


default search action
12th IH&MMSec 2024: Baiona, Spain
- Fernando Pérez-González, Pedro Comesaña Alfaro, Christian Krätzer, Hong Vicky Zhao:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2024, Baiona, Spain, June 24-26, 2024. ACM 2024
Keynote Talks
- Gwenaël J. Doërr
:
Digital Flamenco with Video Pirates. 1-2 - Christian Riess
:
Dreams and Drama of Applied Image Forensics. 3-4 - Jonathan W. Hak
:
Image-Based Evidence in International Criminal Prosecutions: Charting a Path Forward. 5-6
Session 1: Steganography & Steganalysis
- Guorui Liao
, Jinshuai Yang
, Kaiyi Pang
, Yongfeng Huang
:
Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media. 7-12 - Ivy K. Y. Woo
, Sheung Yiu
, Hoover H. F. Yin
, Russell W. F. Lai
:
Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography. 13-18 - Eli Dworetzky
, Edgar Kaziakhmedov
, Jessica J. Fridrich
:
Improving Steganographic Security with Source Biasing. 19-30 - Antoine Mallet
, Rémi Cogranne
, Patrick Bas
:
Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis. 31-39
Session 2: Special Session Reliable Detectors in Multimedia Forensics and Steganalysis
- Mathias Ibsen
, Robert Nichols
, Christian Rathgeb
, David J. Robertson
, Josh P. Davis
, Frøy Løvåsdal
, Kiran B. Raja
, Ryan E. Jenkins
, Christoph Busch
:
Conditional Face Image Manipulation Detection: Combining Algorithm and Human Examiner Decisions. 41-46 - Lea Uhlenbrock
, Davide Cozzolino
, Denise Moussa
, Luisa Verdoliva
, Christian Riess
:
Did You Note My Palette? Unveiling Synthetic Images Through Color Statistics. 47-52 - Edoardo Daniele Cannas
, Sara Mandelli
, Paolo Bestagini
, Stefano Tubaro
:
Investigating Translation Invariance and Shiftability in CNNs for Robust Multimedia Forensics: A JPEG Case Study. 53-63 - Nischay Purnekar
, Lydia Abady
, Benedetta Tondi
, Mauro Barni
:
Improving the Robustness of Synthetic Images Detection by Means of Print and Scan Augmentation. 65-73 - Martin Benes
, Rainer Böhme
:
Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis. 75-86 - Antoine Mallet
, Patrick Bas
, Rémi Cogranne
:
Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch. 87-94
Session 3: Special Session Stego-Malware: Attribution, Analysis and Detection
- Sebastian Zillien
, Denis Petrov
, Pascal Ruffing
, Friedrich Gross
:
A Development Framework for TCP/IP Network Steganography Malware Detection. 95-100 - Jana Dittmann, Christian Kraetzer
, Jost Alemann
, Bernhard Birnbaum
:
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification. 101-112 - Mandy Knöchel
, Sebastian Karius
:
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation. 113-124 - Stefan Kiltz
, Jana Dittmann, Fabian Loewe
, Christian Heidecke
, Max John
, Jonas Mädel
, Fabian Preißler
:
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets. 125-130
Session 4: Forensics
- Michael Häfner
, Aleksandar Radovic
, Moritz Langer
, Stefan Findenig
, Andreas Uhl
:
Forensic Recognition of Codec-Specific Image Compression Artefacts. 131-136 - Andrea Montibeller
, Roy Alia Asiku
, Fernando Pérez-González
, Giulia Boato
:
Shedding Light on some Leaks in PRNU-based Source Attribution. 137-142 - Jan Butora
, Patrick Bas
:
The Adobe Hidden Feature and its Impact on Sensor Attribution. 143-148 - Yang Su
, Shunquan Tan
, Jiwu Huang
:
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model. 149-158 - Wenhao Wang
, Fangjun Huang
:
Evading DeepFake Detectors via Conditional Diffusion Models. 159-164
Session 5: Challenges in Multimedia Security
- Zhitong Lu
, Duohe Ma
, Linna Fan
, Zhen Xu
, Kai Chen
:
AdvOcl: Naturalistic Clothing Pattern Adversarial to Person Detectors in Occlusion. 165-174 - Meghana Rao Bangalore Narasimha Prasad
, Andrey Makrushin
, Matteo Ferrara
, Christian Kraetzer
, Jana Dittmann:
GAN-based Minutiae-driven Fingerprint Morphing. 175-186 - Chenghua He
, Deyang Wu
, Xinpeng Zhang
, Hanzhou Wu
:
Watermarking Text Documents With Watermarked Fonts. 187-197 - Mahdi Rahimi
:
CLAM: Client-Aware Routing in Mix Networks. 199-209 - Alberto Ibarrondo
, Ismet Kerenciler
, Hervé Chabanne
, Vincent Despiegel
, Melek Önen
:
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification. 211-222 - Li Zhang
, Yong Liu
, Xinpeng Zhang
, Hanzhou Wu
:
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing. 223-234
Session 6: Special Session Security and Privacy Challenges towards Trustworthy Federated Learning
- Pierre Jobic
, Aurélien Mayoue
, Sara Tucci Piergiovanni
, François Terrier
:
Extending the Scope of Gradient Reconstruction Attacks in Federated Averaging. 235-246 - Imane Taibi
, Jan Ramon
:
Honest Fraction Differential Privacy. 247-251 - Judith Sáinz-Pardo Díaz
, Andrés Heredia Canales
, Ignacio Heredia Cacha
, Viet D. Tran
, Giang T. Nguyen
, Khadijeh Alibabaei
, Marta Obregón Ruiz
, Susana Rebolledo Ruiz
, Álvaro López García
:
Making Federated Learning Accessible to Scientists: The AI4EOSC Approach. 253-264 - Jaime Loureiro-Acuña
, Xavier Martínez Luaña
, Héctor Padín-Torrente
, Gonzalo Jiménez-Balsa
, Carlos García-Pagán
, Ines Ortega-Fernandez
:
Enhancing Privacy in Federated Learning: A Practical Assessment of Combined PETs in a Cross-Silo Setting. 265-270
Session 7: Special Session Unveiling Trends and Challenges in Audio Deepfake Detection
- Taiba Majid Wani
, Syed Asif Ahmad Qadri
, Danilo Comminiello
, Irene Amerini
:
Detecting Audio Deepfakes: Integrating CNN and BiLSTM with Multi-Feature Concatenation. 271-276 - Kratika Bhagtani
, Amit Kumar Singh Yadav
, Paolo Bestagini
, Edward J. Delp
:
Are Recent Deepfake Speech Generators Detectable? 277-282 - Hashim Ali
, Surya Subramani
, Shefali Sudhir
, Raksha Varahamurthy
, Hafiz Malik
:
Is Audio Spoof Detection Robust to Laundering Attacks? 283-288 - Alessandro Pianese
, Davide Cozzolino
, Giovanni Poggi
, Luisa Verdoliva
:
Training-Free Deepfake Voice Recognition by Leveraging Large-Scale Pre-Trained Models. 289-294

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.