Welcome to the 11th edition of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec '23). This year's workshop continues the tradition of representing one of the prime events in information hiding and multimedia security, attracting researchers and practitioners worldwide.
Carrying on with the efforts of the previous edition to overcome the Pandemics and reunite the IH&MMSec community to present and discuss their work, this year's meeting is held fully in person at the Water Tower Campus of Loyola University Chicago, located right at the heart of the Windy City. Bathed by the fresh waters of Lake Michigan, Chicago is the 3rd largest city in the USA, with a strong, multiethnic, and multicultural community. Besides fostering Science and their research during the workshop, attendees have countless opportunities for outdoor citywise activities, blessed by the beginning of the American Midwest Summer.
Proceeding Downloads
Photoshop Fantasies
The possibility of an altered photo revising history in a convincing way highlights a salient threat of imaging technology. Afterall, seeing is believing. Or is it? The examples history has preserved make it clear that the observer is more often than ...
Steganography on Mobile Apps
Steganography is an ancient communication technique that hides a message inside a common object so that the message escapes scrutiny - today, we use digital files like photos and videos to hide and pass messages. Code to execute the message hiding ...
On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations
With the abundance of imagery data captured in our daily life, there is an increasing amount of diverse manipulations being applied to imagery, including generative model based image generation and manipulation, adversarial attacks, classic image ...
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints
In recent decades, many perceptual image hashing schemes for content authentication have been proposed. However, existing algorithms cannot provide satisfactory robustness and discrimination in the face of complex manipulations in real scenarios. In ...
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning
In this paper, we propose an end-to-end perceptual robust hashing scheme for video copy detection based on unsupervised learning. Firstly, the spatio-temporal information in videos is effectively fused and condensed into high-dimensional features ...
Video Frame Interpolation via Multi-scale Expandable Deformable Convolution
Video frame interpolation is a challenging task in the video processing field. Benefiting from the development of deep learning, many video frame interpolation methods have been proposed, which focus on sampling pixels with useful information to ...
Compatibility and Timing Attacks for JPEG Steganalysis
This paper introduces a novel compatibility attack to detect a steganographic message embedded in the DCT domain of a JPEG image at high-quality factors (close to 100). Because the JPEG compression is not a surjective function, i.e. not every DCT blocks ...
On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests
This paper addresses how to fairly compare ROCs of ad hoc (or data driven) detectors with tests derived from statistical models of digital media. We argue that the ways ROCs are typically drawn for each detector type correspond to different hypothesis ...
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics
JPEG images stored in progressive mode have become more prevalent recently. An estimated 30% of all JPEG images on the most popular websites use progressive mode. Presumably, this surge is caused by the adoption of MozJPEG, an open-source library ...
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack
The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by ...
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice
The JPEG compatibility attack is a steganalysis method for detecting messages embedded in the spatial representation of an image under the assumption that the cover image was a decompressed JPEG. This paper addresses a number of open problems in ...
Limits of Data Driven Steganography Detectors
While deep learning has revolutionized image steganalysis in terms of performance, little is known about how much modern data driven detectors can still be improved. In this paper, we approach this difficult and currently wide open question by working ...
Calibration-based Steganalysis for Neural Network Steganography
Recent research has shown that neural network models can be used to steal sensitive data or embed malware. Therefore, steganalysis for neural networks is urgently needed. However, existing neural network steganalysis methods do not perform well under ...
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning
Text steganography is becoming increasingly secure by eliminating the distribution discrepancy between normal and stego text. On the other hand, the existing cross-entropy-based steganalysis models struggle to distinguish subtle distribution differences ...
An Improved Reversible Database Watermarking Method based on Histogram Shifting
Database watermarking is typically employed to address the issues of data theft, illegal replication, and copyright infringement that may arise during the sharing of databases. Unfortunately, the existing methods often cause permanent distortion to the ...
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections
Zero-knowledge protocols for digital watermarking allow a copyright holder to prove that a signal is hidden in a cover without revealing the signal or where it is. This same approach can be applied outside of watermarking to other problems where ...
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition
Recently, there is a growing interest to employ biometrics in post-mortem forensics, mainly to replace cost intensive radiology based imaging devices. While it has been shown that post-mortem biometric recognition is feasible for fingerprints, face and ...
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics
- Oubaïda Chouchane,
- Michele Panariello,
- Oualid Zari,
- Ismet Kerenciler,
- Imen Chihaoui,
- Massimiliano Todisco,
- Melek Önen
Over the last decade, the use of Automatic Speaker Verification (ASV) systems has become increasingly widespread in response to the growing need for secure and efficient identity verification methods. The voice data encompasses a wealth of personal ...
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts
I2I translation techniques for unpaired data are used for the creation of biometric presentation attack artefact samples. For the assessment of these synthetic samples, we analyse their behaviour when attacking hand vein recognition systems, comparing ...
First Learning Steps to Recognize Faces in the Noise
A UNet-type encoder-decoder inpainting network is applied to weaken the protection strength of selectively encrypted face samples. Based on visual assessment, FaceQNet quality, and ArcFace recognition accuracy the strategy is shown to be successful, ...
Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools
We present a first of its kind dataset of overhead imagery for development and evaluation of forensic tools. Our dataset consists of real, fully synthetic and partially manipulated overhead imagery generated from a custom diffusion model trained on two ...
MetaFake: Few-shot Face Forgery Detection with Meta Learning
With remarkable progress achieved by facial forgery technologies, their potential security risks cause serious concern to society since they can easily fool face recognition systems and even human beings. Current forgery detection methods have achieved ...
Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer
The malicious use of synthetic speech has increased with the recent availability of speech generation tools. It is important to determine whether a speech signal is authentic (spoken by a human) or is synthesized and to determine the generation method ...
Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech Detection
Many speech signals are compressed with MP3 to reduce the data rate. In many synthetic speech detection methods the spectrogram of the speech signal is used. This usually requires the speech signal to be fully decompressed. We show that the design of ...
Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis
This paper proposes a dual-channel network for DeepFake detection. The network comprises two channels: one using a stacked Maxvit block to process the downsampled original images, and the other using a stacked ResNet basic block to capture features from ...
Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes
Due to the rising threat of deepfakes to security and privacy, it is most important to develop robust and reliable detectors. In this paper, we examine the need for high-quality samples in the training datasets of such detectors. Accordingly, we show ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
IH&MMSec '18 | 40 | 18 | 45% |
IH&MMSec '17 | 34 | 18 | 53% |
IH&MMSec '16 | 61 | 21 | 34% |
IH&MMSec '15 | 45 | 20 | 44% |
IH&MMSec '14 | 64 | 24 | 38% |
IH&MMSec '13 | 74 | 27 | 36% |
Overall | 318 | 128 | 40% |