Information Hiding and Multimedia Security Workshop最新文献

筛选
英文 中文
Detection and classification of double compressed MP3 audio tracks 双压缩MP3音轨的检测与分类
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482523
T. Bianchi, A. D. Rosa, M. Fontani, Giovanni Rocciolo, A. Piva
{"title":"Detection and classification of double compressed MP3 audio tracks","authors":"T. Bianchi, A. D. Rosa, M. Fontani, Giovanni Rocciolo, A. Piva","doi":"10.1145/2482513.2482523","DOIUrl":"https://doi.org/10.1145/2482513.2482523","url":null,"abstract":"In this paper, a method to detect the presence of double compression in a MP3 audio file is proposed. By exploiting the effect of double compression in the statistical properties of quantized MDCT coefficients, a single measure is derived to decide if a MP3 file is single compressed or it has been double compressed and also to devise the bit-rate of the first compression. Experimental results confirm the performance of the detector, mainly when the bit-rate of the second compression is higher than the bit-rate of the first one.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the intertwining of information hiding and multimedia security: a personal perspective 论信息隐藏与多媒体安全的交织:个人视角
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2484424
A. Ho
{"title":"On the intertwining of information hiding and multimedia security: a personal perspective","authors":"A. Ho","doi":"10.1145/2482513.2484424","DOIUrl":"https://doi.org/10.1145/2482513.2484424","url":null,"abstract":"Over the past decade or so, the tremendous growth and proliferation of multimedia content has led to the important need to protect and verify the content integrity, particularly if the data are to be used for law enforcement, media, legal and financial applications. This has resulted in the research and applications of information hiding, and multimedia security and forensics becoming more and more integrated and intertwined and as clearly demonstrated, amongst other common activities, with the merging of the two prestigious and popular conferences of IH and ACM MMSec into ACM IHMMSEC'2013.\u0000 In this keynote presentation, I will present a personal perspective on some of the various changes, challenges, threats and opportunities in the areas of watermarking, steganography/steganalysis, and multimedia security and forensics that I have faced and experienced since I first stumbled upon digital watermarking and steganography some 16 years ago which I am still very much actively involved today. The talk with provide a chronological overview of some key milestones related to watermarking, information hiding and digital forensics, as well as including some personal events from setting up and managing a University spinout, to technology transfer and product commercialization.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics JPEG反取证采用非参数DCT量化噪声估计和自然图像统计
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482536
Wei Fan, K. Wang, François Cayre, Z. Xiong
{"title":"JPEG anti-forensics using non-parametric DCT quantization noise estimation and natural image statistics","authors":"Wei Fan, K. Wang, François Cayre, Z. Xiong","doi":"10.1145/2482513.2482536","DOIUrl":"https://doi.org/10.1145/2482513.2482536","url":null,"abstract":"This paper proposes an anti-forensic method that disguises the footprints left by JPEG compression, whose objective is to fool existing JPEG forensic detectors while keeping a high visual quality of the processed image. First we examine the reliability of existing detectors and point out the potential vulnerability of the quantization table estimation based detector. Then we construct a new, non-parametric method to DCT histogram smoothing without any histogram statistical model. Finally JPEG forensic detectors are fooled by optimizing an objective function considering both the anti-forensic terms and a natural image statistical model. We show that compared to the state-of-the-art methods the proposed JPEG anti-forensic method is able to achieve a higher image visual quality while being undetectable under existing detectors.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127300186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Document authentication using graphical codes: impacts of the channel model 文档认证使用图形代码:通道模型的影响
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482538
A. Ho, Bao An Mai Hoang, W. Sawaya, P. Bas
{"title":"Document authentication using graphical codes: impacts of the channel model","authors":"A. Ho, Bao An Mai Hoang, W. Sawaya, P. Bas","doi":"10.1145/2482513.2482538","DOIUrl":"https://doi.org/10.1145/2482513.2482538","url":null,"abstract":"This paper proposes to investigate the impact of the channel model for authentication systems based on codes that are corrupted by a physically unclonable noise such as the one emitted by a printing process. The core of such a system is the comparison for the receiver between an original binary code, an original corrupted code and a copy of the original code. We analyze two strategies, depending on whether or not the receiver use a binary version of its observation to perform its authentication test. By deriving the optimal test within a Neyman-Pearson setup, a theoretical analysis shows that a thresholding of the code induces a loss of performance. This study also highlights the fact that the probability of the type I and type II errors can be better approximated, by several orders of magnitude, computing Chernoff bounds instead of the Gaussian approximation. Finally we evaluate the impact of an uncertainty for the receiver on the opponent channel and show that the authentication is still possible whenever the receiver can observe forged codes and uses them to estimate the parameters of the model.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021 IH&MMSec '21: ACM信息隐藏与多媒体安全研讨会,虚拟事件,比利时,6月22-25日,2021
Information Hiding and Multimedia Security Workshop Pub Date : 1900-01-01 DOI: 10.1145/3437880
{"title":"IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021","authors":"","doi":"10.1145/3437880","DOIUrl":"https://doi.org/10.1145/3437880","url":null,"abstract":"","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信