List of Accepted Papers
Multimedia Forensics – Authentication
#94: Davide Cozzolino and Luisa Verdoliva. Single-image splicing localization through autoencoder-based anomaly detection
#20: Paweł Korus and Jiwu Huang. Evaluation of Random Field Models in Multi-modal Unsupervised Tampering Localization
#37: Mauro Barni, Zhipeng Chen and Benedetta Tondi. Adversary-aware, data-driven detection of double JPEG compression: how to make counter-forensics harder
#70: Honggang Qi, Pulver Andrew and Siwei Lyu. Using 3D Face Model for Forensic Analysis of Lighting Environment
#57: Yuan Rao and Jiangqun Ni. A Deep Learning Approach to Image Forgery Detection
Information and System Security:
#95: Panagiotis Andriotis, Martina Angela Sasse and Gianluca Stringhini. Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model
#88: Salam Khanji, Raja Jabir, Farkhund Iqbal and Andrew Marrington. Forensic Analysis of the Xbox One and PlayStation 4 Gaming Consoles
#66: Yan Yan, Elisabeth Oswald and Theo Tryfonas. Cryptographic Randomness on a CC2538: a Case Study
#12: Yan Sun, Hayreddin Ceker and Shambhu Upadhyaya. Shared Keystroke Dataset for Continuous Authentication
Data Hiding & Applications:
#29: Kejiang Chen, Weiming Zhang, Hang Zhou, Guorui Feng and Nenghai Yu. Defining Cost Functions for Adaptive Steganography at the Microscale
#41: Patrick Bas. Steganography via Cover-Source Switching
#39: Elena Egorova, Marcel Fernandez and Grigory Kabatiansky. Multimedia Fingerprinting Codes Resistant Against Colluders and Noise
#38: Hanzhou Wu, Hongxia Wang and Yunqing Shi. Dynamic Content Selection-and-Prediction Framework Applied to Reversible Data Hiding
Biometrics:
#30: Zinelabidine Boulkenafet, Jukka Komulainen and Abdenour Hadid. Face Anti-Spoofing using Speeded-Up Robust Features and Fisher Vector Encoding
#109: Yaohui Ding and Arun Ross. An Ensemble of One-Class SVMs for Fingerprint Spoof Detection Across Different Fabrication Materials
#31: Xiaoting Wu, Elhocine Boutellaa, Miguel Bordallo Lopez, Xiaoyi Feng and Abdenour Hadid. On the Usefulness of Color for Kinship Verification from Face Images
#26: Jiaju Huang, Daqing Hou and Stephanie Schuckers. Effects of Text Filtering on Authentication Performance of Keystroke Biometric
#* Shepherding process continues
Multimedia Content Analysis:
#44: Filipe De Oliveira Costa, Silvia Lameri, Paolo Bestagini, Zanoni Dias, Stefano Tubaro and Anderson Rocha. Hash-Based Frame Selection for Video Phylogeny
#50: Simone Milani, Paolo Bestagini and Stefano Tubaro. Phylogenetic analysis of near-duplicate and semantically-similar images using viewpoint localization
#* Shepherding process continues
Secure Computation:
#68: Niklas Buescher, David Kretzmer, Arnav Jindal and Stefan Katzenbeisser. Scalable Secure Computation from ANSI-C
#73: Majid Nateghizad, Zekeriya Erkin and Reginald L. Lagendijk. Efficient and Secure Equality Tests
#83: Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza and Fernando Pérez-González. Image Denoising in the Encrypted Domain
Multimedia Forensics – Source Attribution:
#89: Samet Taspinar, Manoranjan Mohanty and Nasir Memon. Source Camera Attribution Using Stabilized Video
#52: Francesco Marra, Giovanni Poggi, Carlo Sansone and Luisa Verdoliva. Correlation Clustering for PRNU-based Blind Image Source Identification
#47: Amel Tuama, Marc Chaumont and Frederic Comby. Camera Model Identification With The Use of Deep Convolutional Neural Networks
#107: Shishir Sharma, Subramanyam Venkata, Monika Jain, Ambuj Mehrish and Sabu Emmanuel. Anti-Forensic Technique for Median Filtering using L1-L2 TV Model
#*: Shepherding process continues
Network Security:
#15: Tomáš Komárek, Martin Grill and Tomáš Pevný. Passive NAT Detection Using HTTP Access Logs
#13: Gabriel Maciá-Fernández, José Camacho, Pedro García-Teodoro and Rafael Rodríguez-Gómez. Hierarchical PCA-Based Multivariate Statistical Network Monitoring for Anomaly Detection
#93: Marc Coudriau, Abdelkader Lahmadi and Jérôme François. Topological Analysis and Visualisation of Network Monitoring Data: Darknet case study
Game Theory & Coding:
#18: Minh Thanh Vu, Tobias J. Oechtering and Mikael Skoglund. Polar code for secure Wyner-Ziv coding
#99: Anmol Monga and Quanyan Zhu. On Solving Large-Scale Low-Rank Zero-Sum Security Games of Incomplete Information
#111: Jeffrey Pawlick and Quanyan Zhu. A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation
SPL/TIFS Papers Poster Session
[Each paper will be scheduled a short presentation in the related plenary session, detailed discussions will continue during the poster session]
# Maria V. Ruiz-Blondet, Zhanpeng Jin, and Sarah Laszlo. CEREBRE: A Novel Method for Very High Accuracy Event-Related Potential Biometric Identification, IEEE TIFS, July 2016
# Hong Zhao, Yifan Chen, Rui Wang, and Hafiz Malik. Anti-Forensics of Environmental-Signature-Based Audio Splicing Detection and Its Countermeasure via Rich-Features Classification, IEEE TIFS, July 2016
# Mohsen Zandi, Ahmad Mahmoudi-Aznaveh, and Alireza Talebpour.
Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , IEEE TIFS, November 2016
# Zhaohong Wang, Sen-ching S. Cheung, and Ying Luo.
Information-Theoretic Secure Multi-Party Computation with Collusion-Deterrence, IEEE TIFS, August 2016
# Oleg Mazonka, Nektarios Georgios Tsoutsos, and Michail Maniatakos. Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation. IEEE TIFS, Sep. 2016