researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1996
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
C++
Markov
Meta-Environment
analysis
context-aware
data-flow
design
graph-rewriting
information hiding
meta-model
modeling
open-source
optimization
protocol
rewriting
rule-based
security
source-to-source
systematic-approach
watermarking
Filter by Author
[+]
OR
AND
NOT
1
Andreas Uhl
Andreas Westfeld
Andrew D. Ker
Boris Skoric
Fernando Pérez-González
Jan Butora
Jana Dittmann
Jessica J. Fridrich
Jiangqun Ni
Jiwu Huang
Miodrag Potkonjak
Patrick Bas
Rainer Böhme
Rémi Cogranne
Scott Craver
Teddy Furon
Tomás Pevný
Weiqi Luo
Xianfeng Zhao
Yun Cao
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
data
detection
digital
embedding
fingerprinting
hiding
image
images
information
jpeg
learning
neural
secure
security
steganalysis
steganographic
steganography
using
watermarking
Information Hiding (ih)
Editions
Publications
Viewing Publication 1 - 100 from 645
2023
Fooling State-of-the-art Deepfake Detection with High-quality Deepfakes
Arian Beckmann
,
Anna Hilsmann
,
Peter Eisert
.
ih 2023
:
175-180
[doi]
Synthesized Speech Attribution Using The Patchout Spectrogram Attribution Transformer
Kratika Bhagtani
,
Emily R. Bartusiak
,
Amit Kumar Singh Yadav
,
Paolo Bestagini
,
Edward J. Delp
.
ih 2023
:
157-162
[doi]
Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack
Jan Butora
,
Patrick Bas
,
Rémi Cogranne
.
ih 2023
:
59-66
[doi]
Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics
Oubaïda Chouchane
,
Michele Panariello
,
Oualid Zari
,
Ismet Kerenciler
,
Imen Chihaoui
,
Massimiliano Todisco
,
Melek Önen
.
ih 2023
:
127-132
[doi]
Applying a Zero-Knowledge Watermarking Protocol to Secure Elections
Scott Craver
,
Nicholas Rosbrook
.
ih 2023
:
115-120
[doi]
On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests
Eli Dworetzky
,
Edgar Kaziakhmedov
,
Jessica J. Fridrich
.
ih 2023
:
37-46
[doi]
Advancing the JPEG Compatibility Attack: Theory, Performance, Robustness, and Practice
Eli Dworetzky
,
Edgar Kaziakhmedov
,
Jessica J. Fridrich
.
ih 2023
:
67-79
[doi]
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints
Yaodong Fang
,
Yuanding Zhou
,
Xinran Li
,
Ping Kong
,
Chuan Qin 0001
.
ih 2023
:
7-12
[doi]
Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics
Nora Hofer
,
Rainer Böhme
.
ih 2023
:
47-58
[doi]
Limits of Data Driven Steganography Detectors
Edgar Kaziakhmedov
,
Eli Dworetzky
,
Jessica J. Fridrich
.
ih 2023
:
81-90
[doi]
On the Feasibility of Post-Mortem Hand-Based Vascular Biometric Recognition
Simon Kirchgasser
,
Christof Kauba
,
Bernhard Prommegger
,
Fabio Monticelli
,
Andreas Uhl
.
ih 2023
:
121-126
[doi]
First Learning Steps to Recognize Faces in the Noise
Lukas Lamminger
,
Heinz Hofbauer
,
Andreas Uhl
.
ih 2023
:
139-144
[doi]
Compatibility and Timing Attacks for JPEG Steganalysis
Etienne Levecque
,
Patrick Bas
,
Jan Butora
.
ih 2023
:
29-35
[doi]
An Improved Reversible Database Watermarking Method based on Histogram Shifting
Cheng Li
,
Xinhui Han
,
Wenfa Qi
,
Zongming Guo
.
ih 2023
:
103-114
[doi]
On the Detection, Localization, and Reverse Engineering of Diverse Image Manipulations
Xiaoming Liu
.
ih 2023
:
5
[doi]
Comprehensive Dataset of Synthetic and Manipulated Overhead Imagery for Development and Evaluation of Forensic Tools
Brandon B. May
,
Kirill Trapeznikov
,
Shengbang Fang
,
Matthew C. Stamm
.
ih 2023
:
145-150
[doi]
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2023, Chicago, IL, USA, June 28-30, 2023
Daniel Moreira
,
Aparna Bharati
,
Cecilia Pasquini
,
Yassine Yousfi
, editors,
ACM,
2023.
