Title |
Speakers |
Summary |
Topic Types |
Single-image splicing localization through autoencoder-based anomaly detection |
Luisa Verdoliva
,
Davide Cozzolino
|
N/A |
|
Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization |
Jiwu Huang
,
Paweł Korus
|
N/A |
|
Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder |
Mauro Barni
,
Benedetta Tondi
,
Zhipeng Chen
|
N/A |
|
Using 3D Face Model for Forensic Analysis of Lighting Environment |
Honggang Qi
,
Pulver Andrew
,
Siwei Lyu
|
N/A |
|
A Deep Learning Approach to Image Forgery Detection |
Jiangqun Ni
,
Yuan Rao
|
N/A |
|
Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model |
Panagiotis Andriotis
,
Gianluca Stringhini
,
Martina Angela Sasse
|
N/A |
|
Forensic Analysis of the Xbox One and PlayStation 4 Gaming Consoles |
Andrew Marrington
,
Farkhund Iqbal
,
Salam Khanji
,
Raja Jabir
|
N/A |
|
Cryptographic Randomness on a CC2538: a Case Study |
Theo Tryfonas
,
Elisabeth Oswald
,
Yan Yan
|
N/A |
|
Shared Keystroke Dataset for Continuous Authentication |
Shambhu Upadhyaya
,
Yan Sun
,
Hayreddin Ceker
|
N/A |
|
Defining Cost Functions for Adaptive Steganography at the Microscale |
Weiming Zhang
,
Nenghai Yu
,
Kejiang Chen
,
Hang Zhou
,
Guorui Feng
|
N/A |
|
Steganography via Cover-Source Switching |
Patrick Bas
|
N/A |
|
Multimedia Fingerprinting Codes Resistant Against Colluders and Noise |
Elena Egorova
,
Marcel Fernandez
,
Grigory Kabatiansky
|
N/A |
|
Dynamic Content Selection-and-Prediction Framework Applied to Reversible Data Hiding |
Hanzhou Wu
,
Hongxia Wang
,
Yunqing Shi
|
N/A |
|
An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials |
Arun Ross
,
Yaohui Ding
|
N/A |
|
On the Usefulness of Color for Kinship Verification from Face Images |
Xiaoting Wu
,
Elhocine Boutellaa
,
Miguel Bordallo Lopez
,
Xiaoyi Feng
,
Abdenour Hadid
|
N/A |
|
A Residual Feature-based Replay Attack Detection Approach for Brainprint Biometric Systems |
Wei Yang
,
Qiong Gui
,
Zhanpeng Jin
,
Maria V. Ruiz-blondet
,
Sarah Laszlo
|
N/A |
|
Effects of Text Filtering on Authentication Performance of Keystroke Biometric |
Daqing Hou
,
Jiaju Huang
,
Stephanie Schuckers
|
N/A |
|
Hash-Based Frame Selection for Video Phylogeny |
Paolo Bestagini
,
Stefano Tubaro
,
Filipe Costa
,
Silvia Lameri
,
Zanoni Dias
,
Anderson Rocha
|
N/A |
|
Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization |
Paolo Bestagini
,
Stefano Tubaro
,
Simone Milani
|
N/A |
|
Fast content identification in high-dimensional feature spaces using Sparse Ternary Codes |
Sohrab Ferdowsi
,
Slava Voloshynovskiy
,
Dimche Kostadinov
,
Taras Holotyak
|
N/A |
|
Scalable Secure Computation from ANSI-C |
Stefan Katzenbeisser
,
Niklas Buescher
,
David Kretzmer
,
Arnav Jindal
|
N/A |
|
Efficient and Secure Equality Tests |
Zekeriya Erkin
,
Majid Nateghizad
,
Reginald L. Lagendijk
|
N/A |
|
Image Denoising in the Encrypted Domain |
Fernando Perez-gonzalez
,
Alberto Pedrouzo-ulloa
,
Juan Ramón Troncoso-pastoriza
|
N/A |
|
Source Camera Attribution Using Stabilized Video |
Nasir Memon
,
Samet Taspinar
,
Manoranjan Mohanty
|
N/A |
|
Correlation Clustering for PRNU-based Blind Image Source Identification |
Luisa Verdoliva
,
Giovanni Poggi
,
Francesco Marra
,
Carlo Sansone
|
N/A |
|
Camera Model Identification With The Use of Deep Convolutional Neural Networks |
Marc Chaumont
,
Amel Tuama
,
Frederic Comby
|
N/A |
|
Anti-Forensic Technique for Median Filtering using L1-L2 TV Model |
Shishir Sharma
,
Subramanyam Venkata
,
Monika Jain
,
Ambuj Mehrish
,
Sabu Emmanuel
|
N/A |
|
Passive NAT Detection Using HTTP Access Logs |
Tomas Pevny
,
Martin Grill
,
Tomáš Komárek
|
N/A |
|
Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection |
Gabriel Maciá-fernández
,
José Camacho
,
Pedro García-teodoro
,
Rafael Rodríguez-gómez
|
N/A |
|
Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study |
Jérôme François
,
Marc Coudriau
,
Abdelkader Lahmadi
|
N/A |
|
Polar code for secure Wyner-Ziv coding |
Minh Thanh Vu
,
Tobias J. Oechtering
,
Mikael Skoglund
|
N/A |
|
On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information |
Quanyan Zhu
,
Anmol Monga
|
N/A |
|
A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation |
Quanyan Zhu
,
Jeffrey Pawlick
|
N/A |
|
CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification, IEEE TIFS, July 2016 |
Zhanpeng Jin
,
Maria V. Ruiz-blondet
,
Sarah Laszlo
|
N/A |
|
Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification, IEEE TIFS, July 2016 |
Rui Wang
,
Hafiz Malik
,
Hong Zhao
,
Yifan Chen
|
N/A |
|
Information-Theoretic Secure Multi-Party Computation with Collusion-Deterrence, IEEE TIFS, August 2016 |
Zhaohong Wang
,
Sen-ching S. Cheung
,
Ying Luo
|
N/A |
|