It is our great pleasure to welcome you to the Second International Workshop on Multimedia Forensics and Security -- MFSec 2017, organized in conjunction with the 2017 ACM Conference on Multimedia Retrieval -- ICMR2017, held in Bucharest, Romania.
The goal of MFSec 2017 is three-fold: First, the workshop aims at presenting cutting-edge forensic and security methods aimed at Web and social media applications. Second, it aspires to bring together key individuals from the research and professional communities, from the fields of security, forensics, and multimedia analysis and retrieval, to exchange ideas and experiences and shape the directions of the field for the future. Third, the workshop intends to evaluate the level maturity of the field, identify the current strengths and weaknesses, and encourage progress towards novel solutions. This year's focus was placed on Web and social media environments, and the particular challenges that these environments pose to the field.
The Workshop received 9 submissions, of which 5 were accepted by the Program Committee, leading to a 56% acceptance rate. Accepted submissions cover a wide range of challenges, from multimedia forensics using content and context, to the tracking of terrorism- and weaponrelated sources in the Web.
Proceeding Downloads
Image Clustering by Source Camera via Sparse Representation
The discovery of clusters of images sharing the same origin based on camera fingerprints, such as Sensor Pattern Noise (SPN), plays an important role in the realm of multimedia forensics. In this work, we present a new approach for grouping images ...
Web Video Verification using Contextual Cues
As news agencies and the public increasingly rely on User-Generated Content, content verification is vital for news producers and consumers alike. We present a novel approach for verifying Web videos by analyzing their online context. It is based on ...
Threat Models and Games for Adversarial Multimedia Forensics
We define a number of threat models to describe the goals, the available information and the actions characterising the behaviour of a possible attacker in multimedia forensic scenarios. We distinguish between an investigative scenario, wherein the ...
An Approach for Automatic and Large Scale Image Forensics
This paper describes the applications of deep learning-based image recognition in the DARPA Memex program and its repository of 1.4 million weapons-related images collected from the Deep web. We develop a fast, efficient, and easily deployable framework ...
Detection of Terrorism-related Twitter Communities using Centrality Scores
- Ilias Gialampoukidis,
- George Kalpakis,
- Theodora Tsikrika,
- Symeon Papadopoulos,
- Stefanos Vrochidis,
- Ioannis Kompatsiaris
Social media are widely used among terrorists to communicate and disseminate their activities. User-to-user interaction (e.g. mentions, follows) leads to the formation of complex networks, with topology that reveals key-players and key-communities in ...
Index Terms
- Proceedings of the 2nd International Workshop on Multimedia Forensics and Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
MFSec '17 | 9 | 5 | 56% |
Overall | 9 | 5 | 56% |