[doi]
Steganography on Mobile Apps
Jennifer L. Newman
.
ih 2023
:
3
[doi]
Photoshop Fantasies
Walter J. Scheirer
.
ih 2023
:
1
[doi]
Hand Vein Spoof GANs: Pitfalls in the Assessment of Synthetic Presentation Attack Artefacts
Andreas Vorderleitner
,
Jutta Hämmerle-Uhl
,
Andreas Uhl
.
ih 2023
:
133-138
[doi]
SCL-Stega: Exploring Advanced Objective in Linguistic Steganalysis using Contrastive Learning
Juan Wen
,
Liting Gao
,
Guangying Fan
,
Ziwei Zhang
,
Jianghao Jia
,
Yiming Xue
.
ih 2023
:
97-102
[doi]
Extracting Efficient Spectrograms From MP3 Compressed Speech Signals for Synthetic Speech Detection
Ziyue Xiang
,
Amit Kumar Singh Yadav
,
Stefano Tubaro
,
Paolo Bestagini
,
Edward J. Delp
.
ih 2023
:
163-168
[doi]
MetaFake: Few-shot Face Forgery Detection with Meta Learning
Nanqing Xu
,
Weiwei Feng 0007
.
ih 2023
:
151-156
[doi]
Video Frame Interpolation via Multi-scale Expandable Deformable Convolution
Dengyong Zhang
,
Pu Huang
,
Xiangling Ding
,
Feng Li
,
Gaobo Yang
.
ih 2023
:
19-28
[doi]
Calibration-based Steganalysis for Neural Network Steganography
Na Zhao
,
Kejiang Chen
,
Chuan Qin 0003
,
Yi Yin
,
Weiming Zhang 0001
,
Nenghai Yu
.
ih 2023
:
91-96
[doi]
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning
Gejian Zhao
,
Chuan Qin
,
Xiangyang Luo
,
Xinpeng Zhang 0001
,
Chin-Chen Chang
.
ih 2023
:
13-18
[doi]
Exposing Deepfakes using Dual-Channel Network with Multi-Axis Attention and Frequency Analysis
Yue Zhou
,
Bing Fan
,
Pradeep K. Atrey
,
Feng Ding
.
ih 2023
:
169-174
[doi]
2022
AMR Steganalysis based on Adversarial Bi-GRU and Data Distillation
Zhijun Wu 001
,
Junjun Guo
.
ih 2022
:
141-146
[doi]
Know Your Library: How the libjpeg Version Influences Compression and Decompression Results
Martin Benes
,
Nora Hofer
,
Rainer Böhme
.
ih 2022
:
19-25
[doi]
Fighting the Reverse JPEG Compatibility Attack: Pick your Side
Jan Butora
,
Patrick Bas
.
ih 2022
:
113-121
[doi]
Covert Communications through Imperfect Cancellation
Daniel Chew
,
Christine Nguyen
,
Samuel Berhanu
,
Chris Baumgart
,
A. Brinton Cooper
.
ih 2022
:
63-68
[doi]
Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption
Alberto Ibarrondo
,
Hervé Chabanne
,
Vincent Despiegel
,
Melek Önen
.
ih 2022
:
129-139
[doi]
Collusion-resistant Fingerprinting of Parallel Content Channels
Basheer Joudeh
,
Boris Skoric
.
ih 2022
:
81-89
[doi]
Capacity Laws for Steganography in a Crowd
Andrew D. Ker
.
ih 2022
:
147-156
[doi]
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics
Stefan Kiltz
,
Robert Altschaffel
,
Jana Dittmann
.
ih 2022
:
107-112
[doi]
Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models
Farinaz Koushanfar
.
