Technical Program

Technical Program at a glance

Technical program in details


Wednesday, July 3rd

  • 9h: opening talk

  • 9h15-10h30: Keynote talk #1 (Jean Michel Morel)

  • 10h30-11h : Coffee Break

  • 11h-12h45: Video & Audio Steganography (session Chair: Siwei Lyu)
    • Long paper #58 "Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position", by Chen Gong, Xiao Wei Yi, Xian Feng Zhao and Yi Ma

    • Long paper #60 "Defining Joint Embedding Distortion for Adaptive MP3 Steganography", by Yunzhao Yang, Yuntao Wang, Xiaowei Yi, Xianfeng Zhao and Yi Ma

    • Short paper #62 "Adaptive VP8 Steganography Based on Deblocking Filtering", by Pei Xie, Hong Zhang, Weike You, Xianfeng Zhao, Jianchang Yu and Yi Ma

    • Short paper #43 "Vibrational Covert Channels using Low-Frequency Acoustic Signals", by Nikolay Matyunin, Yujue Wang and Stefan Katzenbeisser

  • 12h45-14h15: Lunch break

  • 14h15-16h: Image Steganography (session Chair: Patrick Bas)
    • Long paper #14 "Towards Automatic Embedding Cost Learning for JPEG Steganography", by Jianhua Yang, Danyang Ruan, Xiangui Kang and Yun-Qing Shi 

    • Long paper #28 "Effect of JPEG Quality on Steganographic Security", by Jan Butora and Jessica Fridrich 

    • Short paper #42 "Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain", by Théo Taburet, Patrick Bas, Jessica Fridrich and Wadih Sawaya

    • Short paper #24 "Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference", by Bolin Chen, Weiqi Luo and Peijia Zheng

  • 16h-16h30 : Coffee Break

  • 16h30-18h: Forensics & Anti-forensics (session Chair: Rainer Böhme)
    • Long paper #55 "Camera Identification from HDR Images", by Morteza Darvish Morshedi Hosseini and Miroslav Goljan

    • Short paper #51 "Estimation of copy-sensitive codes using a neuronal approach", by Rohit Yadav, Iuliia Tkachenko, Alain Tremeau and Thierry Fournel

    • Short paper #11 "De-identification Without Losing Faces", by Yuezun Li and Siwei Lyu

    • Short paper #19 "Impact of Spatial Constraints when Signing in Uncontrolled Mobile Conditions", by Majd Abazid, Nesma Houmani and Sonia Garcia-Salicetti.

  • 18h- ....: Rump Session (session Chair: Teddy Furon)


Thursday, July 4th

  • 9h00-11h : Special Session #1 - Media Forensics - Fake or Real? (session Chair: Jana Dittmann & Luisa Verdoliva)
    • Short paper #23 "A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for ICAO-Passport-Scaled Images", by Tom Neubert, Christian Kraetzer and Jana Dittmann

    • Short paper #66 "Image Forensics from Chroma Subsampling of High-Quality JPEG Images", by Benedikt Lorch and Christian Riess

    • Short paper #68 "A Simple and Effective Initialization of CNN for Forensics of Image Processing Operations", by Ivan Castillo Camacho and Kai Wang

    • Short paper #69 "Exposing GAN-synthesized Faces Using Landmark Locations" by Xin Yang, Yuezun Li, Honggang Qi and Siwei Lyu.

    • Short paper #72 "CNN-based Rescaling Factor Estimation", by Chang Liu and Matthias Kirchner.

  • 11h-11h30 : Coffee Break

  • 11h30-12h30: Special Session #2 - ALASKA steganalysis challenge "Into the wild" (session Chair: Dirk Borghys)
    • Long paper #67 "The ALASKA Steganalysis Challenge: A first step towards Steganalysis 'Into The Wild'", by Rémi Cogranne, Quentin Giboulot and Patrick Bas
    • Long paper #71 "Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain", by Yassine Yousfi, Jessica Fridrich, Jan Butora and Quentin Giboulot.
  • 12h30-14h: Lunch Break 
  • 14h--22h: Social Activity

 


Friday, July 5th

  • 9h00-10h30: Keynote talk #2 (Reza Shokri)

  • 10h30-11h : Coffee Break

  • 11h-12h45: Watermarking and Applied crypto (session Chair: Andreas Westfeld)
    • Long paper #34 "Multimedia Integrity Verification using Blockchain-based Sanitizable Signature", by Karthik Nandakumar, Nalini Ratha and Sharathchandra Pankanti

    • Long paper #39 "Revisiting Multivariate Lattices for Encrypted Signal Processing", by Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González

    • Long paper #5 "Watermarking error exponents in the presence of noise: The case of the dual hypercone detector", by Teddy Furon

    • Short paper #1 "Nearest neighbor decoding for Tardos fingerprinting codes", by Thijs Laarhoven.

  • 12h45-14h15: Lunch break

  • 14h15-16h: Deep Learning & Audio Steganalysis (session Chair: Marc Chaumont)
    • Long Paper #2 "Reference Channels for Steganalysis of Images with Convolutional Neural Networks", by Mo Chen, Mehdi Boroumand and Jessica Fridrich

    • Short paper #3 "A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis", by Junwen Huang, Jiangqun Ni, Linhong Wan and Jingwen Yan

    • Short paper #10 "Steganalysis of VoIP Streams with CNN-LSTM Network", by Hao Yang, Zhong-Liang Yang and Yong-Feng Huang

    • Short paper #46 "Audio Steganalysis with Improved Convolutional Neural Network", by Yuzhen Lin, Rangding Wang, Diqun Yan, Li Dong and Xueyuan Zhang

  • 16h-16h30 : Coffee Break

  • 16h30-18h: Methods for Steganography and Steganalysis (session Chair: Miroslav Goljan)
    • Short paper #44 "Exploiting Adversarial Embeddings for Better Steganography", by Solène Bernard, Tomás Pevný, Patrick Bas and John Klein

    • Short paper #45 "Detection of classifier inconsistencies in image steganalysis", by Daniel Lerch-Hostalot and David Megias

    • Short paper #18 "Linear Hash Functions as a Means of Distortion--Rate Optimization in Data Embedding", by Boris Ryabko and Andrey Fionov

    • Short paper #36 "Fast and Effective Global Covariance Pooling Network for Image Steganalysis", by Xiaoqing Deng, Bolin Chen, Weiqi Luo and Da Luo

  • 18h-....: Farewell