default search action
11th IH&MMSec 2023: Chicago, IL, USA
- Daniel Moreira, Aparna Bharati, Cecilia Pasquini, Yassine Yousfi:
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2023, Chicago, IL, USA, June 28-30, 2023. ACM 2023 - Walter J. Scheirer:
Photoshop Fantasies. 1 - Jennifer L. Newman:
Steganography on Mobile Apps. 3 - Xiaoming Liu:
On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations. 5 - Yaodong Fang, Yuanding Zhou, Xinran Li, Ping Kong, Chuan Qin:
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints. 7-12 - Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. 13-18 - Dengyong Zhang, Pu Huang, Xiangling Ding, Feng Li, Gaobo Yang:
Video Frame Interpolation via Multi-scale Expandable Deformable Convolution. 19-28 - Etienne Levecque, Patrick Bas, Jan Butora:
Compatibility and Timing Attacks for JPEG Steganalysis. 29-35 - Eli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich:
On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests. 37-46 - Nora Hofer, Rainer Böhme:
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics. 47-58 - Jan Butora, Patrick Bas, Rémi Cogranne:
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack. 59-66 - Eli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich:
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice. 67-79 - Edgar Kaziakhmedov, Eli Dworetzky, Jessica J. Fridrich:
Limits of Data Driven Steganography Detectors. 81-90 - Na Zhao, Kejiang Chen, Chuan Qin, Yi Yin, Weiming Zhang, Nenghai Yu:
Calibration-based Steganalysis for Neural Network Steganography. 91-96 - Juan Wen, Liting Gao, Guangying Fan, Ziwei Zhang, Jianghao Jia, Yiming Xue:
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning. 97-102 - Cheng Li, Xinhui Han, Wenfa Qi, Zongming Guo:
An Improved Reversible Database Watermarking Method based on Histogram Shifting. 103-114 - Scott Craver, Nicholas Rosbrook:
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections. 115-120 - Simon Kirchgasser, Christof Kauba, Bernhard Prommegger, Fabio Monticelli, Andreas Uhl:
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition. 121-126 - Oubaïda Chouchane, Michele Panariello, Oualid Zari, Ismet Kerenciler, Imen Chihaoui, Massimiliano Todisco, Melek Önen:
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics. 127-132 - Andreas Vorderleitner, Jutta Hämmerle-Uhl, Andreas Uhl:
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts. 133-138 - Lukas Lamminger, Heinz Hofbauer, Andreas Uhl:
First Learning Steps to Recognize Faces in the Noise. 139-144 - Brandon B. May, Kirill Trapeznikov, Shengbang Fang, Matthew C. Stamm:
Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools. 145-150 - Nanqing Xu, Weiwei Feng:
MetaFake: Few-shot Face Forgery Detection with Meta Learning. 151-156 - Kratika Bhagtani, Emily R. Bartusiak, Amit Kumar Singh Yadav, Paolo Bestagini, Edward J. Delp:
Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer. 157-162 - Ziyue Xiang, Amit Kumar Singh Yadav, Stefano Tubaro, Paolo Bestagini, Edward J. Delp:
Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech Detection. 163-168 - Yue Zhou, Bing Fan, Pradeep K. Atrey, Feng Ding:
Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis. 169-174 - Arian Beckmann, Anna Hilsmann, Peter Eisert:
Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes. 175-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.