ih 2022
:
5
[doi]
Looking for Signals: A Systems Security Perspective
Christopher Kruegel
.
ih 2022
:
3
[doi]
Covert Channels in Network Time Security
Kevin Lamshöft
,
Jana Dittmann
.
ih 2022
:
69-79
[doi]
A Nearest Neighbor Under-sampling Strategy for Vertical Federated Learning in Financial Domain
Denghao Li
,
Jianzong Wang
,
Lingwei Kong
,
Shijing Si
,
Zhangcheng Huang
,
Chenyu Huang
,
Jing Xiao 0006
.
ih 2022
:
123-128
[doi]
FMFCC-V: An Asian Large-Scale Challenging Dataset for DeepFake Detection
Gen Li
,
Xianfeng Zhao
,
Yun Cao
,
Pengfei Pei
,
Jinchuan Li
,
Zeyu Zhang
.
ih 2022
:
7-18
[doi]
BlindSpot: Watermarking Through Fairness
Sofiane Lounici
,
Melek Önen
,
Orhan Ermis
,
Slim Trabelsi
.
ih 2022
:
39-50
[doi]
Sparse Trigger Pattern Guided Deep Learning Model Watermarking
Chun-Shien Lu
.
ih 2022
:
33-38
[doi]
IH&MMSec '22: ACM Workshop on Information Hiding and Multimedia Security, Santa Barbara, CA, USA, June 27 - 28, 2022
B. S. Manjunath
,
Jan Butora
,
Benedetta Tondi
,
Claus Vielhauer
, editors,
ACM,
2022.
[doi]
Identity-Referenced Deepfake Detection with Contrastive Learning
Dongyao Shen
,
Youjian Zhao
,
Chengbin Quan
.
ih 2022
:
27-32
[doi]
Towards Generalization in Deepfake Detection
Luisa Verdoliva
.
ih 2022
:
1
[doi]
Few-shot Text Steganalysis Based on Attentional Meta-learner
Juan Wen
,
Ziwei Zhang
,
Yu Yang
,
Yiming Xue
.
ih 2022
:
97-106
[doi]
Domain Adaptational Text Steganalysis Based on Transductive Learning
Yiming Xue
,
Boya Yang
,
Yaqian Deng
,
Wanli Peng
,
Juan Wen
.
ih 2022
:
91-96
[doi]
Detector-Informed Batch Steganography and Pooled Steganalysis
Yassine Yousfi
,
Eli Dworetzky
,
Jessica J. Fridrich
.
ih 2022
:
157-168
[doi]
Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification
Árpád Berta
,
Gábor Danner
,
István Hegedüs
,
Márk Jelasity
.
ih 2022
:
51-62
[doi]
2021
Exploitation and Sanitization of Hidden Data in PDF Files: Do Security Agencies Sanitize Their PDF Files?
Supriya Adhatarao
,
Cédric Lauradoux
.
ih 2021
:
35-44
[doi]
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences
Robert Altschaffel
,
Jonas Hielscher
,
Stefan Kiltz
,
Jana Dittmann
.
ih 2021
:
23-33
[doi]
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!
Sayed Erfan Arefin
,
Abdul Serwadda
.
ih 2021
:
75-80
[doi]
DNN Watermarking: Four Challenges and a Funeral
Mauro Barni
,
Fernando Pérez-González
,
Benedetta Tondi
.
ih 2021
:
189-196
[doi]
Optimizing Additive Approximations of Non-additive Distortion Functions
Solène Bernard
,
Patrick Bas
,
Tomás Pevný
,
John Klein
.
ih 2021
:
105-112
[doi]
IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021
Dirk Borghys
,
Patrick Bas
,
Luisa Verdoliva
,
Tomás Pevný
,
Bin Li 0011
,
Jennifer Newman
, editors,
ACM,
2021.
[doi]
How to Pretrain for Steganalysis
Jan Butora
,
Yassine Yousfi
,
Jessica J. Fridrich
.
ih 2021
:
143-148
[doi]
Revisiting Perturbed Quantization
Jan Butora
,
Jessica J. Fridrich
.
ih 2021
:
125-136
[doi]
Angular Margin Softmax Loss and Its Variants for Double Compressed AMR Audio Detection
Aykut Büker
,
Cemal Hanilçi
.
ih 2021
:
45-50
[doi]
How Private is Machine Learning?
