


default search action
12th IH&MMSec 2025: San Jose, CA, USA
- Shruti Agarwal, Scott Craver, Shan Jia, Chau-Wai Wong, Benedetta Tondi:

Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSEC 2025, San Jose, USA, June 18-20, 2025. ACM 2025, ISBN 979-8-4007-1887-8 - Joy Battocchio

, Stefano Dell'Anna
, Andrea Montibeller
, Giulia Boato
:
Advance Fake Video Detection via Vision Transformers. 1-11 - Yu Cai

, Peng Chen
, Jiahe Tian
, Jin Liu
, Jiao Dai
, Xi Wang
, Shan Jia
, Siwei Lyu
, Jizhong Han
:
Modality-Agnostic Deepfakes Detection. 12-23 - Yiran He, Yun Cao, Bowen Yang

, Zeyu Zhang
:
Can GPT tell us why these images are synthesized? Empowering Multimodal Large Language Models for Forensics. 24-34 - Diego Soi

, Silvia Lucia Sanna
, Giacomo Benedetti
, Angelica Liguori
, Leonardo Regano
, Luca Caviglione
, Giorgio Giacinto
:
Analysis and Detection of Android Stegomalware: the Impact of the Loading Stage. 35-45 - Jana Dittmann

, Stefan Kiltz
, Robert Altschaffel
, Judith Antal
:
Traces Left by the Originator: Forensic Fingerprinting Hidden Malware in Images to Enable Attribution on the Example of SteganoAmor. 46-51 - Claus Vielhauer

, Fabian Loewe
, Michael Pilgermann
:
Towards Modeling Hidden & Steganographic Malware Communication based on Images. 52-63 - Felix Feist

, Sebastian Karius
, Mandy Knöchel
, Sandro Wefel
:
Support of Forensic Attribution by Visualizing Textual Embeddings of Stegomalware. 64-73 - Pascal Tippe

, Adrian Tippe
, Jörg Keller
:
Detecting and Attributing Tor-Obfuscated Malware Communications Through Traffic Fingerprinting. 74-79 - João Phillipe Cardenuto

, Joshua Krinsky
, Lucas Nogueira
, Aparna Bharati
, Daniel Moreira
:
Implications of Neural Compression to Scientific Images. 80-85 - Martin Zbudila

, Aysajan Abidin
, Bart Preneel
:
Exploring Adversarial Attacks on the MaSTer Truncation Protocol. 86-97 - Mahdi Rahimi

:
MOCHA: Mixnet Optimization Considering Honest Client Anonymity. 98-107 - Hoover H. F. Yin

, Harry W. H. Wong
:
How (Not) to Build Dual-Regev Covert Channel. 108-113 - Shengnan Guo

, Kaiyi Pang
, Zhongliang Yang
, Yamin Li
, Yu Qing
, Yongfeng Huang
:
Reinforcement Learning-based Copyright Protection Watermarking for Large Language Model. 114-120 - Eli Dworetzky

, Jessica J. Fridrich
:
Secure Payload Scaling in Detector-Informed Batch Steganography: The Mismatched Detectors Case. 121-130 - Ziping Zhang

, Jiamin Zeng
, Yan Xu
, Xiaowei Yi
, Yun Cao
, Changjun Liu
:
Triple-Stage Robust Audio Steganography Framework with AAC Encoding for Lossy Social Media Channels. 131-141 - Saixing Zhou

, Miaoxin Ye
, Weiqi Luo
, Xin Liao
, Kangkang Wei
:
Color Image Steganography Using Generative Adversarial Networks with a Phased Training Strategy. 142-152 - Yufei Luo

, Zhen Yang
, Xin Xu
, Yelei Wang
, Ru Zhang
, Yongfeng Huang
:
Clustering-Driven Pseudo-Labeling in Source-Free Domain Adaptation for Linguistic Steganalysis. 153-163 - Edgar Kaziakhmedov

, Jessica J. Fridrich
, Patrick Bas
:
Effect of Acquisition Noise Outliers on Steganalysis. 164-173 - Kirill Trapeznikov

, Paul Cummer
, Pranay Pherwani
, Jai Aslam
, Michael Davinroy
, Peter Bautista
, Laura Cassani
, Matthew C. Stamm
:
SAFE: Synthetic Audio Forensics Evaluation Challenge. 174-180 - Candy Olivia Mawalim

, Yutong Wang
, Aulia Adila
, Shogo Okada
, Masashi Unoki
:
Robust Multilingual Audio Deepfake Detection Through Hybrid Modeling. 181-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














