It is our great pleasure to welcome you to the thirteenth ACM Multimedia Security Workshop -- MM&Sec'11. The workshop's continuing objective is to explore research in areas of multimedia data security such as data protection, media forensics, covert channels and security issues in biometrics, as well as related issues in public policy and multimedia infrastructure in real world application. Since 1998, MMSEC has fostered collaboration with researchers and developers in academia, industry and government.
The academic world has seen a distressing drop in conference submission across fields and disciplines, and our workshop is no exception to this unfortunate trend. The call for papers attracted 24 submissions from Asia, Europe, Africa, and the United States. We are pleased, however, to see that the quality of papers remains high, confirming our theory that whatever economic phenomenon is reducing publication output, it is not holding back the most interesting and important works of scholarly research. This year's workshop features significant contributions in forensics and a track in biometrics, along with tracks in steganography, encryption and protocols, and applications.
We are also pleased to feature not one but three invited speakers, in a series of invited talks on the subject of Bridging Research and Reality. The speakers--Chet Hosmer, Chief Scientist & Sr. Vice President, Allen Corporation; Tony Rodriguez, Chief Technology Officer at Digimarc; and Walter Bruehs of the FBI Forensic Audio, Video, and Imagery Analysis Unit-are experts in the fields of Steganography/Steganalysis, Watermarking, and Multimedia Forensics and will give talks that frame the discourse for related sessions within the workshop. Presentation topics will be focused on real-world lessons learned, the challenges of bringing technology to fruition, as well as applications and experiences with MM&Sec technology applications that range from commercial to law enforcement. It is our hope that these sessions will provoke and inspire attendees.
Proceeding Downloads
Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy
Traditional forensic disciplines get increasingly digitized. This allows for new investigations and often provides more details for each trace. Due to this digitalization, digital and digitized forensic disciplines have very similar courses of action ...
Seam carving estimation using forensic hash
Seam carving is an adaptive multimedia retargeting technique to resize multimedia data for different display sizes. This technique has found promising applications in media consumption on mobile devices such as tablets and smartphones. However, seam ...
Exposing image forgery with blind noise estimation
Noise is unwanted in high quality images, but it can aid image tampering. For example, noise can be intentionally added in image to conceal tampered regions and to create special visual effects. It may also be introduced unnoticed during camera imaging ...
CFA pattern identification of digital cameras using intermediate value counting
In digital image forensics, estimating the color filter array (CFA) pattern can be useful for digital camera identification. In this paper, we proposed the new method to estimate the CFA pattern of the digital cameras from a single image. Our method is ...
Latent fingerprint detection using a spectral texture feature
Technologies for advancing and supporting criminalistic forensic are an upcoming challenge with rising importance within the domain of multimedia security and forensic. For example the acquisition and automated analysis of latent fingerprints, using ...
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles
Malicious fingerprint traces at crime scenes might be an upcoming challenge for forensic investigations and should be differentiated from valid traces to avoid false accusations. Schwarz [8] introduces an approach for printing amino acids using ink-jet ...
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor
Determining the age of latent fingerprint traces found at crime scenes is an unresolved research challenge since decades. In prior work, we have suggested to use optical, non-invasive image sensory in combination with a new aging feature called binary ...
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Research in the field of keystroke dynamics (KD) has traditionally assumed impostor attacks to be originated by humans. However, recent studies have revealed that bots and various categories of malware have the capacity to implement intelligently ...
Comparative study on fusion strategies for biometric handwriting
Nowadays, multi-biometric fusion is a recent topic in biometric signal processing. The main goal is to optimize the authentication performance by combining different biometric components, e.g. modalities or algorithms. In this paper we only focus on ...
On dangers of overtraining steganography to incomplete cover model
A modern direction in steganography calls for embedding while minimizing a distortion function defined in a sufficiently complex model space. In this paper we show that, quite surprisingly, even a high-dimensional cover model does not automatically ...
Steganalysis of DCT-embedding based adaptive steganography and YASS
Recently well-designed adaptive steganographic systems, including ±1 embedding in the DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious challenges to steganalyzers. Additionally, although the steganalysis of Yet ...
A square-root law for active wardens
The Square Root Law of Ker, Filler and Fridrich establishes asymptotic capacity limits for steganographic communication, caused by the watchful eye of a passive warden. We exhibit a separate fundamental limit of steganographic communication caused by a ...
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario
The primary goal in this paper is to adapt and extend a recent concept and prototypical framework for (semi-)automated security verification of watermarking-based communication protocols based on the CASPER protocol modeling language and the FRD model ...
Processing encrypted floating point signals
An important problem in the context of signal processing in the encrypted domain (SPEED) is to perform secure computations on real-valued signals. This paper presents a first implementation of the IEEE 754 floating point standard and thus provides a ...
Multi-biometrics based crypto-biometric session key generation and sharing protocol
In this paper, the issue of generating and sharing biometrics based secure cryptographic keys is addressed. In particular, we propose a protocol which integrates multi-biometrics, in which information from multiple biometric sources is combined. This ...
Contextualizing security for digital long-term preservation
Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National ...
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework
Although used by most of system developers, imperative languages are known for not being able to provide easily reconfigurable, platform independent and strictly modular applications. ISO/IEC has recently developed a new video coding standard called ...
Cited By
-
Sajedi H (2017). Image steganalysis using Artificial Bee Colony algorithm, Journal of Experimental & Theoretical Artificial Intelligence, 10.1080/0952813X.2016.1266037, 29:5, (949-966), Online publication date: 3-Sep-2017.
-
Egiazarian K, Agaian S, Gotchev A, Hughes J, Rockmore D and Wang Y (2014). Non-stationary noise estimation using dictionary learning and Gaussian mixture models IS&T/SPIE Electronic Imaging, 10.1117/12.2039298, , (90190L), Online publication date: 25-Feb-2014.
- Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IH&MMSec '18 | 40 | 18 | 45% |
IH&MMSec '17 | 34 | 18 | 53% |
IH&MMSec '16 | 61 | 21 | 34% |
IH&MMSec '15 | 45 | 20 | 44% |
IH&MMSec '14 | 64 | 24 | 38% |
IH&MMSec '13 | 74 | 27 | 36% |
Overall | 318 | 128 | 40% |