IH&MMSec C

22 papers

YearTitle / Authors
2022A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain.
Denghao Li, Jianzong Wang, Lingwei Kong, Shijing Si, Zhangcheng Huang, Chenyu Huang, Jing Xiao
2022AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation.
Zhijun Wu, Junjun Guo
2022BlindSpot: Watermarking Through Fairness.
Sofiane Lounici, Melek Önen, Orhan Ermis, Slim Trabelsi
2022Capacity Laws for Steganography in a Crowd.
Andrew D. Ker
2022Collusion-resistant Fingerprinting of Parallel Content Channels.
Basheer Joudeh, Boris Skoric
2022Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption.
Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, Melek Önen
2022Covert Channels in Network Time Security.
Kevin Lamshöft, Jana Dittmann
2022Covert Communications through Imperfect Cancellation.
Daniel Chew, Christine Nguyen, Samuel Berhanu, Chris Baumgart, A. Brinton Cooper
2022Detector-Informed Batch Steganography and Pooled Steganalysis.
Yassine Yousfi, Eli Dworetzky, Jessica J. Fridrich
2022Domain Adaptational Text Steganalysis Based on Transductive Learning.
Yiming Xue, Boya Yang, Yaqian Deng, Wanli Peng, Juan Wen
2022FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection.
Gen Li, Xianfeng Zhao, Yun Cao, Pengfei Pei, Jinchuan Li, Zeyu Zhang
2022Few-shot Text Steganalysis Based on Attentional Meta-learner.
Juan Wen, Ziwei Zhang, Yu Yang, Yiming Xue
2022Fighting the Reverse JPEG Compatibility Attack: Pick your Side.
Jan Butora, Patrick Bas
2022Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics.
Stefan Kiltz, Robert Altschaffel, Jana Dittmann
2022Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification.
Árpád Berta, Gábor Danner, István Hegedüs, Márk Jelasity
2022IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022
B. S. Manjunath, Jan Butora, Benedetta Tondi, Claus Vielhauer
2022Identity-Referenced Deepfake Detection with Contrastive Learning.
Dongyao Shen, Youjian Zhao, Chengbin Quan
2022Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models.
Farinaz Koushanfar
2022Know Your Library: How the libjpeg Version Influences Compression and Decompression Results.
Martin Benes, Nora Hofer, Rainer Böhme
2022Looking for Signals: A Systems Security Perspective.
Christopher Kruegel
2022Sparse Trigger Pattern Guided Deep Learning Model Watermarking.
Chun-Shien Lu
2022Towards Generalization in Deepfake Detection.
Luisa Verdoliva