skip to main content
10.1145/3577163acmconferencesBook PagePublication Pagesih-n-mmsecConference Proceedingsconference-collections
IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security
ACM2023 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
IH&MMSec '23: ACM Workshop on Information Hiding and Multimedia Security Chicago IL USA June 28 - 30, 2023
ISBN:
979-8-4007-0054-5
Published:
28 June 2023
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the 11th edition of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '23). This year's workshop continues the tradition of representing one of the prime events in information hiding and multimedia security, attracting researchers and practitioners worldwide.

Carrying on with the efforts of the previous edition to overcome the Pandemics and reunite the IH&MMSec community to present and discuss their work, this year's meeting is held fully in person at the Water Tower Campus of Loyola University Chicago, located right at the heart of the Windy City. Bathed by the fresh waters of Lake Michigan, Chicago is the 3rd largest city in the USA, with a strong, multiethnic, and multicultural community. Besides fostering Science and their research during the workshop, attendees have countless opportunities for outdoor citywise activities, blessed by the beginning of the American Midwest Summer.

Skip Table Of Content Section
SESSION: Keynote Talks
keynote
Photoshop Fantasies

The possibility of an altered photo revising history in a convincing way highlights a salient threat of imaging technology. Afterall, seeing is believing. Or is it? The examples history has preserved make it clear that the observer is more often than ...

keynote
Steganography on Mobile Apps

Steganography is an ancient communication technique that hides a message inside a common object so that the message escapes scrutiny - today, we use digital files like photos and videos to hide and pass messages. Code to execute the message hiding ...

keynote
On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations

With the abundance of imagery data captured in our daily life, there is an increasing amount of diverse manipulations being applied to imagery, including generative model based image generation and manipulation, adversarial attacks, classic image ...

SESSION: Media Security and Privacy
short-paper
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints

In recent decades, many perceptual image hashing schemes for content authentication have been proposed. However, existing algorithms cannot provide satisfactory robustness and discrimination in the face of complex manipulations in real scenarios. In ...

short-paper
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning

In this paper, we propose an end-to-end perceptual robust hashing scheme for video copy detection based on unsupervised learning. Firstly, the spatio-temporal information in videos is effectively fused and condensed into high-dimensional features ...

research-article
Video Frame Interpolation via Multi-scale Expandable Deformable Convolution

Video frame interpolation is a challenging task in the video processing field. Benefiting from the development of deep learning, many video frame interpolation methods have been proposed, which focus on sampling pixels with useful information to ...

SESSION: Steganography and Steganalysis
research-article
Compatibility and Timing Attacks for JPEG Steganalysis

This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blocks ...

research-article
On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests

This paper addresses how to fairly compare ROCs of ad hoc (or data driven) detectors with tests derived from statistical models of digital media. We argue that the ways ROCs are typically drawn for each detector type correspond to different hypothesis ...

research-article
Open Access
Best Student Paper
Best Student Paper
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics

JPEG images stored in progressive mode have become more prevalent recently. An estimated 30% of all JPEG images on the most popular websites use progressive mode. Presumably, this surge is caused by the adoption of MozJPEG, an open-source library ...

research-article
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack

The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by ...

research-article
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice

The JPEG compatibility attack is a steganalysis method for detecting messages embedded in the spatial representation of an image under the assumption that the cover image was a decompressed JPEG. This paper addresses a number of open problems in ...

research-article
Limits of Data Driven Steganography Detectors

While deep learning has revolutionized image steganalysis in terms of performance, little is known about how much modern data driven detectors can still be improved. In this paper, we approach this difficult and currently wide open question by working ...

short-paper
Calibration-based Steganalysis for Neural Network Steganography

Recent research has shown that neural network models can be used to steal sensitive data or embed malware. Therefore, steganalysis for neural networks is urgently needed. However, existing neural network steganalysis methods do not perform well under ...

short-paper
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning

Text steganography is becoming increasingly secure by eliminating the distribution discrepancy between normal and stego text. On the other hand, the existing cross-entropy-based steganalysis models struggle to distinguish subtle distribution differences ...

SESSION: Watermarking and Security
research-article
An Improved Reversible Database Watermarking Method based on Histogram Shifting

Database watermarking is typically employed to address the issues of data theft, illegal replication, and copyright infringement that may arise during the sharing of databases. Unfortunately, the existing methods often cause permanent distortion to the ...

short-paper
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections

Zero-knowledge protocols for digital watermarking allow a copyright holder to prove that a signal is hidden in a cover without revealing the signal or where it is. This same approach can be applied outside of watermarking to other problems where ...

SESSION: Biometrics
research-article
Open Access
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition

Recently, there is a growing interest to employ biometrics in post-mortem forensics, mainly to replace cost intensive radiology based imaging devices. While it has been shown that post-mortem biometric recognition is feasible for fingerprints, face and ...

short-paper
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics

Over the last decade, the use of Automatic Speaker Verification (ASV) systems has become increasingly widespread in response to the growing need for secure and efficient identity verification methods. The voice data encompasses a wealth of personal ...

short-paper
Open Access
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts

I2I translation techniques for unpaired data are used for the creation of biometric presentation attack artefact samples. For the assessment of these synthetic samples, we analyse their behaviour when attacking hand vein recognition systems, comparing ...

short-paper
Open Access
First Learning Steps to Recognize Faces in the Noise

A UNet-type encoder-decoder inpainting network is applied to weaken the protection strength of selectively encrypted face samples. Based on visual assessment, FaceQNet quality, and ArcFace recognition accuracy the strategy is shown to be successful, ...

SESSION: Trends and Challenges in DeepFake Creation, Application, and Forensics (Special Session)
short-paper
Best Paper
Best Paper
Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools

We present a first of its kind dataset of overhead imagery for development and evaluation of forensic tools. Our dataset consists of real, fully synthetic and partially manipulated overhead imagery generated from a custom diffusion model trained on two ...

short-paper
MetaFake: Few-shot Face Forgery Detection with Meta Learning

With remarkable progress achieved by facial forgery technologies, their potential security risks cause serious concern to society since they can easily fool face recognition systems and even human beings. Current forgery detection methods have achieved ...

short-paper
Open Access
Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer

The malicious use of synthetic speech has increased with the recent availability of speech generation tools. It is important to determine whether a speech signal is authentic (spoken by a human) or is synthesized and to determine the generation method ...

short-paper
Open Access
Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech Detection

Many speech signals are compressed with MP3 to reduce the data rate. In many synthetic speech detection methods the spectrogram of the speech signal is used. This usually requires the speech signal to be fully decompressed. We show that the design of ...

short-paper
Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis

This paper proposes a dual-channel network for DeepFake detection. The network comprises two channels: one using a stacked Maxvit block to process the downsampled original images, and the other using a stacked ResNet basic block to capture features from ...

short-paper
Open Access
Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes

Due to the rising threat of deepfakes to security and privacy, it is most important to develop robust and reliable detectors. In this paper, we examine the need for high-quality samples in the training datasets of such detectors. Accordingly, we show ...

Contributors
  • University of Notre Dame
  • Lehigh University
  • University of Trento
  • Binghamton University State University of New York

Recommendations

Acceptance Rates

Overall Acceptance Rate128of318submissions,40%
YearSubmittedAcceptedRate
IH&MMSec '18401845%
IH&MMSec '17341853%
IH&MMSec '16612134%
IH&MMSec '15452044%
IH&MMSec '14642438%
IH&MMSec '13742736%
Overall31812840%