Preliminary Program



List of Accepted TIFS Papers for the Presentation During WIFS 2018
Improving PRNU compression through preprocessing quantization and coding
Luca Bondi, Paolo Bestagini, Fernando Perez-González, Stefano Tubaro
Slope authentication at the physical layer
Ning Xie, Changsheng Chen
Factors affecting ENF capture in audio
Adi Haji-Ahmad, Chau-Wai Wong, Steven Gambino, Qiang Zhu, Miao Yu, Min Wu
Large-scale jpeg image steganalysis using hybrid deep-learning framework
Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang
Network traffic fingerprinting based on approximated kernel two-sample test
Jan Kohout and Tomáš Pevný
Multi-scale difference map fusion for tamper localization using binary ranking hashing
Cai-Ping Yan and Chi-Man Pun
List of Accepted Papers for the Presentation During WIFS 2018
The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel
Ahmed Mansour, Technische Universität München; Rafael Schaefer, Technische Universität Berlin; Holger Boche, Technische Universität München
An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification
Anselmo Ferreira, Shenzhen University; Han Chen, Shenzhen University; Bin Li, Shenzhen University; Jiwu Huang, Sun Yat-sen University
In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking
Yuezun Li, University at Albany; Ming-Ching Chang, University at Albany; Siwei Lyu, University at Albany
MesoNet: a Compact Facial Video Forgery Detection Network
Darius Afchar, école Nationale des Ponts et Chaussées; Vincent Nozick, JFLI; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics
Emotional Bots: Content-based Spammer Detection on Social Media
Panagiotis Andriotis, University of the West of England; Atsuhiro Takasu, National Institute of Informatics
Gender Effect on Face Recognition for a Large Longitudinal Database
Caroline Werther, University of North Carolina Wilmington; Morgan Ferguson, Elon University; Kevin Park, Emory University; Troy Kling, University of North Carolina Wilmington; Cuixian Chen, University of North Carolina Wilmington; Yishi Wang, University of North Carolina Wilmington
Adaptive Channel Estimation in Side Channel Attacks
Shan Jin, Department of Electrical and Computer Engineering, Texas A&M University, College Station; Riccardo Bettati, Texas A&M University
Error Analysis of Forensic ENF Matching
Guang Hua, Wuhan University
EPE-based Huge-Capacity Reversible Data Hiding in Encrypted Images
Pauline Puteaux, LIRMM Laboratory, CNRS, Université de Montpellier; William Puech, Univ. Montpellier, France
One-factor Cancellable Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV) Hashing
Ming Jie Lee , Monash University Malaysia; Zhe Jin, Monash University Malaysia; Andrew Beng Jin Teoh, Yonsei University
Reversible Data Hiding in Encrypted Images with Two-MSB Prediction
Yi Puyang, Anhui University; Zhaoxia Yin, Anhui University; Zhenxing Qian, Shanghai University
Are Deep Neural Networks good for blind image watermarking?
Vedran Vukotic, Lamark; Vivien Chappelier, Lamark; Teddy Furon, Inria
Revealing the processing history of pitch-shifted voice using CNNs
Lihua Wang, Sun Yat-Sen University; Huixin Liang, Sun Yat-Sen University; Xiaodan Lin, Huaqiao University; Xiangui Kang, Sun Yat-Sen University
JPEG Implementation Forensics Based on Eigen-Algorithms
Nicolo Bonettini, Politecnico di Milano; Luca Bondi, Politecnico di Milano; Paolo Bestagini, Politecnico di Milano; Stefano Tubaro, Politecnico di Milano, Italy
A Multi-Task Learning CNN for Image Steganalysis
Xiangyu Yu, South China University of Technology; Huabin Tan, South China University of Technology; Hui Liang, South China University of Technology; Chang-Tsun Li, Charles Sturt University; Guangjun Liao, Guangdong Police College
Finger-vein Recognition using Deep Fully Convolutional Neural Semantic Segmentation Networks: The Impact of Training Data
Ehsaneddin Jalilian, University of Salzburg; Andreas Uhl, University of Salzburg
Age Estimation via Fusion of Depthwise Separable Convolutional Neural Networks
Kuan-Hsien Liu, National Taichung University of Science and Technology; Hsin-Hua Liu, National Taiwan University; Pak Ki Chan, National Chung Hsing University; Tsung-Jung Liu, National Chung Hsing University; Soo-Chang Pei, National Taiwan University
