IFS-P4: Steganography, Watermarking and Secret Sharing Systems |
Session Type: Poster |
Time: Friday, May 17, 13:30 - 15:30 |
Location: Poster Area E, Meeting Room 1A |
Session Chair: Remi Congranne, Université de technologie de Troyes
|
|
IFS-P4.1: A NEW SPATIAL STEGANOGRAPHIC SCHEME BY MODELING IMAGE RESIDUALS WITH MULTIVARIATE GAUSSIAN MODEL |
Xinghong Qin; Shenzhen University |
Bin Li; Shenzhen University |
Jiwu Huang; Shenzhen University |
|
IFS-P4.2: ATTACKS ON DIGITAL WATERMARKS FOR DEEP NEURAL NETWORKS |
Tianhao Wang; University of Waterloo |
Florian Kerschbaum; University of Waterloo |
|
IFS-P4.3: RHFCN: FULLY CNN-BASED STEGANALYSIS OF MP3 WITH RICH HIGH-PASS FILTERING |
Yuntao Wang; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences |
Xiaowei Yi; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences |
Xianfeng Zhao; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences |
Ante Su; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences |
|
IFS-P4.4: INAUDIBLE SPEECH WATERMARKING BASED ON SELF-COMPENSATED ECHO-HIDING AND SPARSE SUBSPACE CLUSTERING |
Shengbei Wang; Tianjin Polytechnic University |
Weitao Yuan; Tianjin Polytechnic University |
Jianming Wang; Tianjin Polytechnic University |
Masashi Unoki; Japan Advanced Institute of Science and Technology |
|
IFS-P4.5: QUANTIZED GAUSSIAN EMBEDDING STEGANOGRAPHY |
Mehdi Sharifzadeh; University of Illinois at Chicago |
Mohammed Aloraini; University of Illinois at Chicago |
Dan Schonfeld; University of Illinois at Chicago |
|
IFS-P4.6: DIGITALLY ANNEALED SOLUTION FOR THE VERTEX COVER PROBLEM WITH APPLICATION IN CYBER SECURITY |
Mohammad Javad-Kalbasi; Isfahan University of Technology |
Keivan Dabiri; University of Toronto |
Shahrokh Valaee; University of Toronto |
Ali Sheikholeslami; University of Toronto |
|
IFS-P4.7: MAXIMALLY SEPARATED AVERAGES PREDICTION FOR HIGH FIDELITY REVERSIBLE DATA HIDING |
Dibakar Hazarika; Indian Institute of Technology Kharagpur |
Sobhan Kanti Dhara; Indian Institute of Technology Kharagpur |
Debashis Sen; Indian Institute of Technology Kharagpur |
|
IFS-P4.8: PREDICTION-ERROR-ORDERING FOR HIGH-FIDELITY REVERSIBLE DATA HIDING |
Ioan Catalin Dragoi; Valahia University of Targoviste |
Dinu Coltuc; Valahia University of Targoviste |
|
IFS-P4.9: A FORMAT-COMPLIANT SELECTIVE SECRET 3D OBJECT SHARING SCHEME BASED ON SHAMIR’S SCHEME |
Sébastien Beugnon; LIRMM/STRATEGIES |
William Puech; LIRMM/Univ. Montpellier |
Jean-Pierre Pedeboy; STRATEGIES |
|