloshynovskiy and
                  Oleksiy J. Koval and
                  Emre Topak and
                  Jos{\'{e}}{-}Emilio Vila{-}Forc{\'{e}}n and
                  Thierry Pun},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On reversibility of random binning based data-hiding techniques: security
                  perspectives},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {89--96},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161382},
  doi          = {10.1145/1161366.1161382},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VoloshynovskiyKTVP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WangF06,
  author       = {Weihong Wang and
                  Hany Farid},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Exposing digital forgeries in video by detecting double {MPEG} compression},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {37--47},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161375},
  doi          = {10.1145/1161366.1161375},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/WangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Westfeld06,
  author       = {Andreas Westfeld},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Lessons from the {BOWS} contest},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {208--213},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161403},
  doi          = {10.1145/1161366.1161403},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Westfeld06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ZhuT06,
  author       = {William Zhu and
                  Clark D. Thomborson},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Extraction in software watermarking},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {175--181},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161398},
  doi          = {10.1145/1161366.1161398},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ZhuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2006,
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-493-6},
  timestamp    = {Fri, 26 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AhmedM05,
  author       = {Farid Ahmed and
                  Ira S. Moskowitz},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Composite signature based watermarking for fingerprint authentication},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {137--142},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073195},
  doi          = {10.1145/1073170.1073195},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AhmedM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AmbalavananC05,
  author       = {Aruna Ambalavanan and
                  Rajarathnam Chandramouli},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {A Bayesian image steganalysis approach to estimate the embedded secret
                  message},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {33--38},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073177},
  doi          = {10.1145/1073170.1073177},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AmbalavananC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ConstantinGG05,
  author       = {Cam{\'{e}}lia Constantin and
                  David Gross{-}Amblard and
                  Meryem Guerrouani},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Watermill: an optimized fingerprinting system for highly constrained
                  data},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {143--155},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073196},
  doi          = {10.1145/1073170.1073196},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ConstantinGG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DumitrescuW05,
  author       = {Sorina Dumitrescu and
                  Xiaolin Wu},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {{LSB} steganalysis based on high-order statistics},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073176},
  doi          = {10.1145/1073170.1073176},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/DumitrescuW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/EngelU05,
  author       = {Dominik Engel and
                  Andreas Uhl},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Parameterized biorthogonal wavelet lifting for lightweight {JPEG}
                  2000 transparent encryption},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {63--70},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073183},
  doi          = {10.1145/1073170.1073183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/EngelU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HarmsenP05,
  author       = {Jeremiah J. Harmsen and
                  William A. Pearlman},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Capacity of steganographic channels},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {11--24},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073175},
  doi          = {10.1145/1073170.1073175},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HarmsenP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HeW05,
  author       = {Shan He and
                  Min Wu},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Building efficient and effective multimedia fingerprints via joint
                  coding and embedding},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {127--136},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073194},
  doi          = {10.1145/1073170.1073194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HeW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Heitzenrater05,
  author       = {Chad Heitzenrater},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {A government perspective on digital data embedding: taking a systems
                  approach},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {77--78},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073172},
  doi          = {10.1145/1073170.1073172},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Heitzenrater05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/JohnsonF05,
  author       = {Micah K. Johnson and
                  Hany Farid},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Exposing digital forgeries by detecting inconsistencies in lighting},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073171},
  doi          = {10.1145/1073170.1073171},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/JohnsonF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LangDSV05,
  author       = {Andreas Lang and
                  Jana Dittmann and
                  Ryan Spring and
                  Claus Vielhauer},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Audio watermark attacks: from single to profile attacks},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073179},
  doi          = {10.1145/1073170.1073179},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LangDSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MobasseriM05,
  author       = {Bijan G. Mobasseri and
                  Michael P. Marcinak},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Watermarking of {MPEG-2} video in compressed domain using {VLC} mapping},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {91--94},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073187},
  doi          = {10.1145/1073170.1073187},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MobasseriM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/OermannLD05,
