{"title":"Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans","authors":"A. Makrushin, Dennis Siegel, J. Dittmann","doi":"10.1145/3369412.3395073","DOIUrl":"https://doi.org/10.1145/3369412.3395073","url":null,"abstract":"A morphed face image injected into an identity document destroys the unique link between a person and a document meaning that such a multi-identity document may be successfully used by several persons for face-recognition-based identity verification. A morphed face in an electronic machine readable travel document may allow a wanted criminal to illicitly cross a border. This paper describes an improvement of our ongoing web-based experiment for a border control simulation in which human examiners should first detect high-resolution morphed face images and second match potentially morphed document images against \"live\" faces of travelers. The error rates of humans in both parts of the experiment are compared with those of automated morphing detectors and face recognition systems. This experiment improves understanding the capabilities and limits of humans in withstanding the face morphing attack as well as the factors influencing their performance.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123106381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images","authors":"R. Cogranne, Quentin Giboulot, P. Bas","doi":"10.1145/3369412.3395075","DOIUrl":"https://doi.org/10.1145/3369412.3395075","url":null,"abstract":"This short paper presents a novel method for steganography in JPEG-compressed images, extended the so-called MiPOD scheme based on minimizing the detection accuracy of the most-powerful test using a Gaussian model of independent DCT coefficients. This method is also applied to address the problem of embedding into color JPEG images. The main issue in such case is that color channels are not processed in the same way and, hence, a statistically based approach is expected to bring significant improvements when one needs to consider heterogeneous channels together. The results presented show that, on the one hand, the extension of MiPOD for JPEG domain, referred to as J-MiPOD, is very competitive as compared to current state-of-the-art embedding schemes. On the other hands, we also show that addressing the problem of embedding in JPEG color images is far from being straightforward and that future works are required to understand better how to deal with color channels in JPEG images.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117210089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating Suboptimal Steganographic Embedding","authors":"Christy Kin-Cleaves, Andrew D. Ker","doi":"10.1145/3369412.3395071","DOIUrl":"https://doi.org/10.1145/3369412.3395071","url":null,"abstract":"Researchers who wish to benchmark the detectability of steganographic distortion functions typically simulate stego objects. However, the difference (coding loss) between simulated stego objects, and real stego objects is significant, and dependent on multiple factors. In this paper, we first identify some factors affecting the coding loss, then propose a method to estimate and correct for coding loss by sampling a few covers and messages. This allows us to simulate suboptimally-coded stego objects which are more accurate representations of real stego objects. We test our results against real embeddings, and naive PLS simulation, showing our simulated stego objects are closer to real embeddings in terms of both distortion and detectability. This is the case even when only a single image and message as used to estimate the loss.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"30 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Aggregation Networks for Image Steganalysis","authors":"Haneol Jang, Tae-Woo Oh, Kibom Kim","doi":"10.1145/3369412.3395072","DOIUrl":"https://doi.org/10.1145/3369412.3395072","url":null,"abstract":"Since convolutional neural networks have shown remarkable performance on various computer vision tasks, many network architectures for image steganalysis have been introduced. Many of them use fixed preprocessing filters for stable learning, which have a disadvantage of limited use of the information of the input image. The recently introduced end-to-end learning method uses a structure that limits the number of channels of feature maps close to the input and stacks residual blocks. This method has limitations in generating feature maps of various levels and resolutions that can be effective for steganalysis. We therefore propose the feature aggregation-based steganalysis networks: expand the number of channels of convolutional blocks close to the input data, aggregate feature maps of various levels and resolutions, and utilize rich information to improve steganalysis performance. In addition, the capped activation function is applied to obtain better generalization performance. The proposed method outperforms the state-of-the-art steganalysis on detection of the advanced steganography algorithms J-UNIWARD and UED, for JPEG quality factor 75 and 95.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie, Xianfeng Zhao
{"title":"A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel","authors":"Pingan Fan, Hong Zhang, Yifan Cai, Pei Xie, Xianfeng Zhao","doi":"10.1145/3369412.3395066","DOIUrl":"https://doi.org/10.1145/3369412.3395066","url":null,"abstract":"The social networks transcode uploaded videos in a lossy way, which makes most video steganographic methods become unusable. In this paper, a robust video steganographic method is proposed to resist video transcoding on social networking sites. The luminance component of the raw video is selected as the cover and Quantization Index Modulation (QIM) algorithm based on block statistical features is applied to embed secret messages. To make a good tradeoff between the robustness and visual quality, an iteration in the local transcoder is designed to determine the minimum quantization step for each video. Then, a strategy of selecting robust video frames is proposed to further improve the robustness and security. To avoid sharing information beforehand between the sender and the receiver, a steganographic side channel is built for correct message extraction. Experimental results have shown that our proposed method can provide strong robustness against social networks transcoding, the average bit error rate is less than 1%. Meanwhile, our proposed method achieves a satisfactory level of security performance. It's a robust and secure method for covert communication on social networking sites such as YouTube and Vimeo.