Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2909827acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
IH&MMSec '16: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
ACM2016 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop Vigo Galicia Spain June 20 - 22, 2016
ISBN:
978-1-4503-4290-2
Published:
20 June 2016
Sponsors:

Reflects downloads up to 26 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 4th ACM Information Hiding and Multimedia Security Workshop -- IH&MMSec'16 in Vigo, Spain. Vigo and its University are home to one of the pioneering research groups in Information Hiding and Multimedia Security that has been active in this area for the past 20 years. Over those years, the field has grown into maturity thanks to the efforts of many researchers, scientists and practitioners all over the world.

In response to our call for papers, we received in total 61 submissions. The 5 countries with the highest numbers of submissions were China, USA, France, India and Germany. Except for 3 papers which were withdrawn before the double-blind review process ended, the remaining 58 submissions received at least 3 independent reviews each. These reviews were provided by the Program Committee members, assisted in some cases by external reviewers. Based on these timely and high-quality reviews, the Technical Program Chairs selected the 21 best submissions. The low acceptance rate of 36.2% (21/58) reflects our intention to maintain IH&MMSec as a premier scientific venue in the field of Information Hiding and Multimedia Security. The accepted papers cover the fields of steganography and steganalysis, forensics, fingerprinting, reversible watermarking, privacy, information hiding and cryptography.

We sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions.

The technical program also includes two invited keynote speakers. The first presentation is given by Dr. Battista Biggio, from University of Cagliari, on the exciting topic of adversarial machine learning. The second presentation is about the fascinating work that Mr. Martino Jerian, CEO and founder of Amped Software, is doing in transplanting the results in media forensics from academia to the market.

As usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants, and, of course, enjoy the paradisiac Cíes Islands. This year IH&MMSec also features an "ongoing" session, where authors have been invited to present their latest, unfinished work to receive feedback from their peers. The summaries of these presentations have been also included in these proceedings.

Skip Table Of Content Section
SESSION: Keynote 1
invited-talk
Machine Learning under Attack: Vulnerability Exploitation and Security Measures

Learning to discriminate between secure and hostile patterns is a crucial problem for species to survive in nature. Mimetism and camouflage are well-known examples of evolving weapons and defenses in the arms race between predators and preys. It is thus ...

SESSION: Keynote 2
invited-talk
Bringing Multimedia Security from the Research Lab to the Forensic Lab

The work done by researchers in the field, on multimedia security, is laying the foundations for increasing the capabilities of the community of forensic practitioners. However, very often there is a big gap between what is studied at the research level ...

SESSION: Forensics, Fingerprinting and Reversible Watermarking
short-paper
A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer

When creating a forgery, a forger can modify an image using many different image editing operations. Since a forensic examiner must test for each of these, significant interest has arisen in the development of universal forensic algorithms capable of ...

research-article
Forensics of High Quality and Nearly Identical JPEG Image Recompression

We address the known problem of detecting a previous compression in JPEG images, focusing on the challenging case of high and very high quality factors (>= 90) as well as repeated compression with identical or nearly identical quality factors. We first ...

short-paper
A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack

Digital fingerprinting codes are embedded to licenced digital contents for preventing illegal distribution by colluders. Digital fingerprinting codes are usually required to have the ability to specify a part (or all) of the colluders with high ...

research-article
Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram

Histogram-shifting (HS) embedding as a most successful reversible data hiding (RDH) scheme is widely investigated. How to take advantage of covers' redundancyis one of the key issues for performance improvement of RDH. Among them, sorting technique isof ...

short-paper
A Novel CDMA Based High Performance Reversible Data Hiding Scheme

In this paper, based on the principle of Code Division Multiple Access (CDMA), a novel reversible data hiding scheme is presented. The to-be-embedded data are represented by different orthogonal spreading sequences and embedded into a cover image while ...

SESSION: Privacy
short-paper
Dynamic Privacy-Preserving Genomic Susceptibility Testing

The field of genomic research has considerably grown in the recent years due to the unprecedented advances brought about by Next Generation Sequencing (NGS) and the need and increasing widespread use of outsourced processing. But this rapid increase ...

short-paper
Group Testing for Identification with Privacy

This paper describes an approach where group testing helps in enforcing security and privacy in identification. We detail a particular scheme based on embedding and group testing. We add a second layer of defense, group vectors, where each group vector ...

short-paper
Differentially Private Matrix Factorization using Sketching Techniques

Collaborative filtering is a popular technique for recommendation system due to its domain independence and reliance on user behavior data alone. But the possibility of identification of users based on these personal data raise privacy concerns. ...

short-paper
Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)

Cloud computing platforms are becoming increasingly prevalent and readily available nowadays, providing us alternative and economic services for resource-constrained clients to perform large-scale computation. In this work, we address the problem of ...

research-article
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation

We study a sensor network setting in which samples are encrypted individually using different keys and maintained on a cloud storage. For large systems, e.g. those that generate several millions of samples per day, fine-grained sharing of encrypted ...