  author       = {Andrea Oermann and
                  Andreas Lang and
                  Jana Dittmann},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Verifier-tuple for audio-forensic to determine speaker environment},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073181},
  doi          = {10.1145/1073170.1073181},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/OermannLD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/OzerSM05,
  author       = {Hamza {\"{O}}zer and
                  B{\"{u}}lent Sankur and
                  Nasir D. Memon},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {An SVD-based audio watermarking technique},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073180},
  doi          = {10.1145/1073170.1073180},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/OzerSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/PiperSM05,
  author       = {Angela Piper and
                  Reihaneh Safavi{-}Naini and
                  Alfred Mertins},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Resolution and quality scalable spread spectrum image watermarking},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073186},
  doi          = {10.1145/1073170.1073186},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/PiperSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Raman05,
  author       = {Neerja Raman},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Challenges in multimedia security: an industry perspective},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {125--126},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073173},
  doi          = {10.1145/1073170.1073173},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Raman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SocekC05,
  author       = {Daniel Socek and
                  Dubravko Culibrk},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {On the security of a clipped hopfield neural network-based cryptosystem},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {71--76},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073184},
  doi          = {10.1145/1073170.1073184},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SocekC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SutcuSM05,
  author       = {Yagiz Sutcu and
                  Husrev T. Sencar and
                  Nasir D. Memon},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {A secure biometric authentication scheme based on robust hashing},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073191},
  doi          = {10.1145/1073170.1073191},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SutcuSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/WuC05,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}ming Cheung},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {A fragile watermarking scheme for 3D meshes},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073192},
  doi          = {10.1145/1073170.1073192},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/WuC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YangSBNS05,
  author       = {Bian Yang and
                  Martin Schmucker and
                  Christoph Busch and
                  Xiamu Niu and
                  Sheng{-}He Sun},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Approaching optimal value expansion for reversible watermarking},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073188},
  doi          = {10.1145/1073170.1073188},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/YangSBNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YuLL05,
  author       = {Chia{-}Mu Yu and
                  Chun{-}Shien Lu},
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Robust non-interactive zero-knowledge watermarking scheme against
                  cheating prover},
  booktitle    = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  pages        = {103--110},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1073170.1073190},
  doi          = {10.1145/1073170.1073190},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/YuLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2005,
  editor       = {Ahmet M. Eskicioglu and
                  Jessica J. Fridrich and
                  Jana Dittmann},
  title        = {Proceedings of the 7th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2005, New York, NY, USA, August 1-2, 2005, 2006},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-032-9},
  timestamp    = {Fri, 26 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AdelsbachRS04,
  author       = {Andr{\'{e}} Adelsbach and
                  Markus Rohe and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Overcoming the obstacles of zero-knowledge watermark detection},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022441},
  doi          = {10.1145/1022431.1022441},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AdelsbachRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/AdelsbachS04,
  author       = {Andr{\'{e}} Adelsbach and
                  J{\"{o}}rg Schwenk},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Key-assignment strategies for {CPPM}},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {107--115},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022451},
  doi          = {10.1145/1022431.1022451},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/AdelsbachS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BeaugetVL04,
  author       = {Sylvain Beauget and
                  Michiel van der Veen and
                  Aweke N. Lemma},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Informed detection of audio watermark for resolving playback speed
                  modifications},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {117--123},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022453},
  doi          = {10.1145/1022431.1022453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BeaugetVL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BohmeW04,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Statistical characterisation of {MP3} encoders for steganalysis},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022437},
  doi          = {10.1145/1022431.1022437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BohmeW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BrachtlUD04,
  author       = {Michael Brachtl and
                  Andreas Uhl and
                  Werner Dietl},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Key-dependency for a wavelet-based blind watermarking algorithm},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {175--179},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022462},
  doi          = {10.1145/1022431.1022462},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BrachtlUD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Delp04,
  author       = {Edward J. Delp},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Multimedia security: the 22nd century approach!},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {116},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022433},
  doi          = {10.1145/1022431.1022433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Delp04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DittmannF04,
  author       = {Jana Dittmann and
