24 papers accepted, 64 papers submitted, Acceptance Rate = 37.5%.

[List of accepted papers]


Wednesday (June 11, 2014)

9:00 - 18:00: Registration

9:30 - 11:15: Welcome coffee & snacks

11:15 - 11:30: Welcome note

11:30 - 12:30: Invited talk: Peter Schelkens (Vrije Universiteit Brussel): Image Security Tools for JPEG Standards, chaired by Roland Kwitt (University of Salzburg)

12:30 - 14:00: Lunch break

14:00 - 15:10: Special Session on HEVC, H.264, and JPEG Security, chaired by Jan De Cock (University of Ghent) and Thomas Stütz (University of Applied Sciences Salzburg)

  • Detection of JSteg Algorithm Using Hypothesis Testing Theory and a Statistical Model with Nuisance Parameters, Tong Qiao (Université de Technologie de Troyes) and Zitzmann Cathel (EPF École d'ingénieur) and Rémi Cogranne (Université de Technologie de Troyes) and Retraint Florent (Université de Technologie de Troyes)
  • Slice Groups for Post-Compression Region of Interest Encryption in SVC, Andreas Unterweger (University of Salzburg) and Andreas Uhl (University of Salzburg)

15:10 - 15:45: Software Security, chaired by Stefan Katzenbeisser (TU Darmstadt)

  • What’s the PointISA?, Sudeep Ghosh (Microsoft) and Jason Hiser (University of Virginia) and Jack Davidson (University of Virginia)

15:45 - 16:15: Coffee break

16:15 - 17:50: Watermarking, chaired by Gwenaël Doërr (Technicolor)

  • Gradient Based Prediction for Reversible Watermarking by Difference Expansion, Catalin Dragoi (Valahia University of Targoviste) and Dinu Coltuc (Valahia University of Targoviste) and Ion Caciula (Valahia University of Targoviste)
  • On the Combination of Randomized Thresholds and Non-Parametric Boundaries to Protect Digital Watermarks against Sensitivity Attacks, Erwin Quiring (University of Muenster) and Pascal Schoettle (University of Muenster)
  • Application of Grubbs’ test for outliers to the detection of watermarks, Matthieu Urvoy (IRCCyN-IVC) and Florent Autrusseau (IRCCyN-IVC)

18:00 - 19:00: Steering Committee Meeting

Thursday (June 12, 2014)

8:30 - 18:00: Registration

9:00 - 10:00: Invited talk: Markus Clabian (AIT, Vienna): FastPass - Automated Border Control as Challenging Combination of Various Security Technologies, chaired by Andreas Uhl (University of Salzburg)

10:00 - 10:30: Coffee break

10:30 - 12:20: Special Session on Forensic and Biometric Challenges in Information Hiding and Media Security, chaired by Claus Vielhauer (Brandenburg University of Applied Sciences) and Chang-Tsun Li (University of Warwick) and Klimis Ntalianis (Technical Educational Institute of Athens) and Nicolas Tspatsoulis (Cyprus University of Technology)

  • Biometrics based Observer Free Transferable E-cash, Kamlesh Tiwari (Indian Institute of Technology Kanpur) and Phalguni Gupta (IIT Kanpur)
  • From StirMark to StirTrace: Benchmarking Pattern Recognition Based Printed Fingerprint Detection, Mario Hildebrandt (Otto-von-Guericke University of Magdeburg) and Jana Dittmann (Otto-von-Guericke University of Magdeburg)
  • Digital Crime Scene Analysis: Automatic Matching of Firing Pin Impressions on Cartridge Bottoms using 2D and 3D Spatial Features, Robert Fischer (Brandenburg University of Applied Sciences) and Claus Vielhauer (Brandenburg University of Applied Sciences) and Jana Dittmann (Otto-von-Guericke University of Magdeburg)
  • Video Steganalysis Based on Subtractive Probability of Optimal Matching Feature, Ren Yanzhen (Wuhan University) and Zhai Liming (Wuhan University) and Wang Lina (Wuhan University) and Zhu Tingting (Naval university of engineering)

12:20 - 14:00: Lunch break

14:00 - 16:00: Steganography, chaired by Marc Chaumont (University of Montpellier)

