Workshop Programme
Wednesday, August 23rd, 2017
12:00-12:30 Welcome
12:30-13:30 Keynote I – Prof. Anthony T.S. Ho (University of Surrey, UK) – “Applications of Natural Laws for Multimedia Security and Forensics”
13:30-14:00 Coffee break
14:00-15:40 Session Forensics I
14:00-14:20 Qianyi Xu, Tanfeng Sun, Xinghao Jiang and Yi Dong “HEVC Double Compression Detection Based on SN-PUPM Feature”
14:20-14:40 Michael Kalbitz, Tobias Scheidat, Benjamin Yüksel, Claus Vielhauer “Towards automated forensic pen ink verification by spectral analysis”
14:40-15:00 Pengpeng Yang, Ruihan Li, Rongrong Ni, Yao Zhao “Recaptured Image Forensics Based On Quality Aware and Histogram Feature”
15:00-15:20 Tekachew Gobena Ejeta, Hyoung Joong Kim “Website Fingerprinting Attack on Psiphon and Its Forensic Analysis”
15:20-15:40 Discussion
15:40-16:00 Coffee break
16:00-17:00 Special Session: “Emerging threats of Criminal Use of Information Hiding: Usage Scenarios and Detection Approaches” organised by the Criminal Use of Information Hiding (CUIng) initiative
16:00-16:20 Iman Sedeeq, Frans Coenen, Alexei Lisitsa “A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages”
16:20-16:40 Daniel Spiekermann, Jörg Keller, Tobias Eggendorfer “Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks”
16:40-17:00 Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, Yun-Qing Shi “Steganalysis Based on Awareness of Selection-Channel and Deep Learning”
18:30+ Conference Dinner
Thursday, August 24th, 2017
09:30-10:30 Special Session: “Biometric image tampering detection” - Introduction Talk - Andreas Wolf “Media Forensics and Trustworthiness of Biometric Images - An Industry Perspective”
10:30-11:00 Coffee break
11:00-12:20 Special Session "Biometric image tampering detection"
11:00-11:20 Tom Neubert “Face Morphing Detection: An Approach based on Image Degradation Analysis”
11:20-11:40 Clemens Seibold, Wojciech Samek, Anna Hilsmann, Peter Eisert “Detection of Face Morphing Attacks by Deep Learning”
11:40-12:00 Lukasz Wandzik, Raul Vicente Garcia, Gerald Kaeding, Xi Chen “CNNs under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing”
12:00-12:20 Aras Asaad, Sabah Jassim “Topological Data Analysis for Image Tampering Detection”
12:30-13:30 Lunch break
13:30-15:00 Session Other Topics I
13:30-13:50 Peng Li, Zuquan Liu “A novel visual cryptography scheme with different importance of shadows”
13:50-14:10 Xudie Ren, Haonan Guo, Shenghong Li, Shilin Wang and Jianhua Li “A Novel Image Classification Method with CNN-XGBoost Model”
14:10-14:30 Akira Nishimura “Improvement and evaluation of time-spread echo hiding technology for long-distance voice evacuation systems”
14:30-14.50 Wen Wang, Feng Liu, Teng Guo, Yawei Ren “Temporal Integration Based Visual Cryptography Scheme and Its Application”
15:00-15:20 Coffee break
15:20-16:00 Session Steganography and Steganalysis I
15:20-15:40 Yi Dong, Xinghao Jiang,Tanfeng Sun, Dawen Xu “Coding Efficiency Preserving Steganography based on HEVC Steganographic Channel Model”
15:40-16:00 Yu Wang, Yun Cao, Xianfeng Zhao, Linna Zhou “A Prediction Mode-based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization”
Friday, August 25th, 2017
09:30-10:30 Session Forensics II
09:30-09:50 Venkata Udaya Sameer, Ruchira Naskar, Nikhita Musthyala, Kalyan Kokkalla “Deep Learning based Counter-Forensic Image Classification for Camera Model Identification”
9:50-10:10 Jianghong Zhou, Jiangqun Ni, Yuan Rao “Block-based Convolutional Neural Network for Image Forgery Detection”
10:10-10:30 Jingyu Ye, Yun-Qing Shi “A Hybrid Feature Model for Seam Carving Detection”
10:30-11:00 Coffee break
11:00-12:20 Session Steganography and Steganalysis II
11:00-11:20 Weiqi Luo, Yue Zhang, Haodong Li “Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding”
11:20-11:40 Weike You, Yun Cao, Xianfeng Zhao “Information Hiding Using CAVLC: Misconceptions and a Detection Strategy”
11:40-12:00 Kun Yang, Xiaowei Yi, Xianfeng Zhao and Linna Zhou “Adaptive MP3 Steganography Using Equal Length Entropy Codes Substitution”
12:00-12:20 Yanzhen Ren, Qiaochu Xiong, Lina Wang “A Steganalysis Scheme for AAC audio based on MDCT Difference between Intra and Inter Frame”
12:30-13:30 Lunch break
13:30-14:30 Session Watermarking I
13:30-13:50 Bingwen Feng, Jian Wenig, Wei Lu “Improved Algorithms for Robust Histogram Shape-Based Image Watermarking”
13:50-14:10 Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi “Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement”
14:10-14:30 Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo “Improved reversible visible watermarking based on adaptive block partition”
14:30-15:00 Coffee break
15:00-16:00 Session Watermarking II
15:00-15:20 Chenchen Cui, Rongrong Ni, Yao Zhao “Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants”
15:20-15:40 Olaf Markus Köhler, Cecilia Pasquini and Rainer Böhme “On the Statistical Properties of Syndrome Trellis Coding”
15:40-16:00 Masaaki Fujiyoshi, Hitoshi Kiya “A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram”
16:00-16:15 Goodbye