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"39 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120852026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Audio Steganalysis in Time Domain","authors":"Daewon Lee, Tae-Woo Oh, Kibom Kim","doi":"10.1145/3369412.3395064","DOIUrl":"https://doi.org/10.1145/3369412.3395064","url":null,"abstract":"Digital audio, as well as image, is one of the most popular media for information hiding. However, even the state-of-the-art deep learning model still has a limitation for detecting basic LSB steganography algorithms that hide secret messages in time domain of WAV audio. To advance audio steganalysis based on deep learning, deep audio steganalysis, in time domain of lossless audio format, we have developed a convolutional neural network that incorporates bit-plane separation, weight-standardized convolution, and channel attention. Training through payload curriculum learning and testing for six steganography methods demonstrated that our proposed model is superior to the other two deep learning models, achieving state-of-the-art performance. We expect our approach will provide insights to create a breakthrough for deep audio steganalysis.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploiting Micro-Signals for Physiological Forensics","authors":"Min Wu","doi":"10.1145/3369412.3396882","DOIUrl":"https://doi.org/10.1145/3369412.3396882","url":null,"abstract":"A variety of nearly invisible \"micro-signals\" have played important roles in media security and forensics. These noise-like micro-signals are ubiquitous and typically an order of magnitude lower in strength or scale than the dominant ones. They are traditionally removed or ignored as nuances outside the forensic domain. This keynote talk discusses the recent research harnessing micro-signals to infer a person's physiological conditions. One type of such signals is the subtle changes in facial skin color in accordance with the heartbeat. Video analysis of this repeating change provides a contact-free way to capture photo-plethysmogram (PPG). While heart rate can be tracked from videos of resting cases, it is challenging to do so for cases involving substantial motion, such as when a person is walking around, running on a treadmill, or driving on a bumpy road. It will be shown in this talk how the expertise with micro-signals from media forensics has enabled the exploration of new opportunities in physiological forensics and a broad range of applications.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121757782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand","authors":"Chen Wang, Jingjing Mu, Long Huang","doi":"10.1145/3369412.3395077","DOIUrl":"https://doi.org/10.1145/3369412.3395077","url":null,"abstract":"As the most common personal devices, smartphones contain the user's private information. While people use mobile devices anytime and anywhere, the sensitive contents might be leaked from the screens. The smartphone notifications cause such privacy leakages even on a lock screen. With the aim to alert the user of an event (e.g., text messages, phone calls and calendar reminders), these onscreen notifications usually contain the sender's name and even a clip of the contents for preview. Such information, if not displayed appropriately, may cause the leakages of the user's social relations, personal hobbies and private message contents. This work focuses on wisely displaying the notifications to avoid leaking the user's privacy. We develop an unobtrusive user authentication system to confirm the user identity via their gripping-hands before displaying notifications. In particular, we carefully design an inaudible acoustic signal and emit it from the smartphone speaker to sense the gripping hand, when there is a need to push notifications. The signal propagating to the smartphone's microphones carries the user's biometric information related to the gripping hand (e.g., palm size and gripping strength). We further derive the Mel Frequency Cepstral Coefficient time series and develop a machine learning-based algorithm to identify the user. The experimental results show that our system can identify 8 users with 92% accuracy.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131311016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hashim Abu-gellban, L. Nguyen, M. Moghadasi, Zhenhe Pan, Fang Jin
{"title":"LiveDI: An Anti-theft Model Based on Driving Behavior","authors":"Hashim Abu-gellban, L. Nguyen, M. Moghadasi, Zhenhe Pan, Fang Jin","doi":"10.1145/3369412.3395069","DOIUrl":"https://doi.org/10.1145/3369412.3395069","url":null,"abstract":"Anti-theft problem has been challenging since it mainly depends on the existence of external devices to defend from thefts. Recently, driver behavior analysis using supervised learning has been investigated with the goal to detect burglary by identifying drivers. In this paper, we propose a data-driven technique, LiveDI, which uses driving behavior removing the use of external devices in order to identify drivers. The built model utilizes Gated Recurrent Unit (GRU) and Fully Convolutional Networks (FCN) to learn long-short term patterns of the driving behaviors from drivers. Additionally, we improve the training time by utilizing the Segmented Feature Generation (SFG) algorithm to reduce the state space where the driving behaviors are split with a time window for analysis. Extensive experiments are conducted which show the impact of parameters on our technique and verify that our proposed approach outperforms the state-of-the-art baseline methods.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133638032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Jerkovits, O. Günlü, V. Sidorenko, G. Kramer
{"title":"Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage","authors":"Thomas Jerkovits, O. Günlü, V. Sidorenko, G. Kramer","doi":"10.1145/3369412.3395063","DOIUrl":"https://doi.org/10.1145/3369412.3395063","url":null,"abstract":"The key agreement problem with biometric or physical identifiers and two terminals for key enrollment and reconstruction is considered. A nested convolutional code construction that performs lossy compression with side information is proposed. Nested convolutional codes are an alternative to nested polar codes and nested random linear codes that achieve all points of the key-leakage-storage regions of the generated-secret and chosen-secret models for long block lengths. Our design uses a convolutional code for vector quantization during enrollment and a subcode of it for error correction during reconstruction. Physical identifiers with small bit error probability are considered to illustrate the gains of the proposed construction. One variant of nested convolutional codes improves on all previous constructions in terms of the key vs. storage rate ratio but it has high complexity. Another variant of nested convolutional codes with lower complexity performs similarly to previously designed nested polar codes. The results suggest that the choice of convolutional or polar codes for key agreement with identifiers depends on the complexity constraints.","PeriodicalId":298966,"journal":{"name":"Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122520478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}