                  Jessica J. Fridrich},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Introduction to the {ACM} multimedia and security workshop},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {1--3},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022432},
  doi          = {10.1145/1022431.1022432},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/DittmannF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DoerrDG04,
  author       = {Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Jean{-}Luc Dugelay and
                  Lucas Grang{\'{e}}},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Exploiting self-similarities to defeat digital watermarking systems:
                  a case study on still images},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {133--142},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022455},
  doi          = {10.1145/1022431.1022455},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/DoerrDG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FranzS04,
  author       = {Elke Franz and
                  Antje Schneidewind},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Adaptive steganography based on dithering},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {56--62},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022443},
  doi          = {10.1145/1022431.1022443},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FranzS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FridrichGS04,
  author       = {Jessica J. Fridrich and
                  Miroslav Goljan and
                  David Soukal},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Perturbed quantization steganography with wet paper codes},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {4--15},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022435},
  doi          = {10.1145/1022431.1022435},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FridrichGS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GanicE04,
  author       = {Emir Ganic and
                  Ahmet M. Eskicioglu},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Robust {DWT-SVD} domain image watermarking: embedding data in all
                  frequencies},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {166--174},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022461},
  doi          = {10.1145/1022431.1022461},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GanicE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/GrimmA04,
  author       = {R{\"{u}}diger Grimm and
                  Patrick Aichroth},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Privacy protection for signed media files: a separation-of-duty approach
                  to the lightweight {DRM} {(LWDRM)} system},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {93--99},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022449},
  doi          = {10.1145/1022431.1022449},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/GrimmA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HsuL04,
  author       = {Chao{-}Yong Hsu and
                  Chun{-}Shien Lu},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Geometric distortion-resilient image hashing system and its application
                  scalability},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022448},
  doi          = {10.1145/1022431.1022448},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HsuL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KesalMV04,
  author       = {Mustafa Kesal and
                  Mehmet Kivan{\c{c}} Mih{\c{c}}ak and
                  Ramarathnam Venkatesan},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {An improved attack analysis on a public-key spread spectrum watermarking},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {41--45},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022440},
  doi          = {10.1145/1022431.1022440},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KesalMV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KovalVPDP04,
  author       = {Oleksiy J. Koval and
                  Sviatoslav Voloshynovskiy and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Fr{\'{e}}d{\'{e}}ric Deguillaume and
                  Thierry Pun},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Quantization-based watermarking performance improvement using host
                  statistics: {AWGN} attack case},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {35--39},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022439},
  doi          = {10.1145/1022431.1022439},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KovalVPDP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiuLD04,
  author       = {Zheng Liu and
                  Xue Li and
                  Zhaoyang Dong},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Multimedia authentication with sensor-based watermarking},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {155--159},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022458},
  doi          = {10.1145/1022431.1022458},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiuLD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiuVM04,
  author       = {Tie Liu and
                  Ramarathnam Venkatesan and
                  Mehmet Kivan{\c{c}} Mih{\c{c}}ak},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Scale-invariant image watermarking via optimization algorithms for
                  quantizing randomized statistics},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {124--132},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022454},
  doi          = {10.1145/1022431.1022454},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiuVM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MaretE04,
  author       = {Yannick Maret and
                  Touradj Ebrahimi},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Data hiding on 3D polygonal meshes},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {68--74},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022445},
  doi          = {10.1145/1022431.1022445},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/MaretE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/MegiasHM04,
  author       = {David Meg{\'{\i}}as and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Juli{\`{a}} Minguill{\'{o}}n},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {An audio watermarking scheme robust against stereo attacks},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {206--213},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022467},
  doi          = {10.1145/1022431.1022467},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/MegiasHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/RoueBC04,
  author       = {Benoit Roue and
                  Patrick Bas and
                  Jean{-}Marc Chassery},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Improving {LSB} steganalysis using marginal and joint probabilistic
                  distributions},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022446},
  doi          = {10.1145/1022431.1022446},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/RoueBC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchulzV04,
  author       = {Gerrit Schulz and
