{"title":"第五届ACM信息隐藏与多媒体安全研讨会论文集","authors":"M. Stamm, Matthias Kirchner, S. Voloshynovskiy","doi":"10.1145/3082031","DOIUrl":null,"url":null,"abstract":"Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. \n \nIn response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. \n \nWe sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. \n \nThe technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. \n \nAs usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. \n \nA great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security\",\"authors\":\"M. Stamm, Matthias Kirchner, S. Voloshynovskiy\",\"doi\":\"10.1145/3082031\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. \\n \\nIn response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. \\n \\nWe sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. \\n \\nThe technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. \\n \\nAs usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. \\n \\nA great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.\",\"PeriodicalId\":431672,\"journal\":{\"name\":\"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security\",\"volume\":\"141 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3082031\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3082031","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017.
In response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis.
We sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions.
The technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software.
As usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements.
A great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.