Nicolas Carlini
.
ih 2021
:
3
[doi]
Banners: Binarized Neural Networks with Replicated Secret Sharing
Alberto Ibarrondo
,
Hervé Chabanne
,
Melek Önen
.
ih 2021
:
63-74
[doi]
A Protocol for Secure Verification of Watermarks Embedded into Machine Learning Models
Katarzyna Kapusta
,
Vincent Thouvenot
,
Olivier Bettan
,
Hugo Beguinet
,
Hugo Senet
.
ih 2021
:
171-176
[doi]
White-Box Watermarking Scheme for Fully-Connected Layers in Fine-Tuning Model
Minoru Kuribayashi
,
Takuro Tanaka
,
Shunta Suzuki
,
Tatsuya Yasui
,
Nobuo Funabiki
.
ih 2021
:
165-170
[doi]
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset
Kevin Lamshöft
,
Tom Neubert
,
Christian Krätzer
,
Claus Vielhauer
,
Jana Dittmann
.
ih 2021
:
113-124
[doi]
Towards Match-on-Card Finger Vein Recognition
Michael Linortner
,
Andreas Uhl
.
ih 2021
:
87-92
[doi]
PRNU-based Deepfake Detection
Florian Lugstein
,
Simon Baier
,
Gregor Bachinger
,
Andreas Uhl
.
ih 2021
:
7-12
[doi]
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations
Andrey Makrushin
,
Christof Kauba
,
Simon Kirchgasser
,
Stefan Seidlitz
,
Christian Kraetzer
,
Andreas Uhl
,
Jana Dittmann
.
ih 2021
:
93-104
[doi]
Piracy-Resistant DNN Watermarking by Block-Wise Image Transformation with Secret Key
April Pyone Maung Maung
,
Hitoshi Kiya
.
ih 2021
:
159-164
[doi]
Tracing Data through Learning with Watermarking
Alexandre Sablayrolles
.
ih 2021
:
5
[doi]
iNNformant: Boundary Samples as Telltale Watermarks
Alexander Schlögl
,
Tobias Kupek
,
Rainer Böhme
.
ih 2021
:
81-86
[doi]
On the Robustness of Backdoor-based Watermarking in Deep Neural Networks
Masoumeh Shafieinejad
,
Nils Lukas
,
Jiaqi Wang
,
XinDa Li
,
Florian Kerschbaum
.
ih 2021
:
177-188
[doi]
Evaluating and Designing against Side-Channel Leakage: White Box or Black Box?
François-Xavier Standaert
.
ih 2021
:
1
[doi]
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice
Huili Wang
,
Zhongliang Yang
,
Yuting Hu
,
Zhen Yang
,
Yongfeng Huang
.
ih 2021
:
137-142
[doi]
Improving EfficientNet for JPEG Steganalysis
Yassine Yousfi
,
Jan Butora
,
Jessica Fridrich
,
Clément Fuji Tsang
.
ih 2021
:
149-157
[doi]
Fake Speech Detection Using Residual Network with Transformer Encoder
Zhenyu Zhang
,
Xiaowei Yi
,
Xianfeng Zhao
.
ih 2021
:
13-22
[doi]
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning
Chen Zhao
,
Yu Wen
,
Shuailou Li
,
Fucheng Liu
,
Dan Meng
.
ih 2021
:
51-62
[doi]
2020
LiveDI: An Anti-theft Model Based on Driving Behavior
Hashim Abu-gellban
,
Long H. Nguyen
,
Mahdi Moghadasi
,
Zhenhe Pan
,
Fang Jin
.
ih 2020
:
67-72
[doi]
Photo Forensics From Rounding Artifacts
Shruti Agarwal
,
Hany Farid
.
ih 2020
:
103-114
[doi]
Exploiting Prediction Error Inconsistencies through LSTM-based Classifiers to Detect Deepfake Videos
Irene Amerini
,
Roberto Caldelli
.
ih 2020
:
97-102
[doi]
What if Adversarial Samples were Digital Images?
