WIFS'12 Schedule
The pdf version of WIFS'12 Technical Program can be downloaded here.
NOTE: This schedule may be subject to slight changes. Check this page for updates.
WIFS'12 Detailed Technical Program
NOTE: This program may be subject to slight changes. Check this page for updates.
08:00-09:15 | Registration |
09:15-12:30 | Tutorial 1: A primer on content protection systems Tutorial 2: Cloud computing for network forensics |
12:30-14:00 | Lunch |
14:00-17:15 | Tutorial 3: Biometric privacy and secrecy from information-theoretical perspective Tutorial 4: Uncovering the processing history of video content |
08:00-08:40 | Registration | ||||||||||||||||
08:40-09:00 | Welcome | ||||||||||||||||
09:00-10:00 | Keynote 1: Adversary aware signal processing Prof. Dr. M. Barni. | ||||||||||||||||
10:00-12:20 | Oral Session 1: Biometrics | ||||||||||||||||
10:00-10:20 | Detecting Fingerprint Distortion from a Single Image Xuanbin Si, Jianjiang Feng and Jie Zhou | ||||||||||||||||
10:20-10:40 | Novel Fingerprint Aging Features Using Binary Pixel Sub-Tendencies: A Comparison of Contactless CLSM and CWL Sensors Ronny Merkel, Jana Dittmann and Claus Vielhauer | ||||||||||||||||
10:40-11:00 | Coffee break | ||||||||||||||||
11:00-11:20 | Facial Landmark Configuration for Improved Detection Chengwei Huang, Boris Efraty, Uday Kurkure, Xi Zhao, Manos Papadakis, Shishir Shah and Ioannis Kakadiaris | ||||||||||||||||
11:20-11:40 | Two-stage Appearance-based Re-Identification of Humans in Low-Resolution Videos Jürgen Metzler | ||||||||||||||||
11:40-12:00 | Biometric Template Protection using Turbo Codes and Modulation Constellations Emanuele Maiorana, Daniele Blasi and Patrizio Campisi | ||||||||||||||||
12:00-12:20 | Can a "Poor" Verification System be a "Good" Identification System? A Preliminary Study Brian DeCann and Arun Ross | ||||||||||||||||
12:20-14:00 | Lunch | ||||||||||||||||
14:00-15:20 | Poster Session 1: Security and Privacy | ||||||||||||||||
14:00-15:20 | Machine Learning Attacks on 65nm Arbiter PUFs: Accurate Modeling poses strict Bounds on Usability Towards reproducible results in authentication based on physical non-cloneable functions: the forensic authentication microstructure optical set (FAMOS) Improving the DGK comparison protocol General Function Evaluation in a STPC Setting via Piecewise Linear Approximation A Framework for Privacy Preserving Statistical Analysis on Distributed Databases Bing-Rong Lin, Ye Wang and Shantanu Rane Modeling and Analysis of Electric Network Frequency Signal for Timestamp Verification Telephone Handset Identification by Feature Selection and Sparse Representations Privacy-Preserving Architecture for Forensic Image Recognition Sequence Detection of Overlapping Latent Fingerprints Using a Short-term Aging Feature | ||||||||||||||||
15:20-17:40 | Oral Session 2: Network Forensics | ||||||||||||||||
15:20-15:40 | Semantic based DNS Forensics Samuel Marchal, Jérôme François, Radu State and Thomas Engel | ||||||||||||||||
15:40-16:00 | Fingerprinting a flow of messages to an anonymous server Juan A. Elices and Fernando Pérez-González | ||||||||||||||||
16:00-16:20 | Coffee break | ||||||||||||||||
16:20-16:40 | Detecting anomalous network hosts by means of PCA Tomáš Pevný, Martin Rehák and Martin Grill | ||||||||||||||||
16:40-17:00 | Forensic Analysis of Wireless Networking Evidence of Android Smartphones Panagiotis Andriotis, George Oikonomou and Theo Tryfonas | ||||||||||||||||
17:00-17:20 | A Least Squares Approach to User Profiling in Pool Mix-based Anonymous Communication Systems Fernando Pérez-González and Carmela Troncoso | ||||||||||||||||
17:20-17:40 | Mapping Evidence Graphs to Attack Graphs Changwei Liu, Anoop Singhal and Duminda Wijesekera | ||||||||||||||||
17:40-19:00 | Ongoing Work Session | ||||||||||||||||
17:40-19:00 | Demo Session | ||||||||||||||||
17:40-19:00 |
|
