It is our great pleasure to welcome you to the 2012 ACM Workshop on Multimedia and Security -- MM&Sec'12. This year's workshop continues its tradition of being the premier forum for presentation of research results on leading edge issues of multimedia security such as data protection, multimedia forensics, hidden communications and biometrics, as well as topics in privacy, policy and legal issues in relation to multimedia security and forensics in real world applications. We expect the workshop to facilitate cross-fertilization of ideas among key stakeholders from academia, industry, practitioners and government agencies around the globe.
The call for papers attracted 48 submissions from countries around the world. The program committee accepted 23 papers that cover a wide variety of topics mentioned above. In addition, the program includes a keynote speech, Dr Emilio Mordini on Privacy and Ethics Issues Surrounding Biometrics. We hope that these proceedings will serve as a valuable reference for security researchers and developers.
Proceeding Downloads
Batch steganography in the real world
We examine the universal pooled steganalyzer of in two respects. First, we confirm that the method is applicable to a number of different steganographic embedding methods. Second, we consider the converse problem of how to spread payload between ...
Steganalysis with mismatched covers: do simple classifiers help?
Modern steganalysis can be incredibly sensitive and accurate, but only in an artificial setting in which the training data is from the exact same image source as the data being tested. When faced with mismatched training data, performance degrades, ...
Frame-accurate temporal registration for non-blind video watermarking
Non-blind watermark detection is still relevant in some applications e.g. traitor tracing. In this case, the auxiliary metadata sent to the detector reveals something about the original content. In this paper, we investigate whether such side-...
Performance and code length optimization of joint decoding tardos fingerprinting
To trace back copyright infringements, digital transaction watermarking today is a widely accepted method. Here, copies of a single work are individualized by embedding userspecific watermark messages. However, transaction watermarking is vulnerable to ...
Embedding cylinder quality measures into minutia cylinder-code based latent fingerprint matching
One of the major problems concerning latent fingerprint matching in forensic applications is the poor quality of fingerprint data. Therefore, local quality assessment of fingerprint images is necessary to ensure high biometric performance in this ...
On using flat bed scanners for the age determination of latent fingerprints: first results for the binary pixel feature
Determining the age of latent fingerprints found at crime scenes is a very pressing, yet so far unresolved challenge in forensics. Recently, a first aging feature called binary pixel has been introduced, based on the loss of image contrast of ...
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy
Lockpicking forensics is currently a completely manual process, which requires a lot of skill as well as training and is therefore time-consuming as well as expensive. In this paper we make a first move to transfer the most crucial part of this specific ...
First approach for a computer-aided textile fiber type determination based on template matching using a 3D laser scanning microscope
One main goal of today's forensic textile fiber analysis is the classification of fiber traces. This can be achieved by forensic experts in manual analysis with the help of microscopy. However, this examination process, including an optical matching, is ...
Forensic ballistic analysis using a 3D sensor device
The application of non-invasive optical 3D sensing technology for the acquisition of toolmarks and forensic traces from projectiles and cartridges is currently an emerging field of research. In this work we will present a first taxonomy of possible ...
Privacy-preserving content-based recommender system
By offering personalized content to users, recommender systems have become a vital tool in e-commerce and online media applications. Content-based algorithms recommend items or products to users, that are most similar to those previously purchased or ...
Length-preserving bit-stream-based JPEG encryption
We propose a new method to encrypt baseline JPEG bit streams by selective Huffman code word swapping and coefficient value scrambling based on AES encryption. Furthermore, we show that our approach preserves the length of the bit stream while being ...
Automatic telephone handset identification by sparse representation of random spectral features
Speech signals convey information not only for speakers' identity and the spoken language, but also for the acquisition devices used during their recording. Therefore, it is reasonable to perform acquisition device identification by analyzing the ...
A universal technique to hide traces of histogram-based image manipulations
We propose a universal counter-forensic technique for concealing traces left on the image histogram by any processing tool. Under the assumption that the forensic analysis relies on first-order statistics only (which is true in many practical ...
Recognizing pornographic images
We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions in order to capture alarming Regions ...
Unexpected artefacts in PRNU-based camera identification: a 'Dresden Image Database' case-study
Although sensor noise is generally known as a very reliable means to uniquely identify digital cameras, care has to be taken with respect to camera model characteristics that may cause false accusations. While earlier reports focused on so-called linear ...
A methodological framework for investigating age factors on the performance of biometric systems
Any individual's biometric data are likely to change with the passage of time and, as a result, developing biometric applications for long-term use is a challenging task. One of the factors which increases the challenge of dealing with ageing effects in ...
Enhancing face recognition at a distance using super resolution
The characteristics of surveillance video generally include low-resolution images and blurred images. Decreases in image resolution lead to loss of high frequency facial components, which is expected to adversely affect recognition rates. Super ...
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions
Exemplar fingerprints captured directly from a finger are used in biometric systems for authentication purposes. If the quality of the captured image is insufficient for extracting biometric features, it can be easily captured again. In forensics latent ...
An adaptive system for gait recognition in multi-view environments
Gait recognition systems often suffer from the challenges when query gaits are under the coupled effects of unknown view angles and large intra-class variations (e.g., wearing a coat). In this paper, we deem it as a two-stage classification problem, ...
Frontal gait recognition combining 2D and 3D data
Automatic human recognition systems based on biometrics are becoming increasingly popular in today's world. In particular, gait recognition (i.e., recognition based on the peculiar manner of walking) is especially interesting since it allows the ...
Appearance-based people recognition by local dissimilarity representations
Among the possible applications of computer vision to video-surveillance, person re-identification over a network of camera sensors, using cues related to clothing appearance, is gaining much interest. Re-identification techniques can be used for ...
Experimental results on the feature-level fusion of multiple fingerprint liveness detection algorithms
The aim of fingerprint liveness detection is to detect if a fingerprint image, sensed by an electronic device, belongs to an alive fingertip or to an artificial replica of it. It is well-known that a fingerprint can be replicated and standard electronic ...
Privacy preserving ECG quality evaluation
Remote health-care applications are gaining popularity as an alternative for patients who do not require hospitalization. In this setting, privacy preserving protocols are useful to enable the offering of personalized online services, thus preventing ...
Cited By
-
Alattar A, Memon N, Heitzenrater C, Iuliani M, Rossetto S, Bianchi T, De Rosa A, Piva A and Barni M (2014). Image counter-forensics based on feature injection IS&T/SPIE Electronic Imaging, 10.1117/12.2042234, , (902810), Online publication date: 19-Feb-2014.
-
Illarionov Y, Smith A, Vaziri S, Ostling M, Mueller T, Lemme M and Grasser T (2014). Bias-temperature instability in single-layer graphene field-effect transistors: A reliability challenge 2014 Silicon Nanoelectronics Workshop (SNW), 10.1109/SNW.2014.7348539, 978-1-4799-5676-0, (1-2)
-
Alattar A, Memon N, Heitzenrater C, Clausing E and Vielhauer C (2014). Digitized locksmith forensics: automated detection and segmentation of toolmarks on highly structured surfaces IS&T/SPIE Electronic Imaging, 10.1117/12.2036945, , (90280W), Online publication date: 19-Feb-2014.
-
Ma J, Deng X, Liu Y and Wu D (2013). Power consumption of mobile video streaming under adverse network conditions 2013 IEEE/CIC International Conference on Communications in China (ICCC), 10.1109/ICCChina.2013.6671098, 978-1-4799-1033-5, (106-111)
Index Terms
- Proceedings of the on Multimedia and security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IH&MMSec '18 | 40 | 18 | 45% |
IH&MMSec '17 | 34 | 18 | 53% |
IH&MMSec '16 | 61 | 21 | 34% |
IH&MMSec '15 | 45 | 20 | 44% |
IH&MMSec '14 | 64 | 24 | 38% |
IH&MMSec '13 | 74 | 27 | 36% |
Overall | 318 | 128 | 40% |