We are proud to announce that this year both the quality and number of submissions was extremely high.
As a consequence, the TPC chairs and general chairs worked very hard to compile a program, consisting of outstanding papers, based on a very strict selection of 19 accepted papers out of 51 submitted (acceptance rate: 37%).
Below is the list of accepted papers.
Papers list
-
Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid by Hao Yang, Yongjian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang and Saimei Jiao
- Photo Forensics From Rounding Artifacts by Shruti Agarwal and Hany Farid
- Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis by Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang and Yun-Qing Shi
- Pixels-off: data-augmentation complementary solution fordeep-learning steganalysis by Mehdi Yedroudj, Marc Chaumont, Frederic Comby, Ahmed Oulad Amara and Patrick Bas
- Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and Its Detection by Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert and Claus Vielhauer
- LiveDI: An Anti-theft Model Based on Driving Behavior by Hashim Abu-Gellban, Long Nguyen, Mahdi Moghadasi, Zhenhe Pan and Fang Jin
- Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos by Irene Amerini and Roberto Caldelli
- Simulating Suboptimal Steganographic Embedding by Christy Kin-Cleaves and Andrew Kerr
- What if adversarial samples were digital images? by Benoit Bonnet, Teddy Furon and Patrick Bas
- Feature Aggregation Networks for Image Steganalysis by Haneol Jang, Tae-Woo Oh and Kibom Kim
- Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage by Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko and Gerhard Kramer
- Simulation of border control in an ongoing web-based experiment for estimating morphing detection performance of humans by Andrey Makrushin, Dennis Siegel and Jana Dittmann
- Deep Audio Steganalysis in Time Domain by Daewon Lee, Tae-Woo Oh and Kibom Kim
- Turning Cost-Based Steganography into Model-Based by Jan Butora, Yassine Yousfi and Jessica Fridrich
- JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline by Théo Taburet, Patrick Bas, Wadih Sawaya and Rémi Cogranne
- A robust video steganographic method against social networking transcoding based on steganographic side channel by Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie and Xianfeng Zhao
- Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images by Rémi Cogranne, Quentin Giboulot and Patrick Bas
- Exploring the Difficulty of Hiding Keys in Neural Networks by Tobias Kupek, Cecilia Pasquini and Rainer Böhme
- Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand by Chen Wang, Jingjing Mu and Long Huang