| List of Accepted Papers for the Presentation During WIFS 2018 | |||||||||
| The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel | |||||||||
| Ahmed Mansour, Technische Universität München; Rafael Schaefer, Technische Universität Berlin; Holger Boche, Technische Universität München | |||||||||
| An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification | |||||||||
| Anselmo Ferreira, Shenzhen University; Han Chen, Shenzhen University; Bin Li, Shenzhen University; Jiwu Huang, Sun Yat-sen University | |||||||||
| In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking | |||||||||
| Yuezun Li, University at Albany; Ming-Ching Chang, University at Albany; Siwei Lyu, University at Albany | |||||||||
| MesoNet: a Compact Facial Video Forgery Detection Network | |||||||||
| Darius Afchar, Ècole Nationale des Ponts et Chaussèes; Vincent Nozick, JFLI; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics | |||||||||
| Emotional Bots: Content-based Spammer Detection on Social Media | |||||||||
| Panagiotis Andriotis, University of the West of England; Atsuhiro Takasu, National Institute of Informatics | |||||||||
| Gender Effect on Face Recognition for a Large Longitudinal Database | |||||||||
| Caroline Werther, University of North Carolina Wilmington; Morgan Ferguson, Elon University; Kevin Park, Emory University; Troy Kling, University of North Carolina Wilmington; Cuixian Chen, University of North Carolina Wilmington; Yishi Wang, University of North Carolina Wilmington | |||||||||
| Adaptive Channel Estimation in Side Channel Attacks | |||||||||
| Shan Jin, Department of Electrical and Computer Engineering, Texas A&M University, College Station; Riccardo Bettati, Texas A&M University | |||||||||
| Error Analysis of Forensic ENF Matching | |||||||||
| Guang Hua, Wuhan University | |||||||||
| EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images | |||||||||
| Pauline Puteaux, LIRMM Laboratory, CNRS, Université de Montpellier; William Puech, Univ. Montpellier, France | |||||||||
| One-factor Cancellable Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV) Hashing | |||||||||
| Ming Jie Lee , Monash University Malaysia; Zhe Jin, Monash University Malaysia; Andrew Beng Jin Teoh, Yonsei University | |||||||||
| Reversible Data Hiding in Encrypted Images with Two-MSB Prediction | |||||||||
| Yi Puyang, Anhui University; Zhaoxia Yin, Anhui University; Zhenxing Qian, Shanghai University | |||||||||
| Are Deep Neural Networks good for blind image watermarking? | |||||||||
| Vedran Vukotic, Lamark; Vivien Chappelier, Lamark; Teddy Furon, Inria | |||||||||
| Revealing the processing history of pitch-shifted voice using CNNs | |||||||||
| Lihua Wang, Sun Yat-Sen University; Huixin Liang, Sun Yat-Sen University; Xiaodan Lin, Huaqiao University; Xiangui Kang, Sun Yat-Sen University | |||||||||
| JPEG Implementation Forensics Based on Eigen-Algorithms | |||||||||
| Nicolo Bonettini, Politecnico di Milano; Luca Bondi, Politecnico di Milano; Paolo Bestagini, Politecnico di Milano; Stefano Tubaro, Politecnico di Milano, Italy | |||||||||
| A Multi-Task Learning CNN for Image Steganalysis | |||||||||
| Xiangyu Yu, South China University of Technology; Huabin Tan, South China University of Technology; Hui Liang, South China University of Technology; Chang-Tsun Li, Charles Sturt University; Guangjun Liao, Guangdong Police College | |||||||||
| Finger-vein Recognition using Deep Fully Convolutional Neural Semantic Segmentation Networks: The Impact of Training Data | |||||||||
| Ehsaneddin Jalilian, University of Salzburg; Andreas Uhl, University of Salzburg | |||||||||
| Age Estimation via Fusion of Depthwise Separable Convolutional Neural Networks | |||||||||
| Kuan-Hsien Liu, National Taichung University of Science and Technology; Hsin-Hua Liu, National Taiwan University; Pak Ki Chan, National Chung Hsing University; Tsung-Jung Liu, National Chung Hsing University; Soo-Chang Pei, National Taiwan University | |||||||||
| Generalized Joint Sparse Representation for Multimodal Biometric Fusion of Heterogeneous Features | |||||||||
| Rudi Primorac, The University of Western Australia; Roberto Togneri, The University of Western Australian; Mohammed Bennamoun, University of Western Australia; Ferdous Sohel, Murdoch University | |||||||||
