Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3206004acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
IH&MMSec '18: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IH&MMSec '18: 6th ACM Workshop on Information Hiding and Multimedia Security Innsbruck Austria June 20 - 22, 2018
ISBN:
978-1-4503-5625-1
Published:
14 June 2018
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

We cordially welcome you to the 6th ACM Information Hiding and Multimedia Security Workshop - IH&MMSec'18 - in Innsbruck, Austria. For more than 20 years, the workshop (and its predecessors) has attracted researchers from all over the world, whose efforts brought tremendous advances to the fields of Information Hiding and Multimedia Security.

This year, our call for papers has attracted a total of 40 submissions, both short and full papers, contributed by authors from North America, Europe, Asia, and Africa. Each paper has received at least three independent and double-blind reviews from members of the Technical Program Committee. On this basis, and incorporating the outcome of a paper discussion phase, the Program Chairs have selected the 18 most promising submissions for presentation and publication. The acceptance rate for full papers was 37.5%.

We use this opportunity to thank all the submitting authors and all reviewers for their high quality contributions and help, which has resulted in a strong technical program. The accepted papers cover the fields of steganography and steganalysis, forensics, biometrics, anonymity, and cryptography. We expect them to be of wide interest to researchers working both in academia and industry.

The technical program also features two invited keynote speakers. It is an honour to have as first keynote speaker professor Ross Anderson from Cambridge University, England. Ross is an influential thought leader who hosted the first Information Hiding workshop in 1996, and co-authored one of the most cited surveys on the area. In his keynote, he will present examples and concepts of covert and deniable communications. The second keynote is given by professor Luisa Verdoliva from the University Federico II of Naples, Italy, undoubtedly a "rising star" in our community. She will talk about the exciting discussion and share new insights on the role of deep learning in multimedia forensics.

As for the previous editions, the workshop is structured in three days. The afternoon of the second day is devoted to a social event, designed to foster discussions and help establishing new collaborative research relationships among participants, while enjoying the breathtaking views from the Nordkette mountain range. Moreover, at the end of the first day we have reserved time for a rump session: all participants are invited to discuss their ongoing work, unpublished results, new product demos in five-minute presentations.

We thank the University of Innsbruck, specifically its Department of Computer Science, for hosting and supporting the event. Great thanks belong to Manuela Resch, Birgit Juen and all student volunteers for their invaluable help with the local organization of the event. Further thanks are due to professor Jana Dittmann for the liaison with the ACM and her team at the University of Magdeburg for hosting the conference website. Lastly, we gratefully thank the Steering Committee for entrusting us with this edition of the workshop.

Skip Table Of Content Section
SESSION: Keynote 1
keynote
Covert and Deniable Communications

At the first Information Hiding Workshop in 1996 we tried to clarify the models and assumptions behind information hiding. We agreed the terminology of cover text and stego text against a background of the game proposed by our keynote speaker Gus ...

SESSION: Keynote 2
keynote
Public Access
Deep Learning in Multimedia Forensics

With the widespread diffusion of powerful media editing tools, falsifying images and videos has become easier and easier in the last few years. Fake multimedia, often used to support fake news, represents a growing menace in many fields of life, notably ...

SESSION: JPEG & H.264 Steganography
research-article
Best Student Paper
Best Student Paper
Defining Joint Distortion for JPEG Steganography

Recent studies have shown that the non-additive distortion model of Decomposing Joint Distortion ($DeJoin$) can work well for spatial image steganography by defining joint distortion with the principle of Synchronizing Modification Directions (SMD). ...

short-paper
Facing the Cover-Source Mismatch on JPHide using Training-Set Design

This short paper investigates the influence of the image processing pipeline (IPP) on the cover-source mismatch (CSM) for the popular JPHide steganographic scheme. We propose to deal with CSM by combining a forensics and a steganalysis approach. A multi-...

research-article
Cover Block Decoupling for Content-Adaptive H.264 Steganography

This paper makes the first attempt to achieve content-adaptive H.264 steganography with the quantised discrete cosine transform (QDCT) coefficients in intra-frames. Currently, state-of-the-art JPEG steganographic schemes embed their payload while ...

SESSION: Biometrics and Forensics
research-article
Open Access
Do EEG-Biometric Templates Threaten User Privacy?