                  Michael Voigt},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A high capacity watermarking system for digital maps},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {180--186},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022463},
  doi          = {10.1145/1022431.1022463},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchulzV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SiL04,
  author       = {Huayin Si and
                  Chang{-}Tsun Li},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Fragile watermarking scheme based on the block-wise dependence in
                  the wavelet domain},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {214--219},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022469},
  doi          = {10.1145/1022431.1022469},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SiL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Sidorov04,
  author       = {Maxim Sidorov},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Hidden Markov models and steganalysis},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {63--67},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022444},
  doi          = {10.1145/1022431.1022444},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Sidorov04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SteinebachZC04,
  author       = {Martin Steinebach and
                  Sascha Zmudzinski and
                  Fan Chen},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {The digital watermarking container: secure and efficient embedding},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {199--205},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022466},
  doi          = {10.1145/1022431.1022466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SteinebachZC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/TerzijaG04,
  author       = {Natasa Terzija and
                  Walter Geisselhardt},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Digital image watermarking using complex wavelet transform},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {193--198},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022465},
  doi          = {10.1145/1022431.1022465},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/TerzijaG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/TopkaraTATLD04,
  author       = {Mercan Topkara and
                  Umut Topkara and
                  Mikhail J. Atallah and
                  C{\"{u}}neyt M. Taskiran and
                  Eugene T. Lin and
                  Edward J. Delp},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {A hierarchical protocol for increasing the stealthiness of steganographic
                  methods},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {16--24},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022436},
  doi          = {10.1145/1022431.1022436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/TopkaraTATLD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/UcchedduCB04,
  author       = {Francesca Uccheddu and
                  Massimiliano Corsini and
                  Mauro Barni},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Wavelet-based blind watermarking of 3D models},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {143--154},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022456},
  doi          = {10.1145/1022431.1022456},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/UcchedduCB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/UhlP04,
  author       = {Andreas Uhl and
                  Andreas Pommer},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Are parameterised biorthogonal wavelet filters suited (better) for
                  selective encryption?},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {100--106},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022450},
  doi          = {10.1145/1022431.1022450},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/UhlP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Venturini04,
  author       = {Ilaria Venturini},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Counteracting Oracle attacks},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {187--192},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022464},
  doi          = {10.1145/1022431.1022464},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Venturini04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/VoigtYB04,
  author       = {Michael Voigt and
                  Bian Yang and
                  Christoph Busch},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Reversible watermarking of 2D-vector data},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {160--165},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022459},
  doi          = {10.1145/1022431.1022459},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/VoigtYB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YuanH04,
  author       = {Song Yuan and
                  Sorin A. Huss},
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Audio watermarking algorithm for real-time speech integrity and authentication},
  booktitle    = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  pages        = {220--226},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1022431.1022470},
  doi          = {10.1145/1022431.1022470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/YuanH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2004,
  editor       = {Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Proceedings of the 6th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2004, Magdeburg, Germany, September 20-21, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-854-7},
  timestamp    = {Fri, 26 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ChenC01,
  author       = {Trista Pei{-}Chun Chen and
                  Tsuhan Chen},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {A framework for optimal blind watermark detection},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {11--14},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232460},
  doi          = {10.1145/1232454.1232460},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/ChenC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DittmannS01,
  author       = {Jana Dittmann and
                  Martin Steinebach},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {PlataJanus: an audio annotation watermarking framework},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {44--47},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232471},
  doi          = {10.1145/1232454.1232471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/DittmannS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DittmannWN01,
  author       = {Jana Dittmann and
                  Petra Wohlmacher and
                  Klara Nahrstedt},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Introduction to multimedia and security: protecting the media of the
                  future - securing the future of the media},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232456},
  doi          = {10.1145/1232454.1232456},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/DittmannWN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/FridrichGD01,
  author       = {Jessica J. Fridrich and
                  Miroslav Goljan and
