Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2361407acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
MM&Sec '12: Proceedings of the on Multimedia and security
ACM2012 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MM&Sec '12: Multimedia and Security Workshop Coventry United Kingdom September 6 - 7, 2012
ISBN:
978-1-4503-1417-6
Published:
06 September 2012
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2012 ACM Workshop on Multimedia and Security -- MM&Sec'12. This year's workshop continues its tradition of being the premier forum for presentation of research results on leading edge issues of multimedia security such as data protection, multimedia forensics, hidden communications and biometrics, as well as topics in privacy, policy and legal issues in relation to multimedia security and forensics in real world applications. We expect the workshop to facilitate cross-fertilization of ideas among key stakeholders from academia, industry, practitioners and government agencies around the globe.

The call for papers attracted 48 submissions from countries around the world. The program committee accepted 23 papers that cover a wide variety of topics mentioned above. In addition, the program includes a keynote speech, Dr Emilio Mordini on Privacy and Ethics Issues Surrounding Biometrics. We hope that these proceedings will serve as a valuable reference for security researchers and developers.

Skip Table Of Content Section
SESSION: Data hiding
research-article
Batch steganography in the real world

We examine the universal pooled steganalyzer of in two respects. First, we confirm that the method is applicable to a number of different steganographic embedding methods. Second, we consider the converse problem of how to spread payload between ...

research-article
Steganalysis with mismatched covers: do simple classifiers help?

Modern steganalysis can be incredibly sensitive and accurate, but only in an artificial setting in which the training data is from the exact same image source as the data being tested. When faced with mismatched training data, performance degrades, ...

research-article
Frame-accurate temporal registration for non-blind video watermarking

Non-blind watermark detection is still relevant in some applications e.g. traitor tracing. In this case, the auxiliary metadata sent to the detector reveals something about the original content. In this paper, we investigate whether such side-...

research-article
Performance and code length optimization of joint decoding tardos fingerprinting

To trace back copyright infringements, digital transaction watermarking today is a widely accepted method. Here, copies of a single work are individualized by embedding userspecific watermark messages. However, transaction watermarking is vulnerable to ...

SESSION: Pattern recognition and security for crime scene forensics traces: from latent fingerprints up material and technica
research-article
Embedding cylinder quality measures into minutia cylinder-code based latent fingerprint matching

One of the major problems concerning latent fingerprint matching in forensic applications is the poor quality of fingerprint data. Therefore, local quality assessment of fingerprint images is necessary to ensure high biometric performance in this ...

research-article
On using flat bed scanners for the age determination of latent fingerprints: first results for the binary pixel feature

Determining the age of latent fingerprints found at crime scenes is a very pressing, yet so far unresolved challenge in forensics. Recently, a first aging feature called binary pixel has been introduced, based on the loss of image contrast of ...

research-article
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy

Lockpicking forensics is currently a completely manual process, which requires a lot of skill as well as training and is therefore time-consuming as well as expensive. In this paper we make a first move to transfer the most crucial part of this specific ...

research-article
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope

One main goal of today's forensic textile fiber analysis is the classification of fiber traces. This can be achieved by forensic experts in manual analysis with the help of microscopy. However, this examination process, including an optical matching, is ...

research-article
Forensic ballistic analysis using a 3D sensor device

The application of non-invasive optical 3D sensing technology for the acquisition of toolmarks and forensic traces from projectiles and cartridges is currently an emerging field of research. In this work we will present a first taxonomy of possible ...

SESSION: Security applications
research-article
Privacy-preserving content-based recommender system

By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or ...

research-article
Length-preserving bit-stream-based JPEG encryption

We propose a new method to encrypt baseline JPEG bit streams by selective Huffman code word swapping and coefficient value scrambling based on AES encryption. Furthermore, we show that our approach preserves the length of the bit stream while being ...

research-article
Automatic telephone handset identification by sparse representation of random spectral features

Speech signals convey information not only for speakers' identity and the spoken language, but also for the acquisition devices used during their recording. Therefore, it is reasonable to perform acquisition device identification by analyzing the ...

SESSION: Forensic challenges
research-article
A universal technique to hide traces of histogram-based image manipulations

We propose a universal counter-forensic technique for concealing traces left on the image histogram by any processing tool. Under the assumption that the forensic analysis relies on first-order statistics only (which is true in many practical ...

research-article
Recognizing pornographic images

We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions in order to capture alarming Regions ...

research-article
Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study

Although sensor noise is generally known as a very reliable means to uniquely identify digital cameras, care has to be taken with respect to camera model characteristics that may cause false accusations. While earlier reports focused on so-called linear ...

SESSION: Biometrics & security
research-article
A methodological framework for investigating age factors on the performance of biometric systems

Any individual's biometric data are likely to change with the passage of time and, as a result, developing biometric applications for long-term use is a challenging task. One of the factors which increases the challenge of dealing with ageing effects in ...

research-article
Enhancing face recognition at a distance using super resolution

The characteristics of surveillance video generally include low-resolution images and blurred images. Decreases in image resolution lead to loss of high frequency facial components, which is expected to adversely affect recognition rates. Super ...

research-article
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions

Exemplar fingerprints captured directly from a finger are used in biometric systems for authentication purposes. If the quality of the captured image is insufficient for extracting biometric features, it can be easily captured again. In forensics latent ...

research-article
An adaptive system for gait recognition in multi-view environments

Gait recognition systems often suffer from the challenges when query gaits are under the coupled effects of unknown view angles and large intra-class variations (e.g., wearing a coat). In this paper, we deem it as a two-stage classification problem, ...

research-article
Frontal gait recognition combining 2D and 3D data

Automatic human recognition systems based on biometrics are becoming increasingly popular in today's world. In particular, gait recognition (i.e., recognition based on the peculiar manner of walking) is especially interesting since it allows the ...

research-article
Appearance-based people recognition by local dissimilarity representations

Among the possible applications of computer vision to video-surveillance, person re-identification over a network of camera sensors, using cues related to clothing appearance, is gaining much interest. Re-identification techniques can be used for ...

research-article
Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms

The aim of fingerprint liveness detection is to detect if a fingerprint image, sensed by an electronic device, belongs to an alive fingertip or to an artificial replica of it. It is well-known that a fingerprint can be replicated and standard electronic ...

research-article
Privacy preserving ECG quality evaluation

Remote health-care applications are gaining popularity as an alternative for patients who do not require hospitalization. In this setting, privacy preserving protocols are useful to enable the offering of personalized online services, thus preventing ...

Contributors
  • Otto von Guericke University Magdeburg
  • University of Passau
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate128of318submissions,40%
YearSubmittedAcceptedRate
IH&MMSec '18401845%
IH&MMSec '17341853%
IH&MMSec '16612134%
IH&MMSec '15452044%
IH&MMSec '14642438%
IH&MMSec '13742736%
Overall31812840%