default search action
10th IH&MMSec 2022: Santa Barbara, CA, USA
- B. S. Manjunath, Jan Butora, Benedetta Tondi, Claus Vielhauer:
IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022. ACM 2022, ISBN 978-1-4503-9355-3 - Luisa Verdoliva:
Towards Generalization in Deepfake Detection. 1 - Christopher Kruegel:
Looking for Signals: A Systems Security Perspective. 3 - Farinaz Koushanfar:
Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models. 5 - Gen Li, Xianfeng Zhao, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang:
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection. 7-18 - Martin Benes, Nora Hofer, Rainer Böhme:
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results. 19-25 - Dongyao Shen, Youjian Zhao, Chengbin Quan:
Identity-Referenced Deepfake Detection with Contrastive Learning. 27-32 - Chun-Shien Lu:
Sparse Trigger Pattern Guided Deep Learning Model Watermarking. 33-38 - Sofiane Lounici, Melek Önen, Orhan Ermis, Slim Trabelsi:
BlindSpot: Watermarking Through Fairness. 39-50 - Árpád Berta, Gábor Danner, István Hegedüs, Márk Jelasity:
Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification. 51-62 - Daniel Chew, Christine Nguyen, Samuel Berhanu, Chris Baumgart, A. Brinton Cooper:
Covert Communications through Imperfect Cancellation. 63-68 - Kevin Lamshöft, Jana Dittmann:
Covert Channels in Network Time Security. 69-79 - Basheer Joudeh, Boris Skoric:
Collusion-resistant Fingerprinting of Parallel Content Channels. 81-89 - Yiming Xue, Boya Yang, Yaqian Deng, Wanli Peng, Juan Wen:
Domain Adaptational Text Steganalysis Based on Transductive Learning. 91-96 - Juan Wen, Ziwei Zhang, Yu Yang, Yiming Xue:
Few-shot Text Steganalysis Based on Attentional Meta-learner. 97-106 - Stefan Kiltz, Robert Altschaffel, Jana Dittmann:
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics. 107-112 - Jan Butora, Patrick Bas:
Fighting the Reverse JPEG Compatibility Attack: Pick your Side. 113-121 - Denghao Li, Jianzong Wang, Lingwei Kong, Shijing Si, Zhangcheng Huang, Chenyu Huang, Jing Xiao:
A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain. 123-128 - Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen:
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption. 129-139 - Zhijun Wu, Junjun Guo:
AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation. 141-146 - Andrew D. Ker:
Capacity Laws for Steganography in a Crowd. 147-156 - Yassine Yousfi, Eli Dworetzky, Jessica J. Fridrich:
Detector-Informed Batch Steganography and Pooled Steganalysis. 157-168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.