                  Rui Du},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Reliable detection of {LSB} steganography in color and grayscale images},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {27--30},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232466},
  doi          = {10.1145/1232454.1232466},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/FridrichGD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Grimm01,
  author       = {R{\"{u}}diger Grimm},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Security requirements for internet voting},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {56--59},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232475},
  doi          = {10.1145/1232454.1232475},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Grimm01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/HansenHRA01,
  author       = {Klaus Hansen and
                  Christian Hammer and
                  Lars R. Randleff and
                  Jens Damgaard Andersen},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Steganographic capacity of images, based on image equivalence classes},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {36--39},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232468},
  doi          = {10.1145/1232454.1232468},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/HansenHRA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Hollick01,
  author       = {Matthias Hollick},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Security awareness in service discovery for multimedia collaboration},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {60--63},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232476},
  doi          = {10.1145/1232454.1232476},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Hollick01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KangKH01,
  author       = {Hwan Il Kang and
                  Kab Il Kim and
                  Seung{-}Soo Han},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Watermarking techniques using the Drawing Exchange Format {(DXF)}
                  file},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {19--22},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232463},
  doi          = {10.1145/1232454.1232463},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/KangKH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/KoukopoulosS01,
  author       = {Dimitrios Koukopoulos and
                  Yannis C. Stamatiou},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {A compressed-domain watermarking algorithm for mpeg audio layer 3},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {7--10},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232459},
  doi          = {10.1145/1232454.1232459},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/KoukopoulosS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/NickersonCJ01,
  author       = {J. R. Nickerson and
                  S. T. Chow and
                  H. J. Johnson},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Tamper resistant software: extending trust into a hostile environment},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {64--67},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232477},
  doi          = {10.1145/1232454.1232477},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/NickersonCJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/RathaCB01,
  author       = {Nalini K. Ratha and
                  Jonathan H. Connell and
                  Ruud M. Bolle},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Secure fingerprint-based authentication for Lotus Notes{\textregistered}},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {48--51},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232472},
  doi          = {10.1145/1232454.1232472},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/RathaCB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SchwenkMN01,
  author       = {J{\"{o}}rg Schwenk and
                  Tobias Martin and
                  Erik Neumann},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {From pay-tv to pay-streaming: similarities and differences},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {40--43},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232470},
  doi          = {10.1145/1232454.1232470},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SchwenkMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SheppardSO01,
  author       = {Nicholas Paul Sheppard and
                  Reihaneh Safavi{-}Naini and
                  Philip Ogunbona},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {On multiple watermarking},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {3--6},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232458},
  doi          = {10.1145/1232454.1232458},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SheppardSO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SridharLN01,
  author       = {Veena Sridhar and
                  Xiaobo Li and
                  Mario A. Nascimento},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Towards robust hidden watermarking using multiple quasi-circles},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {31--35},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232467},
  doi          = {10.1145/1232454.1232467},
  timestamp    = {Wed, 31 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/SridharLN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/SuhailD01,
  author       = {M. A. Suhail and
                  M. M. Dawoud},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Watermarking security enhancement using filter parametrization in
                  feature domain},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {15--18},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232462},
  doi          = {10.1145/1232454.1232462},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/SuhailD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/TzelepiKP01,
  author       = {Sofia K. Tzelepi and
                  Dimitrios K. Koukopoulos and
                  George Pangalos},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {A flexible content and context-based access control model for multimedia
                  medical image database systems},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {52--55},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232473},
  doi          = {10.1145/1232454.1232473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/TzelepiKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/TzengT01,
  author       = {Chih{-}Hsuan Tzeng and
                  Wen{-}Hsiang Tsai},
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {A new technique for authentication of image/video for multimedia applications},
  booktitle    = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  pages        = {23--26},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/1232454.1232464},
  doi          = {10.1145/1232454.1232464},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmsec/2001,
  editor       = {Nicolas D. Georganas and
                  Radu Popescu{-}Zeletin},
  title        = {Proceedings of the 4th workshop on Multimedia {\&} Security: New
                  Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5,
                  2001},
  publisher    = {{ACM}},
  year         = {2001},
  isbn         = {1-58113-393-6},
  timestamp    = {Fri, 26 Oct 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics