Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3437880acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
IH&MMSec '21: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security Virtual Event Belgium June 22 - 25, 2021
ISBN:
978-1-4503-8295-3
Published:
21 June 2021
Sponsors:

Reflects downloads up to 26 Sep 2024Bibliometrics
Skip Abstract Section
Abstract

As general and program chairs, it is our great pleasure to welcome you to the 2021 ACM Workshop on Information Hiding, Multimedia and Security - IH&MMSec'21. In usual times, the conference should have been held at the Royal Military Academy in Brussels, Belgium. However, due to the situation of the Covid-19 pandemic, this year again, the conference will be virtual. Let us hope that it is the very last time! Nevertheless, this year's workshop continues its tradition of being the premier forum for presentation of research results on leading edge issues of multimedia security such as hidden communications, multimedia forensics, data protection, biometrics, security of multimedia recognition systems, as well as topics in privacy, policy and legal issues in relation to multimedia security and forensics in real world applications. We expect the workshop to facilitate cross-fertilization of ideas among key stakeholders from academia, industry, practitioners, and government agencies around the globe.

The call for papers attracted 47 submissions from countries around the world. The program committee accepted 22 papers that cover a wide variety of topics mentioned above. In addition, the program includes three keynote talks focused on information leakages: one dedicated to side-channels attacks by Francois-Xavier Standaert (UCL, Belgium), one on privacy issues in machine learning by Nicolas Carlini (Google Brain), and one on watermarking to monitor data used during training by Alexandre Sablayrolles (FaceBook). We hope that both the live presentations and the proceedings will serve as a valuable reference for security researchers and developers.

Skip Table Of Content Section
SESSION: Keynote & Invited Talks
keynote
Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?

Side-channel analysis is an important concern for the security of cryptographic implementations, and may lead to powerful key recovery attacks if no countermeasures are deployed. Therefore, various types of protection mechanisms have been proposed over ...

keynote
How Private is Machine Learning?

A machine learning model is private if it doesn't reveal (too much) about its training data. This three-part talk examines to what extent current networks are private. Standard models are not private. We develop an attack that extracts rare training ...

keynote
Tracing Data through Learning with Watermarking

How can we gauge the privacy provided by machine learning algorithms? Models trained with differential privacy (DP) provably limit information leakage, but the question remains open for non-DP models. In this talk, we present multiple techniques for ...

SESSION: Session 1: Forensics I
short-paper
PRNU-based Deepfake Detection

As deepfakes become harder to detect by humans, more reliable detection methods are required to fight the spread of fake images and videos. In our work, we focus on PRNU-based detection methods, which, while popular in the image forensics scene, have ...

research-article
Open Access
Fake Speech Detection Using Residual Network with Transformer Encoder

Fake speech detection aims to distinguish fake speech from natural speech. This paper presents an effective fake speech detection scheme based on residual network with transformer encoder (TE-ResNet) for improving the performance of fake speech ...

research-article
Open Access
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences

Our paper presents a systematic approach to investigate whether and how events can be identified and extracted during the use of video conferencing software. Our approach is based on the encrypted meta and multimedia data exchanged during video ...

SESSION: Session 2: Forensics II
research-article
Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?

Organizations publish and share more and more electronic documents like PDF files. Unfortunately, most organizations are unaware that these documents can compromise sensitive information like authors names, details on the information system and ...

short-paper
Angular Margin Softmax Loss and Its Variants for Double Compressed AMR Audio Detection

Double compressed (DC) adaptive multi-rate (AMR) audio detection is an important but challenging audio forensic task which has received great attention over the last decade. Although the majority of the existing studies extract hand-crafted features and ...

SESSION: Session 3: Security of Machine Learning
research-article
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning

Federated learning is a secure machine learning technology proposed to protect data privacy and security in machine learning model training. However, recent studies show that federated learning is vulnerable to backdoor attacks, such as model ...

research-article
Banners: Binarized Neural Networks with Replicated Secret Sharing

Binarized Neural Networks (BNN) provide efficient implementations of Convolutional Neural Networks (CNN). This makes them particularly suitable to perform fast and memory-light inference of neural networks running on resource-constrained devices. ...

short-paper
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!

Deep Neural Networks (DNNs) are at the heart of many of today's most innovative technologies. With companies investing lots of resources to design, build and optimize these networks for their custom products, DNNs are now integral to many companies' ...

short-paper
iNNformant: Boundary Samples as Telltale Watermarks

Boundary samples are special inputs to artificial neural networks crafted to identify the execution environment used for inference by the resulting output label. The paper presents and evaluates algorithms to generate transparent boundary samples. ...

SESSION: Session 4: Biometry & Authentication
short-paper
Open Access
Towards Match-on-Card Finger Vein Recognition

Security and privacy is of great interest in biometric systems which can be offered by Match-on-Card (MoC) technology, successfully applied in several areas of biometrics. In finger vein recognition such a system is not available yet. Utilizing minutiae ...

research-article
Open Access
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations

Generation of synthetic biometric samples such as, for instance, fingerprint images gains more and more importance especially in view of recent cross-border regulations on security of private data. The reason is that biometric data is designated in ...

SESSION: Session 5: Steganography I
research-article
Best Student Paper
Best Student Paper
Optimizing Additive Approximations of Non-additive Distortion Functions

The progress in steganography is hampered by a gap between non-additive distortion functions, which capture well complex dependencies in natural images, and their additive counterparts, which are efficient for data embedding. This paper proposes a ...

research-article
Open Access
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset

In this paper, we present an Information Hiding approach that would be suitable for exfiltrating sensible information of Industrial Control Systems (ICS) by leveraging the long-term storage of process data in historian databases. We show how hidden ...

research-article
Public Access
Best Paper
Best Paper
Revisiting Perturbed Quantization

In this work, we revisit Perturbed Quantization steganography with modern tools available to the steganographer today, including near-optimal ternary coding and content-adaptive embedding with side-information. In PQ, side-information in the form of ...

SESSION: Session 6: Steganography II
short-paper
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice

Heterogeneous parallel steganography (HPS) has become a new trend of current streaming media voice steganography, which hides secret information in the frames of streaming media with multiple kinds of orthogonal steganography. Because of the complexity ...

short-paper
Public Access
How to Pretrain for Steganalysis

In this paper, we investigate the effect of pretraining CNNs on ImageNet on their performance when refined for steganalysis of digital images. In many cases, it seems that just 'seeing' a large number of images helps with the convergence of the network ...

research-article
Public Access
Improving EfficientNet for JPEG Steganalysis

In this paper, we study the EfficientNet family pre-trained on ImageNet when used for steganalysis using transfer learning. We show that certain "surgical modifications" aimed at maintaining the input resolution in EfficientNet architectures ...

SESSION: Session 7: Special Session on DNN Watermarking I
short-paper
Public Access
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key

In this paper, we propose a novel DNN watermarking method that utilizes a learnable image transformation method with a secret key. The proposed method embeds a watermark pattern in a model by using learnable transformed images and allows us to remotely ...

short-paper
Open Access
White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model

For the protection of trained deep neural network(DNN) models, embedding watermarks into the weights of the DNN model have been considered. However, the amount of change in the weights is large in the conventional methods, and it is reported that the ...

short-paper
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models

Machine Learning is a well established tool used in a variety of applications. As training advanced models requires considerable amounts of meaningful data in addition to specific knowledge, a new business model separate models creators from model ...

SESSION: Session 8: Special Session on DNN Watermarking II
research-article
On the Robustness of Backdoor-based Watermarking in Deep Neural Networks

Watermarking algorithms have been introduced in the past years to protect deep learning models against unauthorized re-distribution. We investigate the robustness and reliability of state-of-the-art deep neural network watermarking schemes. We focus on ...

research-article
DNN Watermarking: Four Challenges and a Funeral

The demand for methods to protect the Intellectual Property Rights (IPR) associated to Deep Neural Networks (DNNs) is rising. Watermarking has been recently proposed as a way to protect the IPR of DNNs and track their usages. Although a number of ...

Contributors
  • Royal Military Academy
  • Ecole Centrale de Lille
  • University of Naples Federico II
  • Czech Technical University in Prague
  • Iowa State University

Recommendations

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%
YearSubmittedAcceptedRate
IH&MMSec '18401845%
IH&MMSec '17341853%
IH&MMSec '16612134%
IH&MMSec '15452044%
IH&MMSec '14642438%
IH&MMSec '13742736%
Overall31812840%