SESSION: Steganography and Steganalysis I
research-article
Best Student Paper
Best Student Paper
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography does not Necessarily Imply One-Way Functions

We present the first complexity-theoretic secure steganographic protocol which, for any communication channel, is provably secure, reliable, and has nearly optimal bandwidth. Our system is unconditionally secure, i.e. our proof does not rely on any ...

research-article
Rethinking Optimal Embedding

At present, almost all leading steganographic techniques for still images use a distortion minimization paradigm, where each potential change is assigned a cost ci and the change probabilities πi chosen to minimize the average total cost ∑iπici. However,...

short-paper
Ensemble of CNNs for Steganalysis: An Empirical Study

There has been growing interest in using convolutional neural networks (CNNs) in the fields of image forensics and steganalysis, and some promising results have been reported recently. These works mainly focus on the architectural design of CNNs, ...

short-paper
Color Image Steganalysis Based On Steerable Gaussian Filters Bank

This article deals with color images steganalysis based on machine learning. The proposed approach enriches the features from the Color Rich Model by adding new features obtained by applying steerable Gaussian filters and then computing the co-...

SESSION: Steganography and Steganalysis II
research-article
A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels

New viewpoints of covert channels are presented in this work. First, the origin of covert channels is traced back to acc ess control and a new class of covert channel, air-gap covert channels, is presented. Second, we study the design of covert channels ...

research-article
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution

This paper presents an effective motion vector (MV)-based steganography to cope with different steganalytic models. The main principle is to define a distortion scale expressing the multi-level embedding impact of MV modification. Three factors ...

research-article
Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography

In this paper, we present a new kind of near-optimal double-layered syndrome-trellis codes (STCs) for spatial domain steganography. The STCs can hide longer message or improve the security with the same-length message comparing to the previous double-...

research-article
Public Access
Boosting Steganalysis with Explicit Feature Maps

Explicit non-linear transformations of existing steganalysis features are shown to boost their ability to detect steganography in combination with existing simple classifiers, such as the FLD-ensemble. The non-linear transformations are learned from a ...

SESSION: Information Hiding and Cryptography
research-article
Best Student Paper
Best Student Paper
Information Hiding in the RSA Modulus

The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way that he can extract the private key or other secret information from the user's public key by involving his own public/private ...

short-paper
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

We propose a new protection scheme for displaying a static binary image on a screen. The protection is achieved by a visual cryptography algorithm that divides the target images into several divisions. The visual difference between the text and the ...

short-paper
Image Segmentation Based Visual Security Evaluation

In this paper we present a metric for visual security evaluation of encrypted images, also known as visual security metric. Such a metric should be able to assess whether an image encryption method is secure or not. In order to consider intelligibility ...

SESSION: Ongoing works
abstract
Enhanced Collusion Resistance for Segment-wise Recombined Fingerprinting in P2P Distribution Systems: [Extended Abstract]

Recombined fingerprinting has been recently proposed as a scalable alternative to the traditional client-server model for anonymous fingerprinting. In recombined fingerprinting, the contents are distributed in P2P fashion from a few seed nodes to the ...

abstract
Study of a Verifiable Biometric Matching

In this paper, we apply verifiable computing techniques to a biometric matching. The purpose of verifiable computation is to give the result of a computation along with a proof that the calculations were correctly performed. We adapt a protocol called ...

abstract
Privacy Protection for JPEG Content on Image-Sharing Platforms

In this paper, we show that, using the encryption algorithm of He et al., it is possible to ensure privacy protection for JPEG content on several widely used image-sharing platforms (e.g., Flickr, Pinterest, Google+ and Twitter).

abstract
PPE-Based Reversible Data Hiding

We propose to utilize the prediction-error of prediction error (PPE) of a pixel to reversibly carry the secret data in this letter. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the ...

Contributors
  • University of Vigo
  • Ecole Centrale de Lille
  • Eindhoven University of Technology
  • Grenoble Alpes University

Index Terms

  1. Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        IH&MMSec '16 Paper Acceptance Rate 21 of 61 submissions, 34%;
        Overall Acceptance Rate 128 of 318 submissions, 40%
        YearSubmittedAcceptedRate
        IH&MMSec '18401845%
        IH&MMSec '17341853%
        IH&MMSec '16612134%
        IH&MMSec '15452044%
        IH&MMSec '14642438%
        IH&MMSec '13742736%
        Overall31812840%