WIFS 2016 Dec. 4, 2016 to Dec. 7, 2016, abu dhabi,uae

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Single-image splicing localization through autoencoder-based anomaly detection Luisa Verdoliva , Davide Cozzolino N/A
Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization Jiwu Huang , Paweł Korus N/A
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder Mauro Barni , Benedetta Tondi , Zhipeng Chen N/A
Using 3D Face Model for Forensic Analysis of Lighting Environment Honggang Qi , Pulver Andrew , Siwei Lyu N/A
A Deep Learning Approach to Image Forgery Detection Jiangqun Ni , Yuan Rao N/A
Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model Panagiotis Andriotis , Gianluca Stringhini , Martina Angela Sasse N/A
Forensic Analysis of the Xbox One and PlayStation 4 Gaming Consoles Andrew Marrington , Farkhund Iqbal , Salam Khanji , Raja Jabir N/A
Cryptographic Randomness on a CC2538: a Case Study Theo Tryfonas , Elisabeth Oswald , Yan Yan N/A
Shared Keystroke Dataset for Continuous Authentication Shambhu Upadhyaya , Yan Sun , Hayreddin Ceker N/A
Defining Cost Functions for Adaptive Steganography at the Microscale Weiming Zhang , Nenghai Yu , Kejiang Chen , Hang Zhou , Guorui Feng N/A
Steganography via Cover-Source Switching Patrick Bas N/A
Multimedia Fingerprinting Codes Resistant Against Colluders and Noise Elena Egorova , Marcel Fernandez , Grigory Kabatiansky N/A
Dynamic Content Selection-and-Prediction Framework Applied to Reversible Data Hiding Hanzhou Wu , Hongxia Wang , Yunqing Shi N/A
An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials Arun Ross , Yaohui Ding N/A
On the Usefulness of Color for Kinship Verification from Face Images Xiaoting Wu , Elhocine Boutellaa , Miguel Bordallo Lopez , Xiaoyi Feng , Abdenour Hadid N/A
A Residual Feature-based Replay Attack Detection Approach for Brainprint Biometric Systems Wei Yang , Qiong Gui , Zhanpeng Jin , Maria V. Ruiz-blondet , Sarah Laszlo N/A
Effects of Text Filtering on Authentication Performance of Keystroke Biometric Daqing Hou , Jiaju Huang , Stephanie Schuckers N/A
Hash-Based Frame Selection for Video Phylogeny Paolo Bestagini , Stefano Tubaro , Filipe Costa , Silvia Lameri , Zanoni Dias , Anderson Rocha N/A
Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization Paolo Bestagini , Stefano Tubaro , Simone Milani N/A
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes Sohrab Ferdowsi , Slava Voloshynovskiy , Dimche Kostadinov , Taras Holotyak N/A
Scalable Secure Computation from ANSI-C Stefan Katzenbeisser , Niklas Buescher , David Kretzmer , Arnav Jindal N/A
Efficient and Secure Equality Tests Zekeriya Erkin , Majid Nateghizad , Reginald L. Lagendijk N/A
Image Denoising in the Encrypted Domain Fernando Perez-gonzalez , Alberto Pedrouzo-ulloa , Juan Ramón Troncoso-pastoriza N/A
Source Camera Attribution Using Stabilized Video Nasir Memon , Samet Taspinar , Manoranjan Mohanty N/A
Correlation Clustering for PRNU-based Blind Image Source Identification Luisa Verdoliva , Giovanni Poggi , Francesco Marra , Carlo Sansone N/A
Camera Model Identification With The Use of Deep Convolutional Neural Networks Marc Chaumont , Amel Tuama , Frederic Comby N/A
Anti-Forensic Technique for Median Filtering using L1-L2 TV Model Shishir Sharma , Subramanyam Venkata , Monika Jain , Ambuj Mehrish , Sabu Emmanuel N/A
Passive NAT Detection Using HTTP Access Logs Tomas Pevny , Martin Grill , Tomáš Komárek N/A
Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection Gabriel Maciá-fernández , José Camacho , Pedro García-teodoro , Rafael Rodríguez-gómez N/A
Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study Jérôme François , Marc Coudriau , Abdelkader Lahmadi N/A
Polar code for secure Wyner-Ziv coding Minh Thanh Vu , Tobias J. Oechtering , Mikael Skoglund N/A
On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information Quanyan Zhu , Anmol Monga N/A
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation Quanyan Zhu , Jeffrey Pawlick N/A
CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification, IEEE TIFS, July 2016 Zhanpeng Jin , Maria V. Ruiz-blondet , Sarah Laszlo N/A
Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification, IEEE TIFS, July 2016 Rui Wang , Hafiz Malik , Hong Zhao , Yifan Chen N/A
Information-Theoretic Secure Multi-Party Computation with Collusion-Deterrence, IEEE TIFS, August 2016 Zhaohong Wang , Sen-ching S. Cheung , Ying Luo N/A