The electroencephalogram (EEG) was introduced as a method for the generation of biometric templates. So far, most research focused on the optimisation of the enrolment and authentication, and it was claimed that the EEG has many advantages. However, it ...

short-paper
Fake Faces Identification via Convolutional Neural Network

Generative Adversarial Network (GAN) is a prominent generative model that are widely used in various applications. Recent studies have indicated that it is possible to obtain fake face images with a high visual quality based on this novel model. If ...

short-paper
Generalized Benford's Law for Blind Detection of Morphed Face Images

A morphed face image in a photo ID is a serious threat to image-based user verification enabling that multiple persons could be matched with the same document. The application of machine-readable travel documents (MRTD) at automated border control (ABC) ...

SESSION: Deep Learning for Steganography
research-article
Best Paper
Best Paper
CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain

This paper presents an effective steganalytic scheme based on CNN for detecting MP3 steganography in the entropy code domain. These steganographic methods hide secret messages into the compressed audio stream through Huffman code substitution, which ...

short-paper
Adversarial Examples Against Deep Neural Network based Steganalysis

Deep neural network based steganalysis has developed rapidly in recent years, which poses a challenge to the security of steganography. However, there is no steganography method that can effectively resist the neural networks for steganalysis at ...

SESSION: CNN-based Media Forensics
short-paper
Identification of Audio Processing Operations Based on Convolutional Neural Network

To reduce the tampering artifacts and/or enhance audio quality, some audio processing operations are often applied in the resulting tampered audio. Like image forensics, the detection of various post processing operations has become very important for ...

short-paper
Public Access
Learning Unified Deep-Features for Multiple Forensic Tasks

Recently, deep learning researchers have developed a technique known as deep features in which feature extractors for a task are learned by a CNN. These features are then provided to another classifier, or even used to perform a different classification ...

short-paper
Image Forgery Localization based on Multi-Scale Convolutional Neural Networks

In this paper, we propose to utilize Convolutional Neural Networks (CNNs) and the segmentation-based multi-scale analysis to locate tampered areas in digital images. First, to deal with color input sliding windows of different scales, we adopt a unified ...

short-paper
Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks

Multiple-purpose forensics has been attracting increasing attention worldwide. However, most of the existing methods based on hand-crafted features often require domain knowledge and expensive human labour and their performances can be affected by ...

SESSION: Embedding Impact in Steganography
research-article
Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC

This paper proposes an effective intra-frame prediction mode (IPM)-based video steganography in HEVC to maintain rate-distortion optimization as well as improve empirical security. The unique aspect of this work and one that distinguishes it from prior ...

short-paper
Exploring Non-Additive Distortion in Steganography

Leading steganography systems make use of the Syndrome-Trellis Code (STC) algorithm to minimize a distortion function while encoding the desired payload, but this constrains the distortion function to be additive. The Gibbs Embedding algorithm works for ...

short-paper
On the Relationship Between Embedding Costs and Steganographic Capacity

Contemporary steganography in digital media is dominated by the framework of additive distortion minimization: every possible change is given a cost, and the embedder minimizes total cost using some variant of the Syndrome-Trellis Code algorithm. One ...

SESSION: Encryption, Authentication, Anonymization
short-paper
Real or Fake: Mobile Device Drug Packaging Authentication

Shortly, within the member states of the European Union a serialization-based anti-counterfeiting system for pharmaceutical products will be introduced. This system requires a third party enabling to track serialized and enrolled instances of each ...

research-article
Forensic Analysis and Anonymisation of Printed Documents

Contrary to popular belief, the paperless office has not yet established itself. Printer forensics is therefore still an important field today to protect the reliability of printed documents or to track criminals. An important task of this is to ...

short-paper
Open Access
Applicability of No-Reference Visual Quality Indices for Visual Security Assessment

From literature it is known that full-reference visual quality indices are a poor fit for the estimation of visual security for selective encryption. The question remains whether no-reference visual quality indices can perform where full reference ...

Contributors
  • University of Innsbruck
  • University of Trento
  • University of Trento
  • MCI - The Entrepreneurial School
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

IH&MMSec '18 Paper Acceptance Rate18of40submissions,45%Overall Acceptance Rate128of318submissions,40%
YearSubmittedAcceptedRate
IH&MMSec '18401845%
IH&MMSec '17341853%
IH&MMSec '16612134%
IH&MMSec '15452044%
IH&MMSec '14642438%
IH&MMSec '13742736%
Overall31812840%