Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Table of Contents
IH&MMSec 2017 Workshop Organization ...vii
IH&MMSec 2017 Sponsors & Supporters ix
Keynote Address 1
• Every Move You Make: Tracking Smartphone Users through Motion Sensors,
1
Anupam Das (Carnegie Mellon University)
Session: Media Forensics & Counterforensics
• Information-theoretic Bounds of Resampling Forensics: New Evidence
for Traces Beyond Cyclostationarity 3
Cecilia Pasquini (University ofMiinster& Universitdt Innsbruck),Rainer Bohme (Universitdt Innsbruck & University ofMiinster)
• Countering Anti-Forensics of Lateral Chromatic Aberration 15
Owen Mayer, Matthew C. Stamm (Drexel University)
• Modeling Attacks on Photo-ID Documents and Applying Media Forensics
for the Detection of Facial Morphing 21
Christian Kraetzer, Andrey Makrushin, Tom Neubert, Mario Hildebrandt,
Jana Dittmann (Otto-von-Guericke University)
Session: Steganography & Steganalysis
• The Square Root Law of Steganography: Bringing Theory Closer to Practice 33
Andrew D. Ker (University ofOxford)
• Nonlinear Feature Normalization in Steganalysis 45
Mehdi Boroumand, Jessica Fridrich (Binghamton University)
• Improving GFR Steganalysis Features by Using Gabor Symmetry and WeightedHistograms 55
Chao Xia, Qingxiao Guan, Xianfeng Zhao (Chinese Academy ofSciences& University ofChinese Academy of Sciences),Zhoujun Xu, Yi Ma (Beijing Information Technology Institute)
Session: Deep Learning for Steganalysis• Deep Convolutional Neural Network to Detect J-UNIWARD 67
Guanshuo Xu (independent researcher),
• JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images 75
Mo Chen, Vahid Sedighi, Mehdi Boroumand, Jessica Fridrich (Binghamton Universtiy)
• Audio Steganalysis with Convolutional Neural Network 85
Bolin Chen, Weiqi Luo, Haodong Li (Sun Yat-sen University)
Keynote Address 2
• Using Stylometry to Attribute Programmers and Writers 91
Rachel Greenstadt (Drexel University)
Session: Data Hiding in Natural Language, Watermarking• Towards Imperceptible Natural Language Watermarking for German 93
Oren Halvani, Martin Steinebach, Lukas Graner (FraunhoferInstitutefor Secure Information Technology SIT)
• Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to
Generate Chinese Classic Poetry 99
Yubo Luo, Yongfeng Huang (Tsinghua University)
v
• Audio Reversible Watermarking Scheme in the intDCT Domain
with Modified Prediction Error Expansion 105
Alejandra Menendez-Ortiz, Claudia Feregrino-Uribe (INAOE), Jose Juan Garcia-Hernandez (CINVESTAV)
• A Minimum Distortion - High Capacity Watermarking Technique for Relational Data IllMailed L. Perez Gort, Claudia Feregrino Uribe (National Institute ofAstrophysics, Optics and Electronics),Jyrki Nummenmaa (University ofTampere)
Session: Video Steganalysis• A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods
for H.264/AVC Videos 123Peipei Wang, Yun Cao, Xianfeng Zhao (Chinese Academy ofSciences & University ofChinese Academy ofSciences),Meineng Zhu (Beijing Institute of Electronics Technology and Application)
• Combined and Calibrated Features for Steganalysis of Motion Vector-Based
Steganography in H.264/AVC 135Liming Zhai, Lina Wang, Yanzhen Ren (Wuhan University)
Session: Deep Learning for Media Forensics
• A Generic Approach Towards Image Manipulation Parameter Estimation
Using Convolutional Neural Networks 147Belhassen Bayar, Matthew C. Stamm (Drexel University)
• Recasting Residual-based Local Descriptors as Convolutional Neural Networks:
An Application to Image Forgery Detection 159Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva (University Federico U ofNaples)
• Image Forensics Based on Transfer Learning and Convolutional Neural Network 165Yifeng Zhan, Yifang Chen, Qiong Zhang, Xiangui Kang (Sun Yat-Sen University)
Author Index171
vi