  • Adaptive Steganalysis against WOW Embedding Algorithm, Weixuan Tang (Sun Yat-sen University) and Haodong Li (Sun Yat-sen University) and Weiqi Luo (Sun Yat-sen University) and Jiwu Huang (Sun Yat-sen University)
  • Video Steganography with Perturbed Macroblock Partition, Hong Zhang (Institute of Information Engineering) and Yun Cao (Institute of Information Engineering) and Xianfeng Zhao (Institute of Information Engineering) and Weiming Zhang (University of Science and Technology of China) and Nenghai Yu (University of Science and Technology of China)
  • Predictable Rain? Steganalysis of Public-Key Steganography using Wet Paper Codes, Matthias Carnein (University of Münster) and Pascal Schöttle (University of Münster) and Rainer Böhme (University of Münster)
  • Steganographic Key Leakage Through Payload Metadata, Tomas Pevny (Czech Technical University in Prague) and Andrew Ker (University of Oxford)

16:00 - 16:30: Coffee break

16:30 - 17:30: Fingerprinting, chaired by Alessandro Piva (University of Florence)

  • Capacities and Capacity-Achieving Decoders for Various Fingerprinting Games, Thijs Laarhoven (Eindhoven University of Technology)
  • Notes on Non-Interactive Secure Comparison in "Image Feature Extraction in the Encrypted Domain with Privacy-Preserving SIFT", Matthias Schneider (ETH Zurich) and Thomas Schneider (TU Darmstadt)

17:30 - open end: Social event

Friday (June 13, 2014)

8:30 - 17:00: Registration

9:00 - 10:15: Special Session on Security and Privacy Technologies for Intelligent Energy Networks, chaired by Dominik Engel (University of Applied Sciences Salzburg) and Zekeriya Erkin (TU Delft)

  • Distributional Differential Privacy for Large-Scale Smart Metering, Mark Jelasity (University of Szeged) and Kenneth P. Birman (Cornell University)
  • Influence of Data Granularity on Nonintrusive Appliance Load Monitoring, Günther Eibl (Salzburg University of Applied Sciences) and Dominik Engel (Salzburg University of Applied Sciences)
  • Architecture-Driven Smart Grid Security Management, Markus Kammerstetter (Vienna University of Technology) and Lucie Langer (Austrian Institute of Technology, Safety and Security Department) and Florian Skopik (Austrian Institute of Technology, Safety and Security Department) and Wolfgang Kastner (Vienna University of Technology)

10:15 - 10:45: Coffee break

10:45 - 12:15: Industrial talks

12:15 - 14:00: Lunch break

14:00 - 15:25: Digital Forensics, chaired by Rainer Böhme (University of Münster)

  • Audio Source Authentication and Splicing Detection Using Acoustic Environmental Signature, Hong Zhao (South University of Science and Technology of China) and Yifan Chen (South University of Science and Technology of China) and Rui Wang (South University of Science and Technology of China) and Hafiz Malik (University of Michigan—Dearborn)
  • A Universal Image Forensic Strategy Based on Steganalytic Model, Xiaoqing Qiu (Sun Yat-sen University) and Haodong Li (Sun Yat-sen University) and Weiqi Luo (Sun Yat-sen University) and Jiwu Huang (Sun Yat-sen University)
  • Automatic Location of Frame Deletion Point for Digital Video Forensics, Chunhui Feng (Wuhan University) and Zhengquan Xu (Wuhan University) and Wenting Zhang (Wuhan University) and Yanyan Xu (Wuhan University)

15:25 - 16:00: Coffee break

16:00 - 17:00: Special Session on Security and Robustness in Biometrics, chaired by Christian Rathgeb (University of Darmstadt) and Peter Wild (University of Reading)

  • Robust palmprint verification using sparse representation of binarized statistical features: A comprehensive study, R. Raghavendra (Norwegian Biometric Laboratary) and Christoph Busch (NISlab)
  • GSHADE: Faster Privacy-Preserving Distance Computation and Biometric Identification, Julien Bringer (Morpho) and Herve Chabanne (Morpho) and Melanie Favre (Morpho) and Alain Patey (Morpho) and Thomas Schneider (TU Darmstadt) and Michael Zohner (TU Darmstadt)

17:00 - 17:05: Closing & Farewell