B-3-3: Recent Advances in Multimedia Security and Forensics |
All times are in New Zealand Time (UTC +13) |
Presentation Time: Thursday, December 10, 17:30 - 19:30 Check your Time Zone |
B-3-3.1: A METHOD FOR IDENTIFYING ORIGIN OF DIGITAL IMAGES USING A CONVOLUTIONAL NEURAL NETWORK |
Rong Huang; Donghua University |
Fuming Fang; National Institute of Informatics |
Huy H. Nguyen; SOKENDAI (The Graduate University for Advanced Studies) |
Junichi Yamagishi; National Institute of Informatics |
Isao Echizen; National Institute of Informatics |
B-3-3.2: COST SENSITIVE OPTIMIZATION OF DEEPFAKE DETECTOR |
Ivan Kukanov; A*STAR |
Janne Karttunen; University of Eastern Finland |
Hannu Sillanpää; University of Eastern Finland |
Ville Hautamäki; University of Eastern Finland |
B-3-3.3: VISUAL SECURITY EVALUATION OF LEARNABLE IMAGE ENCRYPTION METHODS AGAINST CIPHERTEXT-ONLY ATTACKS |
Warit Sirichotedumrong; Tokyo Metropolitan University |
Hitoshi Kiya; Tokyo Metropolitan University |
B-3-3.4: VEIN PATTERN VISUALISATION USING CONDITIONAL GENERATIVE ADVERSARIAL NETWORKS |
Ali Keivanmarz; Unitec Institute of Technology |
Hamid Sharifzadeh; Unitec Institute of Technology |
Rachel Fleming; Institute of Environmental Science and Research (ESR) |
B-3-3.5: MULTIMODAL PERSONAL EAR AUTHENTICATION USING MULTIPLE SENSOR INFORMATION |
Shunji Itani; Kansai University |
Shunsuke Kita; Osaka Research Institute of Industrial Science and Technology |
Yoshinobu Kajikawa; Kansai Univercity |
B-3-3.6: SPEECH INFORMATION HIDING BY MODIFICATION OF LSF QUANTIZATION INDEX IN CELP CODEC |
Candy Olivia Mawalim; Japan Advanced Institute of Science and Technology |
Shengbei Wang; Tianjin Polytechnic University |
Masashi Unoki; Japan Advanced Institute of Science and Technology |
B-3-3.7: A SECURE OPUS PULSE STEGANOGRAPHIC SCHEME BASED ON MESSAGE TRANSFORM |
Yanzhen Ren; Wuhan University |
Shan Zhong; Wuhan University |
Weiping Tu; Wuhan University |
Lina Wang; Wuhan University |