Accepted Papers

We are proud to announce that this year both the quality and number of submissions was extremely high.

As a consequence, the TPC chairs and general chairs worked very hard to compile a program, consisting of outstanding papers, based on a very strict selection of 19 accepted papers out of 51 submitted (acceptance rate: 37%).

Below is the list of accepted papers.


Papers list

  • Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid by Hao Yang, Yongjian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang and Saimei Jiao

  • Photo Forensics From Rounding Artifacts by Shruti Agarwal and Hany Farid
  • Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis by Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang and Yun-Qing Shi
  • Pixels-off: data-augmentation complementary solution fordeep-learning steganalysis by Mehdi Yedroudj, Marc Chaumont, Frederic Comby, Ahmed Oulad Amara and Patrick Bas
  • Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and Its Detection by Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert and Claus Vielhauer
  • LiveDI: An Anti-theft Model Based on Driving Behavior by Hashim Abu-Gellban, Long Nguyen, Mahdi Moghadasi, Zhenhe Pan and Fang Jin
  • Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos by Irene Amerini and Roberto Caldelli
  • Simulating Suboptimal Steganographic Embedding by Christy Kin-Cleaves and Andrew Kerr
  • What if adversarial samples were digital images? by Benoit Bonnet, Teddy Furon and Patrick Bas
  • Feature Aggregation Networks for Image Steganalysis by Haneol Jang, Tae-Woo Oh and Kibom Kim
  • Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage by Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko and Gerhard Kramer
  • Simulation of border control in an ongoing web-based experiment for estimating morphing detection performance of humans by Andrey Makrushin, Dennis Siegel and Jana Dittmann
  • Deep Audio Steganalysis in Time Domain by Daewon Lee, Tae-Woo Oh and Kibom Kim
  • Turning Cost-Based Steganography into Model-Based by Jan Butora, Yassine Yousfi and Jessica Fridrich
  • JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline by Théo Taburet, Patrick Bas, Wadih Sawaya and Rémi Cogranne
  • A robust video steganographic method against social networking transcoding based on steganographic side channel by Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie and Xianfeng Zhao
  • Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images by Rémi Cogranne, Quentin Giboulot and Patrick Bas
  • Exploring the Difficulty of Hiding Keys in Neural Networks by Tobias Kupek, Cecilia Pasquini and Rainer Böhme
  • Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand by Chen Wang, Jingjing Mu and Long Huang