Search dblp for Publications

export results for "toc:db/conf/ih/ihmmsec2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ih/Anderson18,
  author       = {Ross Anderson},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Covert and Deniable Communications},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206023},
  doi          = {10.1145/3206004.3206023},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Anderson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/BorghysBB18,
  author       = {Dirk Borghys and
                  Patrick Bas and
                  Helena Bruyninckx},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Facing the Cover-Source Mismatch on JPHide using Training-Set Design},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {17--22},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206021},
  doi          = {10.1145/3206004.3206021},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/BorghysBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CaoWZZX18,
  author       = {Yun Cao and
                  Yu Wang and
                  Xianfeng Zhao and
                  Meineng Zhu and
                  Zhoujun Xu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Cover Block Decoupling for Content-Adaptive {H.264} Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206014},
  doi          = {10.1145/3206004.3206014},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CaoWZZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenKWZ18,
  author       = {Yifang Chen and
                  Xiangui Kang and
                  Z. Jane Wang and
                  Qiong Zhang},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Densely Connected Convolutional Neural Network for Multi-purpose Image
                  Forensics under Anti-forensic Attacks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206013},
  doi          = {10.1145/3206004.3206013},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenKWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenLL18,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Da Luo},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Identification of Audio Processing Operations Based on Convolutional
                  Neural Network},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {73--77},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206005},
  doi          = {10.1145/3206004.3206005},
  timestamp    = {Fri, 21 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HofbauerU18,
  author       = {Heinz Hofbauer and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Applicability of No-Reference Visual Quality Indices for Visual Security
                  Assessment},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {139--144},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206007},
  doi          = {10.1145/3206004.3206007},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/HofbauerU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HollerU18,
  author       = {Yvonne H{\"{o}}ller and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Do EEG-Biometric Templates Threaten User Privacy?},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206006},
  doi          = {10.1145/3206004.3206006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HollerU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Ker18,
  author       = {Andrew D. Ker},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {On the Relationship Between Embedding Costs and Steganographic Capacity},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {115--120},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206017},
  doi          = {10.1145/3206004.3206017},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Ker18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiZCZY18,
  author       = {Weixiang Li and
                  Weiming Zhang and
                  Kejiang Chen and
                  Wenbo Zhou and
                  Nenghai Yu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Defining Joint Distortion for {JPEG} Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {5--16},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206008},
  doi          = {10.1145/3206004.3206008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiZCZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LiuGZC18,
  author       = {Yaqi Liu and
                  Qingxiao Guan and
                  Xianfeng Zhao and
                  Yun Cao},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Image Forgery Localization based on Multi-Scale Convolutional Neural
                  Networks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {85--90},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206010},
  doi          = {10.1145/3206004.3206010},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LiuGZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MakrushinKND18,
  author       = {Andrey Makrushin and
                  Christian Kraetzer and
                  Tom Neubert and
                  Jana Dittmann},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Generalized Benford's Law for Blind Detection of Morphed Face Images},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206018},
  doi          = {10.1145/3206004.3206018},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MakrushinKND18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MayerBS18,
  author       = {Owen Mayer and
                  Belhassen Bayar and
                  Matthew C. Stamm},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Learning Unified Deep-Features for Multiple Forensic Tasks},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {79--84},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206022},
  doi          = {10.1145/3206004.3206022},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/MayerBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MoCL18,
  author       = {Huaxiao Mo and
                  Bolin Chen and
                  Weiqi Luo},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Fake Faces Identification via Convolutional Neural Network},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {43--47},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206009},
  doi          = {10.1145/3206004.3206009},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MoCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/PevnyK18,
  author       = {Tom{\'{a}}s Pevn{\'{y}} and
                  Andrew D. Ker},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Exploring Non-Additive Distortion in Steganography},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {109--114},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206015},
  doi          = {10.1145/3206004.3206015},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/PevnyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/RichterESS18,
  author       = {Timo Richter and
                  Stephan Escher and
                  Dagmar Sch{\"{o}}nfeld and
                  Thorsten Strufe},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Forensic Analysis and Anonymisation of Printed Documents},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206019},
  doi          = {10.1145/3206004.3206019},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/RichterESS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/SchramlDU18,
  author       = {Rudolf Schraml and
                  Luca Debiasi and
                  Andreas Uhl},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Real or Fake: Mobile Device Drug Packaging Authentication},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {121--126},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206016},
  doi          = {10.1145/3206004.3206016},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/SchramlDU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Verdoliva18,
  author       = {Luisa Verdoliva},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Deep Learning in Multimedia Forensics},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206024},
  doi          = {10.1145/3206004.3206024},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/Verdoliva18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangCZXZ18,
  author       = {Yu Wang and
                  Yun Cao and
                  Xianfeng Zhao and
                  Zhoujun Xu and
                  Meineng Zhu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography
                  by Constructing Isolated Channels in {HEVC}},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {97--107},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206020},
  doi          = {10.1145/3206004.3206020},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangCZXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangYYZX18,
  author       = {Yuntao Wang and
                  Kun Yang and
                  Xiaowei Yi and
                  Xianfeng Zhao and
                  Zhoujun Xu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {CNN-based Steganalysis of {MP3} Steganography in the Entropy Code
                  Domain},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {55--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206011},
  doi          = {10.1145/3206004.3206011},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangYYZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangZCLLY18,
  author       = {Yiwei Zhang and
                  Weiming Zhang and
                  Kejiang Chen and
                  Jiayang Liu and
                  Yujia Liu and
                  Nenghai Yu},
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Adversarial Examples Against Deep Neural Network based Steganalysis},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004.3206012},
  doi          = {10.1145/3206004.3206012},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangZCLLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2018,
  editor       = {Rainer B{\"{o}}hme and
                  Cecilia Pasquini and
                  Giulia Boato and
                  Pascal Sch{\"{o}}ttle},
  title        = {Proceedings of the 6th {ACM} Workshop on Information Hiding and Multimedia
                  Security, Innsbruck, Austria, June 20-22, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3206004},
  doi          = {10.1145/3206004},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics