Sorry, you need to enable JavaScript to visit this website.

Information Forensics and Security

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS


This paper proposes a new vacating room after encryption reversible data hiding scheme. Hidden data is embedded into the encrypted host image by bit-flipping a preselected bitplane of a randomly formed pixel group. The major novelty of the paper is the use of multiple predictors in an adaptive procedure for detecting between original and modified pixels. Four predictors are used on a context of four neighbors, namely the average of the four pixels, a weighted average based on local gradients, the median and the midpoint. Experimental results are provided.

Paper Details

Authors:
Ioan-Catalin Dragoi, Dinu Coltuc
Submitted On:
13 April 2018 - 11:34am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Dragoi_Coltuc_ICASSP2018.pdf

(22 downloads)

Keywords

Subscribe

[1] Ioan-Catalin Dragoi, Dinu Coltuc, "REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2719. Accessed: May. 24, 2018.
@article{2719-18,
url = {http://sigport.org/2719},
author = {Ioan-Catalin Dragoi; Dinu Coltuc },
publisher = {IEEE SigPort},
title = {REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS},
year = {2018} }
TY - EJOUR
T1 - REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS
AU - Ioan-Catalin Dragoi; Dinu Coltuc
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2719
ER -
Ioan-Catalin Dragoi, Dinu Coltuc. (2018). REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS. IEEE SigPort. http://sigport.org/2719
Ioan-Catalin Dragoi, Dinu Coltuc, 2018. REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS. Available at: http://sigport.org/2719.
Ioan-Catalin Dragoi, Dinu Coltuc. (2018). "REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS." Web.
1. Ioan-Catalin Dragoi, Dinu Coltuc. REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BASED ON RESERVING ROOM AFTER ENCRYPTION AND MULTIPLE PREDICTORS [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2719

2D vector map reversible data hiding with topological relation preservation

Paper Details

Authors:
Nana Wang, Xiangjun Zhao
Submitted On:
12 April 2018 - 9:51pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

2D Vector Map Reversible Data Hiding with Topological .pptx

(21 downloads)

Keywords

Subscribe

[1] Nana Wang, Xiangjun Zhao, "2D vector map reversible data hiding with topological relation preservation", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2545. Accessed: May. 24, 2018.
@article{2545-18,
url = {http://sigport.org/2545},
author = {Nana Wang; Xiangjun Zhao },
publisher = {IEEE SigPort},
title = {2D vector map reversible data hiding with topological relation preservation},
year = {2018} }
TY - EJOUR
T1 - 2D vector map reversible data hiding with topological relation preservation
AU - Nana Wang; Xiangjun Zhao
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2545
ER -
Nana Wang, Xiangjun Zhao. (2018). 2D vector map reversible data hiding with topological relation preservation. IEEE SigPort. http://sigport.org/2545
Nana Wang, Xiangjun Zhao, 2018. 2D vector map reversible data hiding with topological relation preservation. Available at: http://sigport.org/2545.
Nana Wang, Xiangjun Zhao. (2018). "2D vector map reversible data hiding with topological relation preservation." Web.
1. Nana Wang, Xiangjun Zhao. 2D vector map reversible data hiding with topological relation preservation [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2545

Making Likelihood Ratios Digestible for Cross-Application Performance Assessment


Performance estimation is crucial to the assessment of novel algorithms and systems. In detection error trade-off (DET) diagrams, discrimination performance is solely assessed targeting one application, where cross-application performance considers risks resulting from decisions, depending on application constraints. For the purpose of interchangeability of research results across different application constraints, we propose to augment DET curves by depicting systems regarding their support of security and convenience levels.

poster.pdf

PDF icon poster.pdf (23 downloads)

Paper Details

Authors:
Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch
Submitted On:
12 April 2018 - 1:11pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster.pdf

(23 downloads)

