Abstract is missing.
- Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake DetectionAwais Khan 0007, Khalid Mahmood Malik. 1-6 [doi]
- Distribution-Agnostic Database De-Anonymization Under Synchronization ErrorsSerhat Bakirtas, Elza Erkip. 1-6 [doi]
- Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based CodesElena Rodríguez Lois, Fernando Pérez-González. 1-6 [doi]
- Audio Spectrogram Transformer for Synthetic Speech Detection via Speech Formant AnalysisLuca Cuccovillo, Milica Gerhardt, Patrick Aichroth. 1-6 [doi]
- Reversing Deep Face Embeddings with Probable Privacy ProtectionDailé Osorio Roig, Paul A. Gerlitz, Christian Rathgeb, Christoph Busch 0001. 1-6 [doi]
- Optimizing Key-Selection for Face-Based One-Time Biometrics via MorphingDailé Osorio Roig, Mahdi Ghafourian, Christian Rathgeb, Rubén Vera-Rodríguez, Christoph Busch 0001, Julian Fiérrez. 1-6 [doi]
- PRNU-Based Source Camera Statistical CertificationMarina Gardella, Pablo Musé, Miguel Colom, Jean-Michel Morel, Denis Perraud. 1-6 [doi]
- Robust Retraining-free GAN Fingerprinting via Personalized NormalizationJianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni. 1-6 [doi]
- Observing Bag Gain in JPEG Batch SteganographyEdgar Kaziakhmedov, Eli Dworetzky, Jessica J. Fridrich. 1-6 [doi]
- Are you Really Alone? Detecting the use of Speech Separation Techniques on Audio RecordingsDavide Salvi, Mirco Pezzoli, Sara Mandelli, Paolo Bestagini, Stefano Tubaro. 1-6 [doi]
- An Explainable Model-Agnostic Algorithm for CNN-Based Biometrics VerificationFernando Alonso-Fernandez, Kevin Hernandez-Diaz, Jose Maria Buades Rubio, Prayag Tiwari, Josef Bigün. 1-6 [doi]
- Recoverable Active Protection Framework for Neural Network ModelsLin Huang, Gejian Zhao, Chuan Qin 0001. 1-6 [doi]
- Private Variable-Length Coding with Zero LeakageAmirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund. 1-6 [doi]
- Practical Wiretap Code Design by Concatenated Autoencoder and LDPC CodesShangxuan Lyu, Ramprasad Raghunath, Luca Kunz, Karl-Ludwig Besser, Pin-Hsun Lin, Eduard A. Jorswieck. 1-7 [doi]
- Leveraging Data Geometry to Mitigate CSM in SteganalysisRony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný. 1-6 [doi]
- An Open Dataset of Synthetic SpeechArtem Yaroshchuk, Christoforos Papastergiopoulos, Luca Cuccovillo, Patrick Aichroth, Konstantinos Votis, Dimitrios Tzovaras. 1-6 [doi]
- Private Variable-Length Coding with Non-Zero LeakageAmirreza Zamani, Tobias J. Oechtering, Mikael Skoglund. 1-6 [doi]
- CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection PatternsHédi Zeghidi, Carlos Crispim Junior, Iuliia Tkachenko. 1-6 [doi]
- Advancing Audio Phylogeny: A Neural Network Approach for Transformation DetectionMilica Gerhardt, Luca Cuccovillo, Patrick Aichroth. 1-6 [doi]
- JPEG Steganalysis Using Leaked Cover ThumbnailsMartin Benes 0001, Benedikt Lorch, Rainer Böhme. 1-6 [doi]
- Three Bricks to Consolidate Watermarks for Large Language ModelsPierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon. 1-6 [doi]
- Protecting Voice-Controlled Devices Against LASER Injection AttacksHashim Ali, Dhimant Khuttan, Rafi Ud Daula Refat, Hafiz Malik. 1-6 [doi]
- The Automotive BlackBox: Towards a Standardization of Automotive Digital ForensicsKim Strandberg, Ulf Arnljung, Tomas Olovsson. 1-6 [doi]
- On Exploring Audio Anomaly in SpeechTiago Roxo, Joana Cabral Costa, Pedro R. M. Inácio, Hugo Proença 0001. 1-6 [doi]
- Fully Homomorphic Encryption Operators for Score and Decision Fusion in Biometric IdentificationTilak Sharma, Mahika Wason, Vishnu Boddeti, Arun Ross, Nalini K. Ratha. 1-6 [doi]
- To Impute or Not: Recommendations for Multibiometric FusionMelissa R. Dale, Elliot Singer, Bengt J. Borgström, Arun Ross. 1-6 [doi]
- A First Look at Shill Looping in NFT EcosystemAnkit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti. 1-6 [doi]
- Enhancement Strategies For Copy-Paste Generation & Localization in RGB Satellite ImageryEdoardo Daniele Cannas, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp. 1-6 [doi]
- Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned FeaturesSarah Barrington, Romit Barua, Gautham Koorma, Hany Farid. 1-6 [doi]
- Stochastic Digital Twin for Copy Detection PatternsYury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy. 1-6 [doi]
- MT-PRO: Multibiometric Template Protection Based On Homomorphic TranscipheringPia Bauspieß, Chiara-Marie Zok, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch 0001. 1-6 [doi]
- AlphaNet: Single Morphing Attack Detection Using Multiple ContributorsJuan E. Tapia, Christoph Busch 0001. 1-6 [doi]
- One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter NetworksFelix Klement, Emily Vorderwülbeke, Stefan Katzenbeisser 0001. 1-6 [doi]