Program

 

Tentative Workshop Program

program

Monday June 20, 2016

9:00 – 10:15 Registration
9:45 – 10:00 Welcome Talk
Session: Forensics, Fingerprinting and Reversible Watermarking
Chair: TBD
10:00 – 10:30 A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
Author(s): Belhassen Bayar and Matthew C. Stamm
10:30 – 11:00 Coffee Break
11:00 – 11:30 Forensics of High Quality and Nearly Identical JPEG Image Recompression
Author(s): Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, and Fernando Pérez-González
11:30 – 12:00 A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack
Author(s): Hiroki Koga and Kaoru Itabashi
12:00 – 12:30 Efficient HS Based Reversible Data Hiding Using Multi-Feature Complexity Measure and Optimized Histogram
Author(s): Junxiang Wang, Jiangqun Ni, and Xing Zhang
12:30 – 13:00 A Novel CDMA Based High Performance Reversible Data Hiding Scheme
Author(s): Bin Ma, Yun Shi, and Jinwei Wang
13:00 – 14:30 Lunch
Session: Privacy
Chair: TBD
14:30 – 15:00 Dynamic Privacy-Preserving Genomic Susceptibility Testing
Author(s): Mina Namazi, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González
15:00 – 15:30 Group Testing for Nearest Neighbor Search with Privacy
Author(s): Ahmet Iscen and Teddy Furon
15:30 – 16:00 Differentially Private Matrix Factorization Using Sketching Techniques
Author(s): Raghavendran Balu and Teddy Furon
16:00 – 16:30 Coffee Break
16:30 – 17:00 Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)
Author(s): Jia Duan, Jiantao Zhou, and Yuanman Li
17:00 – 17:30 Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Author(s): Hung Dang, Yun Long Chong, Francois Brun, and Ee-Chien Chang
17:30 – 18:30 Ongoing Works

 

Tuesday June 21, 2016

9:30 – 10:30 Plenary I – Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Author: Battista Biggio
10:30 – 11:00 Coffee Break
Session: Steganography and Steganalysis I
Chair: TBD
11:00 – 11:30 Provable Secure Universal Steganography of Optimal Rate
Author(s): Sebastian Berndt and Maciej Liskiewicz
11:30 – 12:00 Rethinking Optimal Embedding
Author(s): Andrew D. Ker, Tomas Pevny, and Patrick Bas
12:00 – 12:30 Ensemble of CNNs for Steganalysis: An Empirical Study
Author(s): Guanshuo Xu, Hanzhou Wu, and Yun-Qing Shi
12:30 – 13:00 Color Image Steganalysis Based on Steerable Gaussian Filters Bank
Author(s): Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, and Baptiste Magnier
13:00 – 14:30 Lunch
14:30 – Social Event

 

Wednesday June 22, 2016

9:30 – 10:30 Plenary II – Bringing Multimedia Security from the Research Lab to the Forensic Lab
Author: Martino Jerian
10:30 – 11:00 Coffee Break
Session: Steganography and Steganalysis II
Chair: TBD
11:00 – 11:30 Covert Channels Revisited — A Survey
Author(s): Brent Carrara and Carlisle Adams
11:30 – 12:00 A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution
Author(s): Peipei Wang, Hong Zhang, Yun Cao, and Xianfeng Zhao
12:00 – 12:30 Constructing Near-Optimal Double-Layered Syndrome-Trellis Codes for Spatial Steganography
Author(s): Zengzhen Zhao, Qingxiao Guan, and Xianfeng Zhao
12:30 – 13:00 Boosting Steganalysis with Explicit Feature Maps
Author(s): Mehdi Boroumand and Jessica Fridrich
13:00 – 14:30 Lunch
Session: Information Hiding and Cryptography
Chair: TBD
14:30 – 15:00 Information Hiding in the RSA Modulus
Author(s): Stefan Wueller, Marian Kuehnel, and Ulrike Meyer
15:00 – 15:30 Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye
Author(s): Jong-Uk Hou, Dongkyu Kim, Hyun-Ji Song, and Heung-Kyu Lee
15:30 – 16:00 Image Segmentation Based Visual Security Evaluation
Author(s): Christof Kauba, Stefan Mayer, and Andreas Uhl
16:00 – 16:30 Coffee Break
16:30 – 17:30 Rump Session