List
of Accepted Papers for the Presentation During WIFS 2018 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Deterministic and
Correlated Random Public-Confidential Capacity Regions of the Arbitrarily
Varying Wiretap Channel |
|
|
|
|
|
|
|
|
|
Ahmed Mansour, Technische
Universität München; Rafael Schaefer, Technische Universität Berlin; Holger
Boche, Technische Universität München |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
An Inception-Based
Data-Driven Ensemble Approach to Camera Model Identification |
|
|
|
|
|
|
|
|
|
Anselmo Ferreira,
Shenzhen University; Han Chen, Shenzhen University; Bin Li, Shenzhen
University; Jiwu Huang, Sun Yat-sen University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
In Ictu Oculi: Exposing
AI Created Fake Videos by Detecting Eye Blinking |
|
|
|
|
|
|
|
|
|
Yuezun Li, University at
Albany; Ming-Ching Chang, University at Albany; Siwei Lyu, University at
Albany |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
MesoNet: a Compact Facial
Video Forgery Detection Network |
|
|
|
|
|
|
|
|
|
Darius Afchar, Ècole
Nationale des Ponts et Chaussèes; Vincent Nozick, JFLI; Junichi Yamagishi,
National Institute of Informatics; Isao Echizen, National Institute of
Informatics |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Emotional Bots:
Content-based Spammer Detection on Social Media |
|
|
|
|
|
|
|
|
|
Panagiotis Andriotis,
University of the West of England; Atsuhiro Takasu, National Institute of
Informatics |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Gender Effect on Face
Recognition for a Large Longitudinal Database |
|
|
|
|
|
|
|
|
|
Caroline
Werther, University of North Carolina Wilmington; Morgan Ferguson, Elon
University; Kevin Park, Emory University; Troy Kling, University of North Carolina Wilmington;
Cuixian Chen, University of North Carolina Wilmington; Yishi Wang, University of North Carolina Wilmington |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Adaptive Channel
Estimation in Side Channel Attacks |
|
|
|
|
|
|
|
|
|
Shan Jin, Department of
Electrical and Computer Engineering, Texas A&M University, College
Station; Riccardo Bettati, Texas A&M University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Error Analysis of
Forensic ENF Matching |
|
|
|
|
|
|
|
|
|
Guang Hua, Wuhan
University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
EPE-based Huge-Capacity
Reversible Data Hiding in Encrypted Images |
|
|
|
|
|
|
|
|
|
Pauline Puteaux, LIRMM
Laboratory, CNRS, Université de Montpellier; William Puech, Univ.
Montpellier, France |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
One-factor Cancellable
Scheme for Fingerprint Template Protection: Extended Feature Vector (EFV)
Hashing |
|
|
|
|
|
|
|
|
|
Ming Jie Lee , Monash
University Malaysia; Zhe Jin, Monash University Malaysia; Andrew Beng Jin
Teoh, Yonsei University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Reversible Data Hiding in
Encrypted Images with Two-MSB Prediction |
|
|
|
|
|
|
|
|
|
Yi Puyang, Anhui
University; Zhaoxia Yin, Anhui University; Zhenxing Qian, Shanghai University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Are Deep Neural Networks
good for blind image watermarking? |
|
|
|
|
|
|
|
|
|
Vedran Vukotic, Lamark;
Vivien Chappelier, Lamark; Teddy Furon, Inria |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Revealing the processing
history of pitch-shifted voice using CNNs |
|
|
|
|
|
|
|
|
|
Lihua Wang, Sun Yat-Sen
University; Huixin Liang, Sun Yat-Sen University; Xiaodan Lin, Huaqiao
University; Xiangui Kang, Sun Yat-Sen University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
JPEG Implementation
Forensics Based on Eigen-Algorithms |
|
|
|
|
|
|
|
|
|
Nicolo Bonettini,
Politecnico di Milano; Luca Bondi, Politecnico di Milano; Paolo Bestagini,
Politecnico di Milano; Stefano Tubaro, Politecnico di Milano, Italy |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Multi-Task Learning CNN
for Image Steganalysis |
|
|
|
|
|
|
|
|
|
Xiangyu Yu, South China
University of Technology; Huabin Tan, South China University of Technology;
Hui Liang, South China University of Technology; Chang-Tsun Li, Charles Sturt
University; Guangjun Liao, Guangdong Police College |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Finger-vein Recognition
using Deep Fully Convolutional Neural Semantic Segmentation Networks: The
Impact of Training Data |
|
|
|
|
|
|
|
|
|
Ehsaneddin Jalilian,
University of Salzburg; Andreas Uhl, University of Salzburg |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Age Estimation via Fusion
of Depthwise Separable Convolutional Neural Networks |
|
|
|
|
|
|
|
|
|
Kuan-Hsien Liu,
National Taichung University of Science and Technology; Hsin-Hua Liu,
National Taiwan University; Pak Ki Chan, National Chung Hsing University;
Tsung-Jung Liu, National Chung Hsing University; Soo-Chang Pei, National
Taiwan University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Generalized Joint Sparse
Representation for Multimodal Biometric Fusion of Heterogeneous Features |
|
|
|
|
|
|
|
|
|
Rudi Primorac, The
University of Western Australia; Roberto Togneri, The University of Western
Australian; Mohammed Bennamoun, University of Western Australia; Ferdous
Sohel, Murdoch University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Exposing Image Resizing
utilizing Welch Power Spectral Density Analysis for Double Compressed JPEG
Images |
|
|
|
|
|
|
|
|
|
Sidhant Sahu, National Institute of Technology,
Rourkela; Manish Okade, NIT Rourkela |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Adaptive Steganography in
the Noisy Channel with Dual-Syndrome Trellis Codes |
|
|
|
|
|
|
|
|
|
Christy Kin-Cleaves,
Oxford University; Andrew D. Ker, University of Oxford |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Database Binning and
Retrieval in Multi-Fingerprint Identification Systems |
|
|
|
|
|
|
|
|
|
Pawel Drozdowski,
Hochschule Darmstadt/NTNU; Daniel Fischer, Hochschule Darmstadt; Christian
Rathgeb, Hochschule Darmstadt; Christopher Schiel, Bundeskriminalamt ;
Christoph Busch, Hochschule Darmstadt |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Performance Evaluation of
Secure Communication Systems on Turing Machines |
|
|
|
|
|
|
|
|
|
Holger Boche, Technische
Universität München; Rafael F. Schaefer, Technische Universität Berlin; H.
