Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security最新文献

筛选
英文 中文
Session details: Media Forensics 会话详细信息:媒体取证
P. Bas
{"title":"Session details: Media Forensics","authors":"P. Bas","doi":"10.1145/3252240","DOIUrl":"https://doi.org/10.1145/3252240","url":null,"abstract":"","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Covert Channels 会话细节:隐蔽通道
Gwenael Doerr
{"title":"Session details: Covert Channels","authors":"Gwenael Doerr","doi":"10.1145/3252239","DOIUrl":"https://doi.org/10.1145/3252239","url":null,"abstract":"","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122937885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Honey Encryption: Application to Steganography 视觉蜂蜜加密:隐写术的应用
J. Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwang-Man Lee
{"title":"Visual Honey Encryption: Application to Steganography","authors":"J. Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwang-Man Lee","doi":"10.1145/2756601.2756606","DOIUrl":"https://doi.org/10.1145/2756601.2756606","url":null,"abstract":"Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression Topography 枪械自动识别:利用一种新的多片形(MSS)方法对射针凹痕形貌进行比较和匹配
R. Fischer, C. Vielhauer
{"title":"Automated Firearm Identification: On using a novel Multiple-Slice-Shape (MSS) Approach for Comparison and Matching of Firing Pin Impression Topography","authors":"R. Fischer, C. Vielhauer","doi":"10.1145/2756601.2756619","DOIUrl":"https://doi.org/10.1145/2756601.2756619","url":null,"abstract":"The examination of firearm related toolmarks impressed to cartridges and bullets is a well known forensic discipline. The application of three dimensional imaging systems and pattern recognition techniques for automatic comparison and matching of topographic data is a central field of research in the domain of digital crime scene analysis. In this work, we introduce and evaluate a novel Multiple-Slice-Shape (MSS) approach with the objective to closer link the preprocessing and feature extraction stages and improve the automated examinations of firearm toolmark surface data. We employ two existing features which are applied to the topography of firing pin impressions and aim at an automatic matching of the shapes based on multiple line-profile measurement. We suggest several modifications of the original Multiple-Angle-Path (MAP) and Multiple-Circle-Path (MCP) features to achieve an optimal integration into the proposed processing pipeline. Our evaluation approach is three-fold. First, we aim at the determination of an initial parameterization for MSS processing and feature extraction. Second, we evaluate the accuracy of discrimination for two firearms of the same mark and model. Third, we evaluate the accuracy using six different weapons. The test set contains 72 cartridge samples including six guns and three ammunition manufactures. Regarding the first evaluation, the results indicate an improvement of the accuracy for both features. Regarding the second evaluation, the achieved accuracy ranges between 67% and 100% for the MAP feature, and between 92% and 100% for the MCP feature. With respect to the third evaluation, the best result is achieved for MAP32 with 73% and for MCP15 with 92% compared to 56% and 82% correct classification rate regarding the original versions. It is supposed that various 3D spatial features can be combined and maybe improved by using the proposed MSS approach. We motivate the evaluation of this question for future work.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128496085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Video Steganography Based on Optimized Motion Estimation Perturbation 基于优化运动估计摄动的视频隐写
Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu
{"title":"Video Steganography Based on Optimized Motion Estimation Perturbation","authors":"Yun Cao, Hong Zhang, Xianfeng Zhao, Haibo Yu","doi":"10.1145/2756601.2756609","DOIUrl":"https://doi.org/10.1145/2756601.2756609","url":null,"abstract":"In this paper, a novel motion vector-based video steganographic scheme is proposed, which is capable of withstanding the current best statistical detection method. With this scheme, secret message bits are embedded into motion vector (MV) values by slightly perturbing their motion estimation (ME) processes. In general, two measures are taken for steganographic security (statistical undetectability) enhancement. First, the ME perturbations are optimized ensuring the modified MVs are still local optimal, which essentially makes targeted detectors ineffective. Secondly, to minimize the overall embedding impact under a given relative payload, a double-layered coding structure is used to control the ME perturbations. Experimental results demonstrate that the proposed scheme achieves a much higher level of security compared with other existing MV-based approaches. Meanwhile, the reconstructed visual quality and the coding efficiency are slightly affected as well.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130993634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters 基于二维Gabor滤波器的自适应JPEG隐写分析
Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang
{"title":"Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters","authors":"Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang","doi":"10.1145/2756601.2756608","DOIUrl":"https://doi.org/10.1145/2756601.2756608","url":null,"abstract":"Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when the embedding changes are constrained to the complicated texture regions, then a steganalysis feature extraction method is proposed based on 2 dimensional (2D) Gabor filters. The 2D Gabor filters have certain optimal joint localization properties in the spatial domain and in the spatial frequency domain. They can describe the image texture features from different scales and orientations, therefore the changes of image statistical characteristics caused by steganography embedding can be captured more effectively. For the proposed feature extraction method, the decompressed JPEG image is filtered by 2D Gabor filters with different scales and orientations firstly. Then, the histogram features are extracted from all the filtered images.Lastly, the ensemble classifier is used to assemble the proposed steganalysis feature as well as the final steganalyzer. The experimental results show that the proposed steganalysis feature can achieve a competitive performance by comparing with the other steganalysis features when they are used for the detection performance of adaptive JPEG steganography such as UED, JUNIWARD and SI-UNIWARD.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 260
3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure 基于直方图的圆移位编码结构的3D打印扫描弹性水印
Jong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee
{"title":"3D Print-Scan Resilient Watermarking Using a Histogram-Based Circular Shift Coding Structure","authors":"Jong-Uk Hou, Do-Gon Kim, Sunghee Choi, Heung-Kyu Lee","doi":"10.1145/2756601.2756607","DOIUrl":"https://doi.org/10.1145/2756601.2756607","url":null,"abstract":"3D printing content is a new form of content being distributed in digital as well as analog domains. Therefore, its security is the biggest technical challenge of the content distribution service. In this paper, we analyze the 3D print-scan process, and we organize possible distortions according to the processes with respect to 3D mesh watermarking. Based on the analysis, we propose a circular shift coding structure for the 3D model. When the rotating disks of the coding structure are aligned in parallel to the layers of the 3D printing, the structure preserves a statistical feature of each disk from the layer dividing process. Based on the circular shift coding structure, we achieve a 3D print-scan resilient watermarking scheme. In experimental tests, the proposed scheme is robust against such signal processing, and cropping attacks. Furthermore, the embedded information is not lost after 3D print-scan process.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124391508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A Negative Number Vulnerability for Histogram-based Face Recognition Systems 基于直方图的人脸识别系统的负数漏洞
Alireza Farrokh Baroughi, S. Craver, Mohammed Faizan Mohsin
{"title":"A Negative Number Vulnerability for Histogram-based Face Recognition Systems","authors":"Alireza Farrokh Baroughi, S. Craver, Mohammed Faizan Mohsin","doi":"10.1145/2756601.2756617","DOIUrl":"https://doi.org/10.1145/2756601.2756617","url":null,"abstract":"A popular method of face identification is the use of local binary pattern (LBP) histograms. In this method, a face image is partitioned into regions, and a histogram of features is produced for each region; faces are compared by measuring the similarity of their histograms through statistics such as chi-square score or K-L divergence. Comparison of histograms, however, is particularly prone to exploitation via a negative-number bug if coded naively. This allows a surprisingly precise and powerful attack: if an adversary can alter a histogram to change a single zero to a negative number of appropriate magnitude, the change will induce a negligible difference in matching under ordinary use, but match an attacker to an intended victim if the attacker briefly displays a printed striped pattern to a camera. This tampering is minor and can be inflicted long before the attack, allowing the insertion of a back door in a face recognition system that will behave normally until the moment of exploitation. We exhibit an example of this bug in the wild, in the OpenCV computer vision library, and illustrate the effectiveness of this attack in impersonating multiple victims.","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134138886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Keynote Address 会议详情:主题演讲
A. Alattar
{"title":"Session details: Keynote Address","authors":"A. Alattar","doi":"10.1145/3252237","DOIUrl":"https://doi.org/10.1145/3252237","url":null,"abstract":"","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Watermarking and Fingerprinting 会话详细信息:水印和指纹
P. Comesaña
{"title":"Session details: Watermarking and Fingerprinting","authors":"P. Comesaña","doi":"10.1145/3252241","DOIUrl":"https://doi.org/10.1145/3252241","url":null,"abstract":"","PeriodicalId":153680,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信