| Exposing Image Resizing utilizing Welch Power Spectral Density Analysis for Double Compressed JPEG Images | |||||||||
| Sidhant Sahu, National Institute of Technology, Rourkela; Manish Okade, NIT Rourkela | |||||||||
| Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes | |||||||||
| Christy Kin-Cleaves, Oxford University; Andrew D. Ker, University of Oxford | |||||||||
| Database Binning and Retrieval in Multi-Fingerprint Identification Systems | |||||||||
| Pawel Drozdowski, Hochschule Darmstadt/NTNU; Daniel Fischer, Hochschule Darmstadt; Christian Rathgeb, Hochschule Darmstadt; Christopher Schiel, Bundeskriminalamt ; Christoph Busch, Hochschule Darmstadt | |||||||||
| Performance Evaluation of Secure Communication Systems on Turing Machines | |||||||||
| Holger Boche, Technische Universität München; Rafael F. Schaefer, Technische Universität Berlin; H. Vincent Poor, Princeton University | |||||||||
| Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images | |||||||||
| Yingqiang Qiu, College of information science & engineering, Huaqiao University; Hangxing Wang, College of information science & engineering, Huaqiao University; Zichi Wang, Shanghai University; Zhenxing Qian, Shanghai University; Gui Feng, College of information science & engineering, Huaqiao University; Xinpeng Zhang, Shanghai University | |||||||||
| Countering the Pooled Triangle Test for PRNU-based camera identification | |||||||||
| Mauro Barni, University of Siena; MARIKO Nakano-Miyatake, National Polytechnic Institute of Mexico; Hector Santoyo-Garcia, National Polytechnic Institute of Mexico; Benedetta Tondi, University of Siena | |||||||||
| Camera Attribution Forensic Analyzer in the Encrypted Domain | |||||||||
| Alberto Pedrouzo Ulloa, University of Vigo; Miguel Masciopinto, University of Vigo; Juan Ramón Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne; Fernando Perez-Gonzalez, Universidad de Vigo | |||||||||
| Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems | |||||||||
| Fuming Fang, National Institute of Informatics; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics; Md Sahidullah, Inria; Tomi Kinnunen, University of Eastern Finland | |||||||||
| Fingerprint Presentation Attack Detection Using A Novel Multi-Spectral Capture Device and Patch-Based Convolutional Neural Networks | |||||||||
| Mohamed Hussein, University of Southern California; Leonidas Spinoulas, University of Southern California; Fei Xiong, Information Sciences Institute; Wael Abd-Almageed, University of Southern California | |||||||||
| Privacy-Preserving Distributed Deep Learning with Privacy Transformations | |||||||||
| Sen-ching S. Cheung, University of Kentucky; M. Usman Rafique, University of Kentucky; Wai-tian Tan, Cisco Systems Inc. | |||||||||
| Community-based anomaly detection | |||||||||
| Martin Kopp, Czech Technical University; Martin Grill, Cisco Systems Inc.; Jan Kohout, Cisco Systems Inc. | |||||||||
| A Novel Approach For Data Packing: Using Trapdoor Knapsack | |||||||||
| Majid Nateghizad, Delft University of Technology; Zekeriya Erkin, Delft University of Technology; Reginald L. Lagendijk, Delft University of Technology | |||||||||
| A Randomized Kernel-Based Secret Image Sharing Scheme | |||||||||
| Akella Ravi Tej, Indian Institute of Technology Roorkee; Rekula Raviteja, Indian Institute of Technology Roorkee; Vinod Pankajakshan, Indian Insitute of Technology Roorkee | |||||||||
| Protect Your Deep Neural Networks from Piracy | |||||||||
| Mingliang Chen, University of Maryland; Min Wu, University of Maryland | |||||||||
| Latent Feature Disclosure under Perfect Sample Privacy | |||||||||
| Borzoo Rassouli, University of Essex; Fernando Rosas, Imperial College London; Deniz Gunduz, Imperial College London | |||||||||
| Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code | |||||||||
| Iuliia Tkachenko, University of Saint-Etienne; Christophe Destruel, IGO | |||||||||
| Enhanced Geometric Reflection Models for Paper Surface Based Authentication | |||||||||
| Runze Liu, North Carolina State University; Chau-Wai Wong, North Carolina State University; Min Wu, University of Maryland | |||||||||