Keywords

Subscribe

[1] Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch, "Making Likelihood Ratios Digestible for Cross-Application Performance Assessment", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2447. Accessed: May. 24, 2018.
@article{2447-18,
url = {http://sigport.org/2447},
author = {Andreas Nautsch; Didier Meuwly; Daniel Ramos; Jonas Lindh; Christoph Busch },
publisher = {IEEE SigPort},
title = {Making Likelihood Ratios Digestible for Cross-Application Performance Assessment},
year = {2018} }
TY - EJOUR
T1 - Making Likelihood Ratios Digestible for Cross-Application Performance Assessment
AU - Andreas Nautsch; Didier Meuwly; Daniel Ramos; Jonas Lindh; Christoph Busch
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2447
ER -
Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch. (2018). Making Likelihood Ratios Digestible for Cross-Application Performance Assessment. IEEE SigPort. http://sigport.org/2447
Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch, 2018. Making Likelihood Ratios Digestible for Cross-Application Performance Assessment. Available at: http://sigport.org/2447.
Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch. (2018). "Making Likelihood Ratios Digestible for Cross-Application Performance Assessment." Web.
1. Andreas Nautsch, Didier Meuwly, Daniel Ramos, Jonas Lindh, Christoph Busch. Making Likelihood Ratios Digestible for Cross-Application Performance Assessment [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2447

Keynote: Physical Security is from Mars, Cybersecurity is from Venus


Corporations are dealing with the traditions of managing security in silos, leading to an increased number of attacks on things like critical infrastructure. Corporate (Physical) Security deals with facilities and building access, whereas IT Security is dealing with cybersecurity as well as system and network access. It’s as if they are living on different planets!

Paper Details

Authors:
Brian Harrell
Submitted On:
15 November 2017 - 8:38pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

KeyNote Talk.pdf

(132 downloads)

Keywords

Subscribe

[1] Brian Harrell, "Keynote: Physical Security is from Mars, Cybersecurity is from Venus ", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/2359. Accessed: May. 24, 2018.
@article{2359-17,
url = {http://sigport.org/2359},
author = {Brian Harrell },
publisher = {IEEE SigPort},
title = {Keynote: Physical Security is from Mars, Cybersecurity is from Venus },
year = {2017} }
TY - EJOUR
T1 - Keynote: Physical Security is from Mars, Cybersecurity is from Venus
AU - Brian Harrell
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/2359
ER -
Brian Harrell. (2017). Keynote: Physical Security is from Mars, Cybersecurity is from Venus . IEEE SigPort. http://sigport.org/2359
Brian Harrell, 2017. Keynote: Physical Security is from Mars, Cybersecurity is from Venus . Available at: http://sigport.org/2359.
Brian Harrell. (2017). "Keynote: Physical Security is from Mars, Cybersecurity is from Venus ." Web.
1. Brian Harrell. Keynote: Physical Security is from Mars, Cybersecurity is from Venus [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/2359

Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics


Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics

In this paper, we present Discriminant Correlation Analysis (DCA), a feature level fusion technique that incorporates the class associations in correlation analysis of the feature sets. DCA performs an effective feature fusion by maximizing the pair-wise correlations across the two feature sets, and at the same time, eliminating the between-class correlations and restricting the correlations to be within classes.

Paper Details

Authors:
Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi
Submitted On:
16 July 2016 - 11:13pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

DCA_ICASSP16_Poster.pdf

(1004 downloads)

Keywords

Additional Categories

Subscribe

[1] Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi, "Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/828. Accessed: May. 24, 2018.
@article{828-16,
url = {http://sigport.org/828},
author = {Mohammad Haghighat; Mohamed Abdel-Mottaleb; Wadee Alhalabi },
publisher = {IEEE SigPort},
title = {Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics},
year = {2016} }
TY - EJOUR
T1 - Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics
AU - Mohammad Haghighat; Mohamed Abdel-Mottaleb; Wadee Alhalabi
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/828
ER -
Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi. (2016). Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics. IEEE SigPort. http://sigport.org/828
Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi, 2016. Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics. Available at: http://sigport.org/828.
Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi. (2016). "Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics." Web.
1. Mohammad Haghighat, Mohamed Abdel-Mottaleb, Wadee Alhalabi. Discriminant Correlation Analysis for Feature Level Fusion with Application to Multimodal Biometrics [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/828