08:00-09:00 | Registration |
09:00-10:00 | Keynote 2: Playing hide and seek online: anonymous communications, traffic analysis and censorship G. Danezis |
10:00-12:20 | Oral Session 3: Multimedia Forensics |
10:00-10:20 | Reverse Engineering of Double JPEG Compression in the Presence of Image Resizing Tiziano Bianchi and Alessandro Piva |
10:20-10:40 | Content Authentication and Identification under Informed Attacks Fokko Beekhof, Sviatoslav Voloshynovskiy and Farzad Farhadzadeh |
10:40-11:00 | Coffee break |
11:00-11:20 | Forensic Analysis of Ordered Data Structures On The Example of JPEG Files Thomas Gloe |
11:20-11:40 | Preventing unauthorized copying of displayed information by utilizing differences in spectral sensitivity between humans and imaging devices Takayuki Yamada, Seiichi Gohshi and Isao Echizen |
11:40-12:00 | Detection of video double encoding with GOP size estimation David Vázquez-Padín, Marco Fontani, Tiziano Bianchi, Pedro Comesaña, Alessandro Piva, and Mauro Barni |
12:00-12:20 | IPTV streaming source classification Miguel Masciopinto, Pedro Comesaña |
12:20-14:00 | Lunch |
14:00-20:30 | Visit to Observatory |
20:30- | Banquet (Location) |
08:00-09:00 | Registration |
09:00-10:00 | Keynote 3: IEEE Biometrics Council Distinguished Lecturer Talk: Issues, Controversies and Advancements in Forensic Speaker Recognition J. L. Wayman |
10:00-12:20 | Oral Session 4: Data Hiding |
10:00-10:20 | Effect of Cover Quantization on Steganographic Fisher Information Jessica Fridrich |
10:20-10:40 | An Efficient JPEG Steganographic Scheme Using Uniform Embedding Linjie Guo, Jiangqun Ni and Yun Qing Shi |
10:40-11:00 | Coffee break |
11:00-11:20 | Active content fingerprinting: a marriage of digital watermarking and content fingerprinting Sviatoslav Voloshynovskiy, Farzad Farhadzadeh, Oleksiy Koval and Taras Holotyak |
11:20-11:40 | AC-3 Bit Stream Watermarking Xiao-Ming Chen, Michael Arnold, Peter Baum and Gwenaël Doërr |
11:40-12:00 | Decoding Fingerprints Using the Markov Chain Monte Carlo Method Teddy Furon, Arnaud Guyader and Frédéric Cérou |
12:00-12:20 | Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding Pascal Schoettle, Stefan Korff and Rainer Boehme |
12:20-14:00 | Lunch |
14:00-15:20 | Poster Session 2: Media Forensics and Security |
14:00-15:20 | Optimum Forensic and Counter-forensic Strategies for Source Identification with Training Data ML Estimation of the Resampling Factor Detection and information theoretic measures for quantifying the distinguishability between multimedia operator chains Watermarking Method with Exact Self-Propagating Restoration Capabilities Capacity Control of Reversible Watermarking by Two-Thresholds Embedding How to Find Relevant Training Data: A Paired Bootstrapping Approach to Blind Steganalysis Designing Steganographic Distortion Using Directional Filters Dynamic Traitor Tracing for Arbitrary Alphabets: Divide and Conquer Low Level Crowd Analysis Using Frame-Wise Normalized Feature For People Counting Identify computer generated characters by analysing facial expressions variation |
15:20-17:20 | Oral Session 5: Secure Communications |
15:20-15:40 | Non-regenerative Two-Hop Wiretap Channels using Interference Neutralization Sabrina Gerbracht, Eduard Jorswieck, Gan Zheng and Björn Ottersten |
15:40-16:00 | End-to-end secure connection in heterogeneous networks for critical scenarios Romeo Giuliano, Alessandro Neri and Damiano Valletta |
16:00-16:20 | Coffee break |
16:20-16:40 | Comparison of Different Attack Classes in Arbitrarily Varying Wiretap Channels Holger Boche and Rafael Felix Wyrembelski |
16:40-17:00 | Optimality of Beamforming for Secrecy Capacity of MIMO Wiretap Channels Jiangyuan Li and Athina Petropulu |
17:00-17:20 | Destination Assisted Cooperative Jamming for Wireless Physical Layer Security Yupeng Liu and Athina Petropulu |
17:20-17:30 | Conclusions and Farewell |