Benoît Bonnet
,
Teddy Furon
,
Patrick Bas
.
ih 2020
:
55-66
[doi]
Turning Cost-Based Steganography into Model-Based
Jan Butora
,
Yassine Yousfi
,
Jessica J. Fridrich
.
ih 2020
:
151-159
[doi]
Steganography by Minimizing Statistical Detectability: The cases of JPEG and Color Images
Rémi Cogranne
,
Quentin Giboulot
,
Patrick Bas
.
ih 2020
:
161-167
[doi]
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel
Pingan Fan
,
Hong Zhang
,
Yifan Cai
,
Pei Xie
,
Xianfeng Zhao
.
ih 2020
:
127-137
[doi]
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection
Mario Hildebrandt
,
Kevin Lamshöft
,
Jana Dittmann
,
Tom Neubert
,
Claus Vielhauer
.
ih 2020
:
115-120
[doi]
Feature Aggregation Networks for Image Steganalysis
Haneol Jang
,
Tae-Woo Oh
,
Kibom Kim
.
ih 2020
:
33-38
[doi]
Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage
Thomas Jerkovits
,
Onur Günlü
,
Vladimir Sidorenko
,
Gerhard Kramer
.
ih 2020
:
79-89
[doi]
Game-Theoretic Perspectives and Algorithms for Cybersecurity
Christopher Kiekintveld
.
ih 2020
:
3
[doi]
Simulating Suboptimal Steganographic Embedding
Christy Kin-Cleaves
,
Andrew D. Ker
.
ih 2020
:
121-126
[doi]
On the Difficulty of Hiding Keys in Neural Networks
Tobias Kupek
,
Cecilia Pasquini
,
Rainer Böhme
.
ih 2020
:
73-78
[doi]
Deep Audio Steganalysis in Time Domain
Daewon Lee
,
Tae-Woo Oh
,
Kibom Kim
.
ih 2020
:
11-21
[doi]
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans
Andrey Makrushin
,
Dennis Siegel
,
Jana Dittmann
.
ih 2020
:
91-96
[doi]
IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020
Christian Riess
,
Franziska Schirrmacher
,
Irene Amerini
,
Paolo Bestagini
,
Tomás Pevný
, editors,
ACM,
2020.
[doi]
JPEG Steganography and Synchronization of DCT Coefficients for a Given Development Pipeline
Théo Taburet
,
Patrick Bas
,
Wadih Sawaya
,
Rémi Cogranne
.
ih 2020
:
139-149
[doi]
Protecting Smartphone Screen Notification Privacy by Verifying the Gripping Hand
Chen Wang
,
Jingjing Mu
,
Long Huang
.
ih 2020
:
49-54
[doi]
Exploiting Micro-Signals for Physiological Forensics
Min Wu
.
ih 2020
:
1
[doi]
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis
Jianhua Yang
,
Beiling Lu
,
Liang Xiao
,
Xiangui Kang
,
Yunqing Shi
.
ih 2020
:
23-32
[doi]
Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid
Hao Yang
,
Yongjian Bao
,
Zhongliang Yang
,
Sheng Liu
,
Yongfeng Huang
,
Saimei Jiao
.
ih 2020
:
5-10
[doi]
Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis
Mehdi Yedroudj
,
Marc Chaumont
,
Frédéric Comby
,
Ahmed Oulad Amara
,
Patrick Bas
.
ih 2020
:
39-48
[doi]
2019
Impact of Spatial Constraints when Signing in Uncontrolled Mobile Conditions
Majd Abazid
,
Nesma Houmani
,
Sonia Garcia-Salicetti
.
ih 2019
:
89-94
[doi]
The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis
Rémi Cogranne
,
Quentin Giboulot
,
Patrick Bas
.
ih 2019
:
125-137
[doi]
Camera Identification from HDR Images
Morteza Darvish Morshedi Hosseini
,
Miroslav Goljan
.
ih 2019
:
69-76
[doi]
Sign in
or
sign up
to see more results.