


default search action
11th IH&MMSec 2023: Chicago, IL, USA
- Daniel Moreira
, Aparna Bharati, Cecilia Pasquini, Yassine Yousfi:
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2023, Chicago, IL, USA, June 28-30, 2023. ACM 2023 - Walter J. Scheirer
:
Photoshop Fantasies. 1 - Jennifer L. Newman
:
Steganography on Mobile Apps. 3 - Xiaoming Liu
:
On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations. 5 - Yaodong Fang, Yuanding Zhou, Xinran Li, Ping Kong, Chuan Qin:
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints. 7-12 - Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. 13-18 - Dengyong Zhang, Pu Huang, Xiangling Ding
, Feng Li, Gaobo Yang:
Video Frame Interpolation via Multi-scale Expandable Deformable Convolution. 19-28 - Etienne Levecque
, Patrick Bas
, Jan Butora
:
Compatibility and Timing Attacks for JPEG Steganalysis. 29-35 - Eli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich:
On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests. 37-46 - Nora Hofer
, Rainer Böhme
:
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics. 47-58 - Jan Butora, Patrick Bas, Rémi Cogranne:
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack. 59-66 - Eli Dworetzky, Edgar Kaziakhmedov, Jessica J. Fridrich:
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice. 67-79 - Edgar Kaziakhmedov, Eli Dworetzky, Jessica J. Fridrich:
Limits of Data Driven Steganography Detectors. 81-90 - Na Zhao
, Kejiang Chen
, Chuan Qin
, Yi Yin
, Weiming Zhang
, Nenghai Yu
:
Calibration-based Steganalysis for Neural Network Steganography. 91-96 - Juan Wen, Liting Gao
, Guangying Fan, Ziwei Zhang, Jianghao Jia, Yiming Xue:
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning. 97-102 - Cheng Li
, Xinhui Han
, Wenfa Qi
, Zongming Guo
:
An Improved Reversible Database Watermarking Method based on Histogram Shifting. 103-114 - Scott Craver, Nicholas Rosbrook:
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections. 115-120 - Simon Kirchgasser
, Christof Kauba
, Bernhard Prommegger
, Fabio Monticelli
, Andreas Uhl
:
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition. 121-126 - Oubaïda Chouchane
, Michele Panariello, Oualid Zari, Ismet Kerenciler, Imen Chihaoui, Massimiliano Todisco, Melek Önen:
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics. 127-132 - Andreas Vorderleitner
, Jutta Hämmerle-Uhl
, Andreas Uhl
:
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts. 133-138 - Lukas Lamminger
, Heinz Hofbauer
, Andreas Uhl
:
First Learning Steps to Recognize Faces in the Noise. 139-144 - Brandon B. May, Kirill Trapeznikov, Shengbang Fang, Matthew C. Stamm:
Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools. 145-150 - Nanqing Xu
, Weiwei Feng
:
MetaFake: Few-shot Face Forgery Detection with Meta Learning. 151-156 - Kratika Bhagtani
, Emily R. Bartusiak
, Amit Kumar Singh Yadav
, Paolo Bestagini
, Edward J. Delp
:
Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer. 157-162 - Ziyue Xiang
, Amit Kumar Singh Yadav
, Stefano Tubaro
, Paolo Bestagini
, Edward J. Delp
:
Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech Detection. 163-168 - Yue Zhou
, Bing Fan
, Pradeep K. Atrey, Feng Ding:
Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis. 169-174 - Arian Beckmann, Anna Hilsmann, Peter Eisert:
Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes. 175-180

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.