Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security

M. Stamm, Matthias Kirchner, S. Voloshynovskiy
{"title":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","authors":"M. Stamm, Matthias Kirchner, S. Voloshynovskiy","doi":"10.1145/3082031","DOIUrl":null,"url":null,"abstract":"Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. \n \nIn response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. \n \nWe sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. \n \nThe technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. \n \nAs usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. \n \nA great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3082031","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. In response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. We sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. The technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. As usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. A great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
第五届ACM信息隐藏与多媒体安全研讨会论文集
欢迎参加2017年6月20日至21日在费城举行的第五届ACM信息隐藏和多媒体安全研讨会——IH&MMSec'17。在我们的论文征稿中,来自北美、欧洲和亚洲的作者提交了34篇优秀的论文。其中最好的18篇论文被接受(53%的录取率),并汇编成一个强大的技术方案。被接受的论文涵盖了数字媒体中的隐写和隐写分析、多媒体取证、数字水印、自然语言中的数据隐藏、取证和隐写分析的深度学习方法等领域。我们衷心感谢所有投稿作者的贡献和审稿人的宝贵帮助。我们希望所选的论文能够引起该领域的研究人员以及工业界和政府机构的参与者的广泛兴趣。技术项目还包括两位受邀主讲嘉宾。第一个演讲是由卡内基梅隆大学的Anupam Das博士做的,主题是在智能手机中使用运动传感器来跟踪用户。第二场演讲是由德雷克塞尔大学的Rachel Greenstadt博士做的,主题是如何使用文体学和机器学习来确定书面文档和软件的作者。与往常一样,研讨会分为三天,第二天下午专门用于社交活动。社交活动的目的是促进讨论,并帮助建立参与者之间未来合作的关系。此外,在社交活动开始的第二天结束时,还会预留时间进行收尾环节,鼓励参与者分享他们正在进行的工作,讨论未发表的结果,演示新产品,并发布相关公告。一个伟大的团队共同完成了这个技术项目。项目委员会在29名外部评审人员的协助下,提供了及时、高质量的评审。采用双盲审查程序以确保公平。每篇论文都由至少三位审稿人仔细阅读和评估,但大多数论文是由四位审稿人审查的。为了让项目主席选择最好的质量和相关的工作,论文相互矛盾的评论进行了详细的讨论。我们感谢所有参与者的帮助,使这个伟大的项目得以完成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC Information-theoretic Bounds of Resampling Forensics: New Evidence for Traces Beyond Cyclostationarity Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry Nonlinear Feature Normalization in Steganalysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1