We use the virtual conference format to hopefully better accommodate different time zones. The conference is extended to four days, but each of these days will only be a half-day.
The conference days are Monday, June 22 until Thursday, June 25. A conference day will be approximately four hours, spanning these times in various time zones:
|
San Francisco |
New York |
Rome |
Beijing |
| Start |
7:00h |
10:00h |
16:00h |
22:00h |
| End |
11:00h |
14:00h |
20:00h |
02:00h |
| Start (PT) |
Start (CEST) |
Start (China) |
Day 1ng and welcome |
Day 2ng and welcome |
Day 3 |
Day 4 |
| 07:00 |
16:00 |
22:00 |
Opening |
Opening |
Opening |
Opening |
| |
|
|
Keynote |
Steganalysis |
Multimedia Forensics |
Keynote |
| |
|
|
| |
|
|
| 08:00 |
17:00 |
23:00 |
| |
|
|
|
|
|
Break |
Break |
|
|
|
Securityaaaa |
Break |
Break |
Steganography |
| 09:00 |
18:00 |
00:00 |
Steganalysis |
Social event |
| |
|
|
| |
|
|
|
|
|
Break |
| 10:00 |
19:00 |
01:00 |
Social event
|
Steganography |
Steganography |
|
|
|
Break |
| |
|
|
Security |
| |
|
|
| 11:00 |
20:00 |
02:00 |
Closing remarks |
Closing remarks |
Best Paper Awards |
| |
|
|
|
|
Closing remarks |
|
|
|
Closing remarks |
|
|
|
Technical program in details (Times are displayed in PT)
Monday June 22nd
- 07:00 - 07:15: Opening and welcome
- 07:15 - 08:30: Keynote "Micro-signals for wellness and healthcare" by Prof. Min Wu
- 08:30 - 08:45: Break
- 08:45 - 10:15: Security session (part 1)
- #15 "Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand" by Chen Wang, Jingjing Mu and Long Huang
- #52 "LiveDI: An Anti-theft Model Based on Driving Behavior" by Hashim Abu-Gellban, Long Nguyen, Mahdi Moghadasi, Zhenhe Pan and Fang Jin
- #6 "What if adversarial samples were digital images?" by Benoit Bonnet, Teddy Furon and Patrick Bas
- 10:15 - 10:30: Break
- 10:30 - 11:30: Security session (part 2)
- #21 "Exploring the Difficulty of Hiding Keys in Neural Networks" by Tobias Kupek, Cecilia Pasquini and Rainer Böhme
- #11 "Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage" by Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko and Gerhard Kramer
- 11:30 - 11:40: Closing remarks
Tuesday June 23rd
- 07:00 - 07:15: Opening and welcome
- 07:15 - 08:45: Steganalysis session (part 1)
- #4 "Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid" by Hao Yang, Yongjian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang and Saimei Jiao
- #16 "Deep Audio Steganalysis in Time Domain" by Daewon Lee, Tae-Woo Oh and Kibom Kim
- #19 "Reinforcement Learning Aided Network Architecture Generation for JPEG Image" by Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang and Yun-Qing Shi
- 08:45 - 09:00: Break
- 09:00 - 10:00: Steganalysis session (part 2)
- #39 "Feature Aggregation Networks for Image Steganalysis" by Haneol Jang, Tae-Woo Oh and Kibom Kim
- #34 "Pixels-off: data-augmentation complementary solution for deep-learning steganalysis" by Mehdi Yedroudj, Marc CHAUMONT, Frederic Comby, Ahmed Oulad Amara and Patrick Bas
- 10:00 - 11:00: Social event
- 11:00 - 11:10: Closing remarks
Wednesday June 24th
- 07:00 - 07:15: Opening and welcome
- 07:15 - 08:45: Multimedia Forensics session
- #35 "Simulation of border control in an ongoing web-based experiment for estimating morphing" by Andrey Makrushin, Dennis Siegel and Jana Dittmann
- #43 "Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos" by Irene Amerini and Roberto Caldelli
- #26 "Photo Forensics From Rounding Artifacts" by Shruti Agarwal and Hany Farid
- 08:45 - 09:00: Break
- 09:00 - 10:00: Social event
- 10:00 - 11:00: Steganography session (part 1)
- #38 "Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and Its Detection" by Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert and Claus Vielhauer
- #41 "Simulating Suboptimal Steganographic Embedding" by Christy Kin-Cleaves and Andrew Kerr
- 11:00 - 11:10: Closing remarks
Thursday June 25th
- 07:00 - 07:15: Opening and welcome
- 07:15 - 08:30: Keynote "Game theoretic models and algorithms in cybersecurity" by Prof. Christopher Kiekintveld
- 08:30 - 08:45: Break
- 08:45 - 09:45: Steganography session (part 2)
- #20 "A robust video steganographic method against social networking transcoding based on steganographic side channel" by Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie and Xianfeng Zhao
- #32 "JPEG Steganography and Synchronization of DCT Coefficients for a Given Development" by Théo Taburet, Patrick Bas, Wadih Sawaya and Rémi COGRANNE
- 09:45 - 10:00: Break
- 10:00 - 11:00: Steganography session (part 3)
- #36 "Turning Cost-Based Steganography into Model-Based" by Jan Butora, Yassine Yousfi and Jessica Fridrich
- #44 "Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images" by Rémi COGRANNE, Quentin Giboulot and Patrick Bas
- 11:00 - 11:20: Best Paper Awards & Closing remarks