Generalized Joint Sparse Representation for Multimodal Biometric Fusion of Heterogeneous Features
Rudi Primorac, The University of Western Australia; Roberto Togneri, The University of Western Australian; Mohammed Bennamoun, University of Western Australia; Ferdous Sohel, Murdoch University
Exposing Image Resizing utilizing Welch Power Spectral Density Analysis for Double Compressed JPEG Images
Sidhant Sahu, National Institute of Technology, Rourkela; Manish Okade, NIT Rourkela
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
Christy Kin-Cleaves, Oxford University; Andrew D. Ker, University of Oxford
Database Binning and Retrieval in Multi-Fingerprint Identification Systems
Pawel Drozdowski, Hochschule Darmstadt/NTNU; Daniel Fischer, Hochschule Darmstadt; Christian Rathgeb, Hochschule Darmstadt; Christopher Schiel, Bundeskriminalamt ; Christoph Busch, Hochschule Darmstadt
Performance Evaluation of Secure Communication Systems on Turing Machines
Holger Boche, Technische Universität München; Rafael F. Schaefer, Technische Universität Berlin; H. Vincent Poor, Princeton University
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images
Yingqiang Qiu, College of information science & engineering, Huaqiao University; Hangxing Wang, College of information science & engineering, Huaqiao University; Zichi Wang, Shanghai University; Zhenxing Qian, Shanghai University; Gui Feng, College of information science & engineering, Huaqiao University; Xinpeng Zhang, Shanghai University
Countering the Pooled Triangle Test for PRNU-based camera identification
Mauro Barni, University of Siena; MARIKO Nakano-Miyatake, National Polytechnic Institute of Mexico; Hector Santoyo-Garcia, National Polytechnic Institute of Mexico; Benedetta Tondi, University of Siena
Camera Attribution Forensic Analyzer in the Encrypted Domain
Alberto Pedrouzo Ulloa, University of Vigo; Miguel Masciopinto, University of Vigo; Juan Ramón Troncoso-Pastoriza, école Polytechnique Fédérale de Lausanne; Fernando Perez-Gonzalez, Universidad de Vigo
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems
Fuming Fang, National Institute of Informatics; Junichi Yamagishi, National Institute of Informatics; Isao Echizen, National Institute of Informatics; Md Sahidullah, Inria; Tomi Kinnunen, University of Eastern Finland
Fingerprint Presentation Attack Detection Using A Novel Multi-Spectral Capture Device and Patch-Based Convolutional Neural Networks
Mohamed Hussein, University of Southern California; Leonidas Spinoulas, University of Southern California; Fei Xiong, Information Sciences Institute; Wael Abd-Almageed, University of Southern California
Privacy-Preserving Distributed Deep Learning with Privacy Transformations
Sen-ching S. Cheung, University of Kentucky; M. Usman Rafique, University of Kentucky; Wai-tian Tan, Cisco Systems Inc.
Community-based anomaly detection
Martin Kopp, Czech Technical University; Martin Grill, Cisco Systems Inc.; Jan Kohout, Cisco Systems Inc.
A Novel Approach For Data Packing: Using Trapdoor Knapsack
Majid Nateghizad, Delft University of Technology; Zekeriya Erkin, Delft University of Technology; Reginald L. Lagendijk, Delft University of Technology
A Randomized Kernel-Based Secret Image Sharing Scheme
Akella Ravi Tej, Indian Institute of Technology Roorkee; Rekula Raviteja, Indian Institute of Technology Roorkee; Vinod Pankajakshan, Indian Insitute of Technology Roorkee
Protect Your Deep Neural Networks from Piracy
Mingliang Chen, University of Maryland; Min Wu, University of Maryland
Latent Feature Disclosure under Perfect Sample Privacy
Borzoo Rassouli, University of Essex; Fernando Rosas, Imperial College London; Deniz Gunduz, Imperial College London
Exploitation of redundancy for pattern estimation of copy-sensitive two level QR code
Iuliia Tkachenko, University of Saint-Etienne; Christophe Destruel, IGO
Enhanced Geometric Reflection Models for Paper Surface Based Authentication
Runze Liu, North Carolina State University; Chau-Wai Wong, North Carolina State University; Min Wu, University of Maryland