Technical Program

We use the virtual conference format to hopefully better accommodate different time zones. The conference is extended to four days, but each of these days will only be a half-day.

The conference days are Monday, June 22 until Thursday, June 25. A conference day will be approximately four hours, spanning these times in various time zones:

  San Francisco    New York      Rome       Beijing  
  Start  7:00h 10:00h 16:00h 22:00h
  End  11:00h 14:00h 20:00h 02:00h

Start (PT) Start (CEST) Start (China) Day 1ng and welcome Day 2ng and welcome Day 3 Day 4
07:00 16:00 22:00 Opening Opening Opening Opening
  Keynote Steganalysis Multimedia Forensics Keynote
 
 
08:00 17:00 23:00
 
Break Break
Securityaaaa Break Break Steganography
09:00 18:00 00:00 Steganalysis Social event
 
 
Break
10:00 19:00 01:00 Social event

Steganography Steganography 
Break
  Security
 
11:00 20:00 02:00 Closing remarks Closing remarks Best Paper Awards
  Closing remarks
Closing remarks

Technical program in details (Times are displayed in PT)

Monday June 22nd

  • 07:00 - 07:15: Opening and welcome
  • 07:15 - 08:30: Keynote "Micro-signals for wellness and healthcare" by Prof. Min Wu
  • 08:30 - 08:45: Break
  • 08:45 - 10:15: Security session (part 1)
    • #15 "Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand" by Chen Wang, Jingjing Mu and Long Huang
    • #52 "LiveDI: An Anti-theft Model Based on Driving Behavior" by Hashim Abu-Gellban, Long Nguyen, Mahdi Moghadasi, Zhenhe Pan and Fang Jin
    • #6 "What if adversarial samples were digital images?" by Benoit Bonnet, Teddy Furon and Patrick Bas
  • 10:15 - 10:30: Break
  • 10:30 - 11:30: Security session (part 2)
    • #21 "Exploring the Difficulty of Hiding Keys in Neural Networks" by Tobias Kupek, Cecilia Pasquini and Rainer Böhme
    • #11 "Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage" by Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko and Gerhard Kramer
  • 11:30 - 11:40: Closing remarks

Tuesday June 23rd

  • 07:00 - 07:15: Opening and welcome
  • 07:15 - 08:45: Steganalysis session (part 1)
    • #4 "Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid" by Hao Yang, Yongjian Bao, Zhongliang Yang, Sheng Liu, Yongfeng Huang and Saimei Jiao
    • #16 "Deep Audio Steganalysis in Time Domain" by Daewon Lee, Tae-Woo Oh and Kibom Kim
    • #19 "Reinforcement Learning Aided Network Architecture Generation for JPEG Image" by Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang and Yun-Qing Shi
  • 08:45 - 09:00: Break
  • 09:00 - 10:00: Steganalysis session (part 2)
    • #39 "Feature Aggregation Networks for Image Steganalysis" by Haneol Jang, Tae-Woo Oh and Kibom Kim
    • #34 "Pixels-off: data-augmentation complementary solution for deep-learning steganalysis" by Mehdi Yedroudj, Marc CHAUMONT, Frederic Comby, Ahmed Oulad Amara and Patrick Bas
  • 10:00 - 11:00: Social event
  • 11:00 - 11:10: Closing remarks

Wednesday June 24th

  • 07:00 - 07:15: Opening and welcome
  • 07:15 - 08:45: Multimedia Forensics session
    • #35 "Simulation of border control in an ongoing web-based experiment for estimating morphing" by Andrey Makrushin, Dennis Siegel and Jana Dittmann
    • #43 "Exploiting prediction error inconsistencies through LSTM-based classifiers to detect deepfake videos" by Irene Amerini and Roberto Caldelli
    • #26 "Photo Forensics From Rounding Artifacts" by Shruti Agarwal and Hany Farid
  • 08:45 - 09:00: Break
  • 09:00 - 10:00: Social event
  • 10:00 - 11:00: Steganography session (part 1)
    • #38 "Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and Its Detection" by Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert and Claus Vielhauer
    • #41 "Simulating Suboptimal Steganographic Embedding" by Christy Kin-Cleaves and Andrew Kerr
  • 11:00 - 11:10: Closing remarks

Thursday June 25th

  • 07:00 - 07:15: Opening and welcome
  • 07:15 - 08:30: Keynote "Game theoretic models and algorithms in cybersecurity" by Prof. Christopher Kiekintveld
  • 08:30 - 08:45: Break
  • 08:45 - 09:45: Steganography session (part 2)
    • #20 "A robust video steganographic method against social networking transcoding based on steganographic side channel" by Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie and Xianfeng Zhao
    • #32 "JPEG Steganography and Synchronization of DCT Coefficients for a Given Development" by Théo Taburet, Patrick Bas, Wadih Sawaya and Rémi COGRANNE
  • 09:45 - 10:00: Break
  • 10:00 - 11:00: Steganography session (part 3)
    • #36 "Turning Cost-Based Steganography into Model-Based" by Jan Butora, Yassine Yousfi and Jessica Fridrich
    • #44 "Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images" by Rémi COGRANNE, Quentin Giboulot and Patrick Bas
  • 11:00 - 11:20: Best Paper Awards & Closing remarks