Vincent Poor, Princeton University |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Reversible Contrast
Mapping based Reversible Data Hiding in Encrypted Images |
|
|
|
|
|
|
|
|
|
Yingqiang Qiu,
College of information science & engineering, Huaqiao University;
Hangxing Wang, College of information science & engineering, Huaqiao
University; Zichi Wang, Shanghai University; Zhenxing Qian, Shanghai
University; Gui Feng, College of information science & engineering,
Huaqiao University; Xinpeng Zhang, Shanghai University |
|
|
|
|
|
|
|
|
|
|
Countering the Pooled
Triangle Test for PRNU-based camera identification |
|
|
|
|
|
|
|
|
|
Mauro Barni, University
of Siena; MARIKO Nakano-Miyatake, National Polytechnic Institute of Mexico;
Hector Santoyo-Garcia, National Polytechnic Institute of Mexico; Benedetta
Tondi, University of Siena |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Camera Attribution
Forensic Analyzer in the Encrypted Domain |
|
|
|
|
|
|
|
|
|
Alberto Pedrouzo Ulloa,
University of Vigo; Miguel Masciopinto, University of Vigo; Juan Ramón
Troncoso-Pastoriza, École Polytechnique Fédérale de Lausanne; Fernando
Perez-Gonzalez, Universidad de Vigo |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Transforming acoustic
characteristics to deceive playback spoofing countermeasures of speaker
verification systems |
|
|
|
|
|
|
|
|
|
Fuming Fang, National
Institute of Informatics; Junichi Yamagishi, National Institute of
Informatics; Isao Echizen, National Institute of Informatics; Md Sahidullah,
Inria; Tomi Kinnunen, University of Eastern Finland |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fingerprint Presentation
Attack Detection Using A Novel Multi-Spectral Capture Device and Patch-Based
Convolutional Neural Networks |
|
|
|
|
|
|
|
|
|
Mohamed Hussein,
University of Southern California; Leonidas Spinoulas, University of Southern
California; Fei Xiong, Information Sciences Institute; Wael Abd-Almageed,
University of Southern California |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Privacy-Preserving
Distributed Deep Learning with Privacy Transformations |
|
|
|
|
|
|
|
|
|
Sen-ching S. Cheung,
University of Kentucky; M. Usman Rafique, University of Kentucky; Wai-tian
Tan, Cisco Systems Inc. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Community-based anomaly
detection |
|
|
|
|
|
|
|
|
|
Martin Kopp, Czech
Technical University; Martin Grill, Cisco Systems Inc.; Jan Kohout, Cisco
Systems Inc. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Novel Approach For Data
Packing: Using Trapdoor Knapsack |
|
|
|
|
|
|
|
|
|
Majid Nateghizad, Delft
University of Technology; Zekeriya Erkin, Delft University of Technology;
Reginald L. Lagendijk, Delft University of Technology |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
A Randomized Kernel-Based
Secret Image Sharing Scheme |
|
|
|
|
|
|
|
|
|
Akella Ravi Tej, Indian
Institute of Technology Roorkee; Rekula Raviteja, Indian Institute of
Technology Roorkee; Vinod Pankajakshan, Indian Insitute of Technology Roorkee |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Protect Your Deep Neural
Networks from Piracy |
|
|
|
|
|
|
|
|
|
Mingliang Chen,
University of Maryland; Min Wu, University of Maryland |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Latent Feature Disclosure
under Perfect Sample Privacy |
|
|
|
|
|
|
|
|
|
Borzoo Rassouli,
University of Essex; Fernando Rosas, Imperial College London; Deniz Gunduz,
Imperial College London |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Exploitation of
redundancy for pattern estimation of copy-sensitive two level QR code |
|
|
|
|
|
|
|
|
|
Iuliia Tkachenko,
University of Saint-Etienne; Christophe Destruel, IGO |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Enhanced Geometric
Reflection Models for Paper Surface Based Authentication |
|
|
|
|
|
|
|
|
|
Runze Liu, North Carolina
State University; Chau-Wai Wong, North Carolina State University; Min Wu,
University of Maryland |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|