Program

This is the final program for IH&MMSec 2016

IH&MMSec'16 Program at a glance

The full program in PDF can be downloaded here.

Monday June 20, 2016

9:00 – 11:00 Registration
9:45 – 10:00 Welcome Talk
Session: Forensics, Fingerprinting and Reversible Watermarking
Chair: François Cayre
10:00 – 10:30 A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer
Author(s): Belhassen Bayar and Matthew C. Stamm
10:30 – 11:00 Coffee Break
11:00 – 11:30 Forensics of High Quality and Nearly Identical JPEG Image Recompression
Author(s): Cecilia Pasquini, Pascal Schöttle, Rainer Böhme, Giulia Boato, and Fernando Pérez-González
11:30 – 12:00 A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack
Author(s): Hiroki Koga and Kaoru Itabashi
12:00 – 12:30 Efficient HS Based Reversible Data Hiding Using Multi-Feature Complexity Measure and Optimized Histogram
Author(s): Junxiang Wang, Jiangqun Ni, and Xing Zhang
12:30 – 13:00 A Novel CDMA Based High Performance Reversible Data Hiding Scheme
Author(s): Bin Ma, Yun Shi, and Jinwei Wang
13:00 – 14:30 Lunch
Session: Privacy
Chair: Juan Ramón Troncoso-Pastoriza
14:30 – 15:00 Dynamic Privacy-Preserving Genomic Susceptibility Testing
Author(s): Mina Namazi, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González
15:00 – 15:30 Group Testing for Identification with Privacy
Author(s): Ahmet Iscen and Teddy Furon
15:30 – 16:00 Differentially Private Matrix Factorization Using Sketching Techniques
Author(s): Raghavendran Balu and Teddy Furon
16:00 – 16:30 Coffee Break
16:30 – 17:00 Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)
Author(s): Jia Duan, Jiantao Zhou, and Yuanman Li
17:00 – 17:30 Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Author(s): Hung Dang, Yun Long Chong, Francois Brun, and Ee-Chien Chang
17:30 – 18:30 Ongoing Work Session
Chair: Pedro Comesaña-Alfaro
19:30 – 22:00 Welcome Reception

Tuesday June 21, 2016

9:30 – 10:30 Plenary I – Machine Learning under Attack: Vulnerability Exploitation and Security Measures
Author: Battista Biggio
Chair: Patrick Bas
10:30 – 11:00 Coffee Break
Session: Steganography and Steganalysis I
Chair: Jessica Fridrich
11:00 – 11:30 Provable Secure Universal Steganography of Optimal Rate
Author(s): Sebastian Berndt and Maciej Liskiewicz
11:30 – 12:00 Rethinking Optimal Embedding
Author(s): Andrew D. Ker, Tomas Pevny, and Patrick Bas
12:00 – 12:30 Ensemble of CNNs for Steganalysis: An Empirical Study
Author(s): Guanshuo Xu, Hanzhou Wu, and Yun-Qing Shi
12:30 – 13:00 Color Image Steganalysis Based on Steerable Gaussian Filters Bank
Author(s): Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, and Baptiste Magnier
13:00 – 14:30 Lunch
14:30 – 20:00 Social Event
20:00 – Banquet

Wednesday June 22, 2016

9:30 – 10:30 Plenary II – Bringing Multimedia Security from the Research Lab to the Forensic Lab
Author: Martino Jerian
Chair: Fernando Pérez-González
10:30 – 11:00 Coffee Break
Session: Steganography and Steganalysis II
Chair: Jiwu Huang
11:00 – 11:30 A Survey and Taxonomy aimed at the Detection and Measurement of Covert Channels
Author(s): Brent Carrara and Carlisle Adams
11:30 – 12:00 A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution
Author(s): Peipei Wang, Hong Zhang, Yun Cao, and Xianfeng Zhao
12:00 – 12:30 Constructing Near-Optimal Double-Layered Syndrome-Trellis Codes for Spatial Steganography
Author(s): Zengzhen Zhao, Qingxiao Guan, and Xianfeng Zhao
12:30 – 13:00 Boosting Steganalysis with Explicit Feature Maps
Author(s): Mehdi Boroumand and Jessica Fridrich
13:00 – 14:30 Lunch
Session: Information Hiding and Cryptography
Chairs: Teddy Furon and Tanya Ignatenko
14:30 – 15:00 Information Hiding in the RSA Modulus
Author(s): Stefan Wueller, Marian Kuehnel, and Ulrike Meyer
15:00 – 15:30 Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye
Author(s): Jong-Uk Hou, Dongkyu Kim, Hyun-Ji Song, and Heung-Kyu Lee
15:30 – 16:00 Image Segmentation Based Visual Security Evaluation
Author(s): Christof Kauba, Stefan Mayer, and Andreas Uhl
16:00 – 16:30 Coffee Break
16:30 – 17:30 Rump Session
Chair: Tomas Pevny
17:30 Farewell