Technical Program


List of Accepted Papers

Multimedia Forensics – Authentication

#94: Davide Cozzolino and Luisa Verdoliva. Single-image splicing localization through autoencoder-based anomaly detection

#20: Paweł Korus and Jiwu Huang. Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization

#37: Mauro Barni, Zhipeng Chen and Benedetta Tondi. Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder

#70: Honggang Qi, Pulver Andrew and Siwei Lyu. Using 3D Face Model for Forensic Analysis of Lighting Environment

#57: Yuan Rao and Jiangqun Ni. A Deep Learning Approach to Image Forgery Detection

Information and System Security:

#95: Panagiotis Andriotis, Martina Angela Sasse and Gianluca Stringhini. Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model

#88: Salam Khanji, Raja Jabir, Farkhund Iqbal and Andrew Marrington. Forensic Analysis of the Xbox One and PlayStation 4 Gaming Consoles

#66: Yan Yan, Elisabeth Oswald and Theo Tryfonas. Cryptographic Randomness on a CC2538: a Case Study

#12: Yan Sun, Hayreddin Ceker and Shambhu Upadhyaya. Shared Keystroke Dataset for Continuous Authentication

Data Hiding & Applications:

#29: Kejiang Chen, Weiming Zhang, Hang Zhou, Guorui Feng and Nenghai Yu. Defining Cost Functions for Adaptive Steganography at the Microscale

#41: Patrick Bas. Steganography via Cover-Source Switching

#39: Elena Egorova, Marcel Fernandez and Grigory Kabatiansky. Multimedia Fingerprinting Codes Resistant Against Colluders and Noise

#38: Hanzhou Wu, Hongxia Wang and Yunqing Shi. Dynamic Content Selection-and-Prediction Framework Applied to Reversible Data Hiding


#30: Zinelabidine Boulkenafet, Jukka Komulainen and Abdenour Hadid. Face Anti-Spoofing using Speeded-Up Robust Features and Fisher Vector Encoding

#109: Yaohui Ding and Arun Ross. An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials

#31: Xiaoting Wu, Elhocine Boutellaa, Miguel Bordallo Lopez, Xiaoyi Feng and Abdenour Hadid. On the Usefulness of Color for Kinship Verification from Face Images

#26: Jiaju Huang, Daqing Hou and Stephanie Schuckers. Effects of Text Filtering on Authentication Performance of Keystroke Biometric

#* Shepherding process continues

Multimedia Content Analysis:

#44: Filipe De Oliveira Costa, Silvia Lameri, Paolo Bestagini, Zanoni Dias, Stefano Tubaro and Anderson Rocha. Hash-Based Frame Selection for Video Phylogeny

#50: Simone Milani, Paolo Bestagini and Stefano Tubaro. Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization

#* Shepherding process continues

Secure Computation:

#68: Niklas Buescher, David Kretzmer, Arnav Jindal and Stefan Katzenbeisser. Scalable Secure Computation from ANSI-C

#73: Majid Nateghizad, Zekeriya Erkin and Reginald L. Lagendijk. Efficient and Secure Equality Tests

#83: Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González. Image Denoising in the Encrypted Domain

Multimedia Forensics – Source Attribution:

#89: Samet Taspinar, Manoranjan Mohanty and Nasir Memon. Source Camera Attribution Using Stabilized Video

#52: Francesco Marra, Giovanni Poggi, Carlo Sansone and Luisa Verdoliva. Correlation Clustering for PRNU-based Blind Image Source Identification

#47: Amel Tuama, Marc Chaumont and Frederic Comby. Camera Model Identification With The Use of Deep Convolutional Neural Networks

#107: Shishir Sharma, Subramanyam Venkata, Monika Jain, Ambuj Mehrish and Sabu Emmanuel. Anti-Forensic Technique for Median Filtering using L1-L2 TV Model

#*: Shepherding process continues

Network Security:

#15: Tomáš Komárek, Martin Grill and Tomáš Pevný. Passive NAT Detection Using HTTP Access Logs

#13: Gabriel Maciá-Fernández, José Camacho, Pedro García-Teodoro and Rafael Rodríguez-Gómez. Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection

#93: Marc Coudriau, Abdelkader Lahmadi and Jérôme François. Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study

Game Theory & Coding:

#18: Minh Thanh Vu, Tobias J. Oechtering and Mikael Skoglund. Polar code for secure Wyner-Ziv coding

#99: Anmol Monga and Quanyan Zhu. On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information

#111: Jeffrey Pawlick and Quanyan Zhu. A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation

SPL/TIFS Papers Poster Session  

[Each paper will be scheduled a short presentation in the related plenary session, detailed discussions will continue during the poster session]

# Maria V. Ruiz-Blondet, Zhanpeng Jin, and Sarah Laszlo. CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification, IEEE TIFS, July 2016

# Hong Zhao, Yifan Chen, Rui Wang, and Hafiz Malik. Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification, IEEE TIFS, July 2016

# Mohsen Zandi, Ahmad Mahmoudi-Aznaveh, and Alireza Talebpour.
Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , IEEE TIFS, November 2016

# Zhaohong Wang, Sen-ching S. Cheung, and Ying Luo.
Information-Theoretic Secure Multi-Party Computation with Collusion-Deterrence, IEEE TIFS, August 2016

# Oleg Mazonka, Nektarios Georgios Tsoutsos, and Michail Maniatakos. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. IEEE TIFS, Sep. 2016