skip to main content
10.1145/3369412acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
IH&MMSec '20: Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
ACM2020 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security Denver CO USA June 22 - 24, 2020
ISBN:
978-1-4503-7050-9
Published:
23 June 2020
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 07 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 8th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC 2020). This year's workshop continues its tradition of being the premier events for presentation of research results and experience reports on multimedia security and attracts researchers from all over the world.

The workshop focuses on information hiding topics, such as digital watermarking, steganography, steganalysis, anonymity, hard-to-intercept communications, and covert/subliminal channels. It also covers a variety of multimedia security topics including multimedia identification and authentication, signal forensics, and biometrics.

The mission of the workshop is to share novel solutions that fulfill the needs of heterogeneous security applications and identify new directions for future research and development. IH&MMSEC gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of multimedia security.

The call for papers attracted submissions from Asia, Canada, Australia, Europe, Africa, and the United States. We are proud to announce that this year both the quality and number of submissions was extremely high.

Skip Table Of Content Section
SESSION: Keynote & Invited Talks
keynote
Public Access
Exploiting Micro-Signals for Physiological Forensics

A variety of nearly invisible "micro-signals" have played important roles in media security and forensics. These noise-like micro-signals are ubiquitous and typically an order of magnitude lower in strength or scale than the dominant ones. They are ...

keynote
Public Access
Game-Theoretic Perspectives and Algorithms for Cybersecurity

Information plays a key role in many games, and game theory includes reasoning about how agents should perceive signals, and how they should strategically decide what signals to send. This can involve complex tradeoffs about how revealing certain ...

SESSION: Session 1: Steganalysis
short-paper
Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid

With the growing attention on multimedia security and rapid development of natural language processing technologies, various linguistic steganographic algorithms based on automatic text generation technology have been proposed increasingly, which brings ...

research-article
Deep Audio Steganalysis in Time Domain

Digital audio, as well as image, is one of the most popular media for information hiding. However, even the state-of-the-art deep learning model still has a limitation for detecting basic LSB steganography algorithms that hide secret messages in time ...

research-article
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis

The architectures of convolutional neural networks used in steganalysis have been designed heuristically. In this paper, an automatic Network Architecture Generation algorithm based on reinforcement learning for JPEG image Steganalysis (JS-NAG) has been ...

short-paper
Feature Aggregation Networks for Image Steganalysis

Since convolutional neural networks have shown remarkable performance on various computer vision tasks, many network architectures for image steganalysis have been introduced. Many of them use fixed preprocessing filters for stable learning, which have ...

research-article
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis

After 2015, CNN-based steganalysis approaches have started replacing the two-step machine-learning-based steganalysis approaches (feature extraction and classification), mainly due to the fact that they offer better performance.

In many instances, the ...

SESSION: Session 2: Privacy and Security
short-paper
Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand

As the most common personal devices, smartphones contain the user's private information. While people use mobile devices anytime and anywhere, the sensitive contents might be leaked from the screens. The smartphone notifications cause such privacy ...

research-article
Best Paper
Best Paper
What if Adversarial Samples were Digital Images?

Although adversarial sampling is a trendy topic in computer vision, very few works consider the integral constraint: The result of the attack is a digital image whose pixel values are integers. This is not an issue at first sight since applying a ...

short-paper
LiveDI: An Anti-theft Model Based on Driving Behavior

Anti-theft problem has been challenging since it mainly depends on the existence of external devices to defend from thefts. Recently, driver behavior analysis using supervised learning has been investigated with the goal to detect burglary by ...

short-paper
On the Difficulty of Hiding Keys in Neural Networks

In order to defend neural networks against malicious attacks, recent approaches propose the use of secret keys in the training or inference pipelines of learning systems. While this concept is innovative and the results are promising in terms of attack ...

research-article
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage

The key agreement problem with biometric or physical identifiers and two terminals for key enrollment and reconstruction is considered. A nested convolutional code construction that performs lossy compression with side information is proposed. Nested ...

SESSION: Session 3: Image and Video Forensics
short-paper
Open Access
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans

A morphed face image injected into an identity document destroys the unique link between a person and a document meaning that such a multi-identity document may be successfully used by several persons for face-recognition-based identity verification. A ...

short-paper
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos

The ability of artificial intelligence techniques to build synthesized brand new videos or to alter the facial expression of already existing ones has been efficiently demonstrated in the literature. The identification of such new threat generally known ...

research-article
Open Access
Photo Forensics From Rounding Artifacts

Many aspects of JPEG compression have been successfully used in the domain of photo forensics. Adding to this literature, we describe a JPEG artifact that can arise depending upon seemingly innocuous implementation details in a JPEG encoder. We describe ...

SESSION: Session 4: Steganography
short-paper
Open Access
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection

Industrial Control Systems (ICS) help to automate various cyber-physical systems in our world. The controlled processes range from rather simple traffic lights and elevators to complex networks of ICS in car manufacturing or controlling nuclear power ...

short-paper
Best Paper
Best Paper
Simulating Suboptimal Steganographic Embedding

Researchers who wish to benchmark the detectability of steganographic distortion functions typically simulate stego objects. However, the difference (coding loss) between simulated stego objects, and real stego objects is significant, and dependent on ...

research-article
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel

The social networks transcode uploaded videos in a lossy way, which makes most video steganographic methods become unusable. In this paper, a robust video steganographic method is proposed to resist video transcoding on social networking sites. The ...

research-article
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline

This paper proposes to use the statistical analysis of the correlation between DCT coefficients to design a new synchronization strategy that can be used for cost-based steganographic schemes in the JPEG domain. First, an analysis is performed on the ...

research-article
Public Access
Turning Cost-Based Steganography into Model-Based

Abstract Most modern steganographic schemes embed secrets by minimizing the total expected cost of modifications. However, costs are usually computed using heuristics and cannot be directly linked to statistical detectability. Moreover, as previously ...

short-paper
Best Paper
Best Paper
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images

This short paper presents a novel method for steganography in JPEG-compressed images, extended the so-called MiPOD scheme based on minimizing the detection accuracy of the most-powerful test using a Gaussian model of independent DCT coefficients. This ...

Contributors
  • University of Erlangen-Nuremberg
  • University of Erlangen-Nuremberg
  • Sapienza University of Rome
  • Politecnico di Milano
  • Czech Technical University in Prague
  1. Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security

      Recommendations

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%
      YearSubmittedAcceptedRate
      IH&MMSec '18401845%
      IH&MMSec '17341853%
      IH&MMSec '16612134%
      IH&MMSec '15452044%
      IH&MMSec '14642438%
      IH&MMSec '13742736%
      Overall31812840%