{"title":"Session details: Moving steganography and steganalysis from the laboratory to the real world","authors":"Andrew D. Ker","doi":"10.1145/3245189","DOIUrl":"https://doi.org/10.1145/3245189","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125719436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: From biometric to forensics","authors":"Chang-Tsun Li","doi":"10.1145/3245191","DOIUrl":"https://doi.org/10.1145/3245191","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129970144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Invited talk","authors":"S. Katzenbeisser","doi":"10.1145/3245187","DOIUrl":"https://doi.org/10.1145/3245187","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Watermarking","authors":"D. Coltuc","doi":"10.1145/3245195","DOIUrl":"https://doi.org/10.1145/3245195","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Tracing","authors":"P. Bas","doi":"10.1145/3245188","DOIUrl":"https://doi.org/10.1145/3245188","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1073 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Invited talk","authors":"Jana Dittman","doi":"10.1145/3245194","DOIUrl":"https://doi.org/10.1145/3245194","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116840404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Media encryption","authors":"A. Uhl","doi":"10.1145/3245193","DOIUrl":"https://doi.org/10.1145/3245193","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: End user and signal processing: a successful synergy towards the assessment of forensic tools","authors":"M. Carli","doi":"10.1145/3245192","DOIUrl":"https://doi.org/10.1145/3245192","url":null,"abstract":"","PeriodicalId":404491,"journal":{"name":"Proceedings of the first ACM workshop on Information hiding and multimedia security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}