Workshop Programme

Wednesday, August 23rd, 2017


12:00-12:30    Welcome     


12:30-13:30    Keynote I – Prof. Anthony T.S. Ho (University of Surrey, UK) – “Applications of Natural Laws for Multimedia Security and Forensics

13:30-14:00    Coffee break   

           
14:00-15:40    Session Forensics I  

 
14:00-14:20    Qianyi Xu, Tanfeng Sun, Xinghao Jiang and Yi Dong “HEVC Double Compression Detection Based on SN-PUPM Feature”
14:20-14:40    Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer “Towards automated forensic pen ink verification by spectral analysis”
14:40-15:00    Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao “Recaptured Image Forensics Based On Quality Aware and Histogram Feature”
15:00-15:20    Tekachew Gobena Ejeta, Hyoung Joong Kim “Website Fingerprinting Attack on Psiphon and Its Forensic Analysis”
15:20-15:40    Discussion



15:40-16:00    Coffee break    


            
16:00-17:00    Special Session: “Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches” organised by the Criminal Use of Information Hiding (CUIng) initiative    


16:00-16:20    Iman Sedeeq, Frans Coenen, Alexei Lisitsa “A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages”
16:20-16:40    Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer “Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks”
16:40-17:00    Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, Yun-Qing Shi “Steganalysis Based on Awareness of Selection-Channel and Deep Learning”


                    
18:30+    Conference Dinner   


 


 


Thursday, August 24th, 2017


09:30-10:30    Special Session: “Biometric image tampering detection” - Introduction Talk - Andreas Wolf “Media Forensics and Trustworthiness of Biometric Images - An Industry Perspective”


10:30-11:00    Coffee break    

         
11:00-12:20    Special Session "Biometric image tampering detection"  

 
11:00-11:20    Tom Neubert “Face Morphing Detection: An Approach based on Image Degradation Analysis”
11:20-11:40    Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert “Detection of Face Morphing Attacks by Deep Learning”
11:40-12:00    Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen “CNNs under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing”
12:00-12:20    Aras Asaad, Sabah Jassim “Topological Data Analysis for Image Tampering Detection”


12:30-13:30    Lunch break    

          
13:30-15:00    Session Other Topics I    


13:30-13:50    Peng Li, Zuquan Liu “A novel visual cryptography scheme with different importance of shadows”
13:50-14:10    Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang and Jianhua Li “A Novel Image Classification Method with CNN-XGBoost Model”
14:10-14:30    Akira Nishimura “Improvement and evaluation of time-spread echo hiding technology for long-distance voice evacuation systems”
14:30-14.50    Wen Wang, Feng Liu, Teng Guo, Yawei Ren “Temporal Integration Based Visual Cryptography Scheme and Its Application”


15:00-15:20    Coffee break    

          
15:20-16:00    Session Steganography and Steganalysis I  


15:20-15:40    Yi Dong, Xinghao Jiang,Tanfeng Sun, Dawen Xu “Coding Efficiency Preserving Steganography based on HEVC Steganographic Channel Model”
15:40-16:00    Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou “A Prediction Mode-based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization”

 


 


Friday, August 25th, 2017


09:30-10:30    Session Forensics II  

 
09:30-09:50    Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla “Deep Learning based Counter-Forensic Image Classification for Camera Model Identification”
9:50-10:10    Jianghong Zhou, Jiangqun Ni, Yuan Rao “Block-based Convolutional Neural Network for Image Forgery Detection”
10:10-10:30    Jingyu Ye, Yun-Qing Shi “A Hybrid Feature Model for Seam Carving Detection”


10:30-11:00    Coffee break    

           
11:00-12:20    Session Steganography and Steganalysis II  

 
11:00-11:20    Weiqi Luo, Yue Zhang, Haodong Li “Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding”
11:20-11:40    Weike You, Yun Cao, Xianfeng Zhao “Information Hiding Using CAVLC: Misconceptions and a Detection Strategy”
11:40-12:00    Kun Yang, Xiaowei Yi, Xianfeng Zhao and Linna Zhou “Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution”
12:00-12:20    Yanzhen Ren, Qiaochu Xiong, Lina Wang “A Steganalysis Scheme for AAC audio based on MDCT Difference between Intra and Inter Frame”


12:30-13:30    Lunch break         

      
13:30-14:30    Session Watermarking I

    
13:30-13:50    Bingwen Feng, Jian Wenig, Wei Lu “Improved Algorithms for Robust Histogram Shape-Based Image Watermarking”
13:50-14:10    Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi “Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement”
14:10-14:30    Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo “Improved reversible visible watermarking based on adaptive block partition”


14:30-15:00    Coffee break  

       
15:00-16:00    Session Watermarking II


15:00-15:20    Chenchen Cui, Rongrong Ni, Yao Zhao Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants
15:20-15:40    Olaf Markus Köhler, Cecilia Pasquini and Rainer Böhme On the Statistical Properties of Syndrome Trellis Coding
15:40-16:00    Masaaki Fujiyoshi, Hitoshi Kiya A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram 


16:00-16:15    Goodbye