Special Session

 

Special Session: Unclonable Technologies for Physical Object Security

Organizers: Iuliia Tkachenko (University of Saint-Etienne, France), Slava Voloshynovskiy (University of Geneva,Switzerland)

Description:Due to the broad availability of cheap scanning devices and advancements of high-quality printing technologies, there is a high need in fast, reliable and cost-efficient detection of counterfeited objects. This covers invoices, bank checks, diplomas, tax forms, medical packaging and other valuable physical objects. Therefore, different security elements have been suggested to prevent these illegal actions. One of the most promising solutions is the use of unclonable technologies like digital printing security techniques and measurable but not duplicable physical characteristics. These techniques are sensitive to distortions added during reproduction processes. They differ by their design and authentication processes. In the recent years, many companies proposed printing codes and symbologies that are claimed to be unclonable. However, the security and unclonability aspects of these authentication systems remain largely unstudied. Therefore, there is a high need in investigating the security and unclonability of these techniques especially in view of recent advancement of machine learning that provides additional powerful tools for counterfeiters.

This special session aims at covering both passive techniques (printer/scanner forensics, paper and ink identification) and active techniques (copy sensitive graphical codes, security printing) for protection of physical objects.

Submission Instructions:
All special session papers will be submitted/reviewed through CMT .
Select the subject area ‘Special Session: Unclonable Technologies for Physical Object Security’ while submitting your paper for this special session.
Manuscripts should follow WIFS 2018 paper submission length, anonymity and, formatting guidelines.

Key dates are:
July 15, 2018: Paper submission deadline
August 30, 2018: Decision notification to authors

Special Session: Data Hiding in the Encrypted Domain

Organizers: William Puech (Université Montpellier, France), Xinpeng Zhang (Shanghai University, Shanghai, China)

Description: With the increasing interest of the scientific community for cloud computing, many multimedia analysis and processing in the encrypted domain (i.e. without knowing the secret key or the original content) methods have been designed. In particular, methods of data hiding (DH) or reversible data hiding (RDH) in the encrypted domain are suitable for data enrichment and authentication in the encrypted domain. Without knowing the original content of the image (or video), nor the secret key used to encrypt it, it is then possible to embed a secret message in the encrypted media. During the decoding phase, the original content must be perfectly recoverable and the secret message must be extracted without error. Therefore, there exists a trade-o between the embedding capacity and the quality of the reconstructed media.

As DH or RDH algorithms in the clear domain exploit the fact that neighboring pixel values are relatively close in the clear domain, they cannot be directly used in the encrypted domain. Indeed, in the encrypted domain, pixel distribution tends to be uniform and thus, there is no correlation between neighboring pixels. For this reason, recently, specific RDH schemes have been developed. This special session will focus on efficient and innovative DH or RDH algorithms for encrypted images or videos.

The main current challenges in this topic are (but not limited):

  • Increase the embedding capacity in the encrypted domain
  • Get a better quality of a decrypted image still containing a hidden message
  • Create new DH in JPEG crypto-compressed image
  • Propose new DHED for videos or 3D object
  • Improve the predictors
  • Applications of data hiding in encrypted domain
  • Theoretical aspects of data hiding in encrypted domain

Submission Instructions:
All special session papers will be submitted/reviewed through CMT .
Select the subject area ‘Special Session: Data Hiding in the Encrypted Domain’ while submitting your paper for this special session.
Manuscripts should follow WIFS 2018 paper submission length, anonymity and, formatting guidelines.

Key dates are:
July 15, 2018: Paper submission deadline
August 30, 2018: Decision notification to authors