Export Citations
It is our great pleasure to welcome you to the 8th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2020). This year's workshop continues its tradition of being the premier events for presentation of research results and experience reports on multimedia security and attracts researchers from all over the world.
The workshop focuses on information hiding topics, such as digital watermarking, steganography, steganalysis, anonymity, hard-to-intercept communications, and covert/subliminal channels. It also covers a variety of multimedia security topics including multimedia identification and authentication, signal forensics, and biometrics.
The mission of the workshop is to share novel solutions that fulfill the needs of heterogeneous security applications and identify new directions for future research and development. IH&MMSEC gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of multimedia security.
The call for papers attracted submissions from Asia, Canada, Australia, Europe, Africa, and the United States. We are proud to announce that this year both the quality and number of submissions was extremely high.
Proceeding Downloads
Exploiting Micro-Signals for Physiological Forensics
A variety of nearly invisible "micro-signals" have played important roles in media security and forensics. These noise-like micro-signals are ubiquitous and typically an order of magnitude lower in strength or scale than the dominant ones. They are ...
Game-Theoretic Perspectives and Algorithms for Cybersecurity
Information plays a key role in many games, and game theory includes reasoning about how agents should perceive signals, and how they should strategically decide what signals to send. This can involve complex tradeoffs about how revealing certain ...
Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid
With the growing attention on multimedia security and rapid development of natural language processing technologies, various linguistic steganographic algorithms based on automatic text generation technology have been proposed increasingly, which brings ...
Deep Audio Steganalysis in Time Domain
Digital audio, as well as image, is one of the most popular media for information hiding. However, even the state-of-the-art deep learning model still has a limitation for detecting basic LSB steganography algorithms that hide secret messages in time ...
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis
The architectures of convolutional neural networks used in steganalysis have been designed heuristically. In this paper, an automatic Network Architecture Generation algorithm based on reinforcement learning for JPEG image Steganalysis (JS-NAG) has been ...
Feature Aggregation Networks for Image Steganalysis
Since convolutional neural networks have shown remarkable performance on various computer vision tasks, many network architectures for image steganalysis have been introduced. Many of them use fixed preprocessing filters for stable learning, which have ...
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis
After 2015, CNN-based steganalysis approaches have started replacing the two-step machine-learning-based steganalysis approaches (feature extraction and classification), mainly due to the fact that they offer better performance.
In many instances, the ...
Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand
As the most common personal devices, smartphones contain the user's private information. While people use mobile devices anytime and anywhere, the sensitive contents might be leaked from the screens. The smartphone notifications cause such privacy ...

What if Adversarial Samples were Digital Images?
Although adversarial sampling is a trendy topic in computer vision, very few works consider the integral constraint: The result of the attack is a digital image whose pixel values are integers. This is not an issue at first sight since applying a ...
LiveDI: An Anti-theft Model Based on Driving Behavior
Anti-theft problem has been challenging since it mainly depends on the existence of external devices to defend from thefts. Recently, driver behavior analysis using supervised learning has been investigated with the goal to detect burglary by ...
On the Difficulty of Hiding Keys in Neural Networks
In order to defend neural networks against malicious attacks, recent approaches propose the use of secret keys in the training or inference pipelines of learning systems. While this concept is innovative and the results are promising in terms of attack ...
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
The key agreement problem with biometric or physical identifiers and two terminals for key enrollment and reconstruction is considered. A nested convolutional code construction that performs lossy compression with side information is proposed. Nested ...
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans
A morphed face image injected into an identity document destroys the unique link between a person and a document meaning that such a multi-identity document may be successfully used by several persons for face-recognition-based identity verification. A ...
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos
The ability of artificial intelligence techniques to build synthesized brand new videos or to alter the facial expression of already existing ones has been efficiently demonstrated in the literature. The identification of such new threat generally known ...
Photo Forensics From Rounding Artifacts
Many aspects of JPEG compression have been successfully used in the domain of photo forensics. Adding to this literature, we describe a JPEG artifact that can arise depending upon seemingly innocuous implementation details in a JPEG encoder. We describe ...
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection
Industrial Control Systems (ICS) help to automate various cyber-physical systems in our world. The controlled processes range from rather simple traffic lights and elevators to complex networks of ICS in car manufacturing or controlling nuclear power ...

Simulating Suboptimal Steganographic Embedding
Researchers who wish to benchmark the detectability of steganographic distortion functions typically simulate stego objects. However, the difference (coding loss) between simulated stego objects, and real stego objects is significant, and dependent on ...
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel
The social networks transcode uploaded videos in a lossy way, which makes most video steganographic methods become unusable. In this paper, a robust video steganographic method is proposed to resist video transcoding on social networking sites. The ...
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline
This paper proposes to use the statistical analysis of the correlation between DCT coefficients to design a new synchronization strategy that can be used for cost-based steganographic schemes in the JPEG domain. First, an analysis is performed on the ...
Turning Cost-Based Steganography into Model-Based
Abstract Most modern steganographic schemes embed secrets by minimizing the total expected cost of modifications. However, costs are usually computed using heuristics and cannot be directly linked to statistical detectability. Moreover, as previously ...

Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images
This short paper presents a novel method for steganography in JPEG-compressed images, extended the so-called MiPOD scheme based on minimizing the detection accuracy of the most-powerful test using a Gaussian model of independent DCT coefficients. This ...
- Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IH&MMSec '18 | 40 | 18 | 45% |
IH&MMSec '17 | 34 | 18 | 53% |
IH&MMSec '16 | 61 | 21 | 34% |
IH&MMSec '15 | 45 | 20 | 44% |
IH&MMSec '14 | 64 | 24 | 38% |
IH&MMSec '13 | 74 | 27 | 36% |
Overall | 318 | 128 | 40% |