Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2037252acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
MM&Sec '11: Multimedia and Security Workshop Buffalo New York USA September 29 - 30, 2011
ISBN:
978-1-4503-0806-9
Published:
29 September 2011
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 23 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the thirteenth ACM Multimedia Security Workshop -- MM&Sec'11. The workshop's continuing objective is to explore research in areas of multimedia data security such as data protection, media forensics, covert channels and security issues in biometrics, as well as related issues in public policy and multimedia infrastructure in real world application. Since 1998, MMSEC has fostered collaboration with researchers and developers in academia, industry and government.

The academic world has seen a distressing drop in conference submission across fields and disciplines, and our workshop is no exception to this unfortunate trend. The call for papers attracted 24 submissions from Asia, Europe, Africa, and the United States. We are pleased, however, to see that the quality of papers remains high, confirming our theory that whatever economic phenomenon is reducing publication output, it is not holding back the most interesting and important works of scholarly research. This year's workshop features significant contributions in forensics and a track in biometrics, along with tracks in steganography, encryption and protocols, and applications.

We are also pleased to feature not one but three invited speakers, in a series of invited talks on the subject of Bridging Research and Reality. The speakers--Chet Hosmer, Chief Scientist & Sr. Vice President, Allen Corporation; Tony Rodriguez, Chief Technology Officer at Digimarc; and Walter Bruehs of the FBI Forensic Audio, Video, and Imagery Analysis Unit-are experts in the fields of Steganography/Steganalysis, Watermarking, and Multimedia Forensics and will give talks that frame the discourse for related sessions within the workshop. Presentation topics will be focused on real-world lessons learned, the challenges of bringing technology to fruition, as well as applications and experiences with MM&Sec technology applications that range from commercial to law enforcement. It is our hope that these sessions will provoke and inspire attendees.

Skip Table Of Content Section
SESSION: Forensics I
research-article
Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy

Traditional forensic disciplines get increasingly digitized. This allows for new investigations and often provides more details for each trace. Due to this digitalization, digital and digitized forensic disciplines have very similar courses of action ...

research-article
Seam carving estimation using forensic hash

Seam carving is an adaptive multimedia retargeting technique to resize multimedia data for different display sizes. This technique has found promising applications in media consumption on mobile devices such as tablets and smartphones. However, seam ...

research-article
Exposing image forgery with blind noise estimation

Noise is unwanted in high quality images, but it can aid image tampering. For example, noise can be intentionally added in image to conceal tampered regions and to create special visual effects. It may also be introduced unnoticed during camera imaging ...

SESSION: Forensics II
research-article
CFA pattern identification of digital cameras using intermediate value counting

In digital image forensics, estimating the color filter array (CFA) pattern can be useful for digital camera identification. In this paper, we proposed the new method to estimate the CFA pattern of the digital cameras from a single image. Our method is ...

research-article
Latent fingerprint detection using a spectral texture feature

Technologies for advancing and supporting criminalistic forensic are an upcoming challenge with rising importance within the domain of multimedia security and forensic. For example the acquisition and automated analysis of latent fingerprints, using ...

research-article
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles

Malicious fingerprint traces at crime scenes might be an upcoming challenge for forensic investigations and should be differentiated from valid traces to avoid false accusations. Schwarz [8] introduces an approach for printing amino acids using ink-jet ...

SESSION: Biometrics
research-article
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor

Determining the age of latent fingerprint traces found at crime scenes is an unresolved research challenge since decades. In prior work, we have suggested to use optical, non-invasive image sensory in combination with a new aging feature called binary ...

research-article
Using global knowledge of users' typing traits to attack keystroke biometrics templates

Research in the field of keystroke dynamics (KD) has traditionally assumed impostor attacks to be originated by humans. However, recent studies have revealed that bots and various categories of malware have the capacity to implement intelligently ...

research-article
Comparative study on fusion strategies for biometric handwriting

Nowadays, multi-biometric fusion is a recent topic in biometric signal processing. The main goal is to optimize the authentication performance by combining different biometric components, e.g. modalities or algorithms. In this paper we only focus on ...

SESSION: Steganography
research-article
On dangers of overtraining steganography to incomplete cover model

A modern direction in steganography calls for embedding while minimizing a distortion function defined in a sufficiently complex model space. In this paper we show that, quite surprisingly, even a high-dimensional cover model does not automatically ...

research-article
Steganalysis of DCT-embedding based adaptive steganography and YASS

Recently well-designed adaptive steganographic systems, including ±1 embedding in the DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious challenges to steganalyzers. Additionally, although the steganalysis of Yet ...

research-article
A square-root law for active wardens

The Square Root Law of Ker, Filler and Fridrich establishes asymptotic capacity limits for steganographic communication, caused by the watchful eye of a passive warden. We exhibit a separate fundamental limit of steganographic communication caused by a ...

SESSION: Protocols
research-article
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario

The primary goal in this paper is to adapt and extend a recent concept and prototypical framework for (semi-)automated security verification of watermarking-based communication protocols based on the CASPER protocol modeling language and the FRD model ...

research-article
Processing encrypted floating point signals

An important problem in the context of signal processing in the encrypted domain (SPEED) is to perform secure computations on real-valued signals. This paper presents a first implementation of the IEEE 754 floating point standard and thus provides a ...

research-article
Multi-biometrics based crypto-biometric session key generation and sharing protocol

In this paper, the issue of generating and sharing biometrics based secure cryptographic keys is addressed. In particular, we propose a protocol which integrates multi-biometrics, in which information from multiple biometric sources is combined. This ...

SESSION: Applications
research-article
Contextualizing security for digital long-term preservation

Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National ...

research-article
Building multimedia security applications in the MPEG reconfigurable video coding (RVC) framework

Although used by most of system developers, imperative languages are known for not being able to provide easily reconfigurable, platform independent and strictly modular applications. ISO/IEC has recently developed a new video coding standard called ...

Contributors
  • Air Force Research Laboratory
  • Binghamton University State University of New York
  • Otto von Guericke University Magdeburg
  1. Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%
      YearSubmittedAcceptedRate
      IH&MMSec '18401845%
      IH&MMSec '17341853%
      IH&MMSec '16612134%
      IH&MMSec '15452044%
      IH&MMSec '14642438%
      IH&MMSec '13742736%
      Overall31812840%