B-3-3: Recent Advances in Multimedia Security and Forensics |
All times are in New Zealand Time (UTC +13) |
| Presentation Time: Thursday, December 10, 17:30 - 19:30 Check your Time Zone |
| B-3-3.1: A METHOD FOR IDENTIFYING ORIGIN OF DIGITAL IMAGES USING A CONVOLUTIONAL NEURAL NETWORK |
| Rong Huang; Donghua University |
| Fuming Fang; National Institute of Informatics |
| Huy H. Nguyen; SOKENDAI (The Graduate University for Advanced Studies) |
| Junichi Yamagishi; National Institute of Informatics |
| Isao Echizen; National Institute of Informatics |
| B-3-3.2: COST SENSITIVE OPTIMIZATION OF DEEPFAKE DETECTOR |
| Ivan Kukanov; A*STAR |
| Janne Karttunen; University of Eastern Finland |
| Hannu Sillanpää; University of Eastern Finland |
| Ville Hautamäki; University of Eastern Finland |
| B-3-3.3: VISUAL SECURITY EVALUATION OF LEARNABLE IMAGE ENCRYPTION METHODS AGAINST CIPHERTEXT-ONLY ATTACKS |
| Warit Sirichotedumrong; Tokyo Metropolitan University |
| Hitoshi Kiya; Tokyo Metropolitan University |
| B-3-3.4: VEIN PATTERN VISUALISATION USING CONDITIONAL GENERATIVE ADVERSARIAL NETWORKS |
| Ali Keivanmarz; Unitec Institute of Technology |
| Hamid Sharifzadeh; Unitec Institute of Technology |
| Rachel Fleming; Institute of Environmental Science and Research (ESR) |
| B-3-3.5: MULTIMODAL PERSONAL EAR AUTHENTICATION USING MULTIPLE SENSOR INFORMATION |
| Shunji Itani; Kansai University |
| Shunsuke Kita; Osaka Research Institute of Industrial Science and Technology |
| Yoshinobu Kajikawa; Kansai Univercity |
| B-3-3.6: SPEECH INFORMATION HIDING BY MODIFICATION OF LSF QUANTIZATION INDEX IN CELP CODEC |
| Candy Olivia Mawalim; Japan Advanced Institute of Science and Technology |
| Shengbei Wang; Tianjin Polytechnic University |
| Masashi Unoki; Japan Advanced Institute of Science and Technology |
| B-3-3.7: A SECURE OPUS PULSE STEGANOGRAPHIC SCHEME BASED ON MESSAGE TRANSFORM |
| Yanzhen Ren; Wuhan University |
| Shan Zhong; Wuhan University |
| Weiping Tu; Wuhan University |
| Lina Wang; Wuhan University |