Cyber-Physical Intrusion Detection on a Robotic Vehicle

Paper Details

Authors:
Tuan Vuong
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Vuong.pdf

(487 downloads)

Keywords

Subscribe

[1] Tuan Vuong, "Cyber-Physical Intrusion Detection on a Robotic Vehicle", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/598. Accessed: May. 24, 2018.
@article{598-16,
url = {http://sigport.org/598},
author = {Tuan Vuong },
publisher = {IEEE SigPort},
title = {Cyber-Physical Intrusion Detection on a Robotic Vehicle},
year = {2016} }
TY - EJOUR
T1 - Cyber-Physical Intrusion Detection on a Robotic Vehicle
AU - Tuan Vuong
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/598
ER -
Tuan Vuong. (2016). Cyber-Physical Intrusion Detection on a Robotic Vehicle. IEEE SigPort. http://sigport.org/598
Tuan Vuong, 2016. Cyber-Physical Intrusion Detection on a Robotic Vehicle. Available at: http://sigport.org/598.
Tuan Vuong. (2016). "Cyber-Physical Intrusion Detection on a Robotic Vehicle." Web.
1. Tuan Vuong. Cyber-Physical Intrusion Detection on a Robotic Vehicle [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/598

Full-duplex vs. Half-duplex Secret-key Generation

Paper Details

Authors:
Hendrik Vogt
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Vogt.pdf

(494 downloads)

Keywords

Subscribe

[1] Hendrik Vogt, "Full-duplex vs. Half-duplex Secret-key Generation", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/597. Accessed: May. 24, 2018.
@article{597-16,
url = {http://sigport.org/597},
author = {Hendrik Vogt },
publisher = {IEEE SigPort},
title = {Full-duplex vs. Half-duplex Secret-key Generation},
year = {2016} }
TY - EJOUR
T1 - Full-duplex vs. Half-duplex Secret-key Generation
AU - Hendrik Vogt
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/597
ER -
Hendrik Vogt. (2016). Full-duplex vs. Half-duplex Secret-key Generation. IEEE SigPort. http://sigport.org/597
Hendrik Vogt, 2016. Full-duplex vs. Half-duplex Secret-key Generation. Available at: http://sigport.org/597.
Hendrik Vogt. (2016). "Full-duplex vs. Half-duplex Secret-key Generation." Web.
1. Hendrik Vogt. Full-duplex vs. Half-duplex Secret-key Generation [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/597

Interest Flooding Detection in NDN Using Hypothesis Testing

Paper Details

Authors:
Tan N. Nguyen
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_T_Nguyen.pdf

(494 downloads)

Keywords

Subscribe

[1] Tan N. Nguyen, "Interest Flooding Detection in NDN Using Hypothesis Testing", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/596. Accessed: May. 24, 2018.
@article{596-16,
url = {http://sigport.org/596},
author = {Tan N. Nguyen },
publisher = {IEEE SigPort},
title = {Interest Flooding Detection in NDN Using Hypothesis Testing},
year = {2016} }
TY - EJOUR
T1 - Interest Flooding Detection in NDN Using Hypothesis Testing
AU - Tan N. Nguyen
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/596
ER -
Tan N. Nguyen. (2016). Interest Flooding Detection in NDN Using Hypothesis Testing. IEEE SigPort. http://sigport.org/596
Tan N. Nguyen, 2016. Interest Flooding Detection in NDN Using Hypothesis Testing. Available at: http://sigport.org/596.
Tan N. Nguyen. (2016). "Interest Flooding Detection in NDN Using Hypothesis Testing." Web.
1. Tan N. Nguyen. Interest Flooding Detection in NDN Using Hypothesis Testing [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/596

Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics

Paper Details

Authors:
Santosh Tirunagari
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Tirunagari.pdf

(476 downloads)

Keywords

Subscribe

[1] Santosh Tirunagari, "Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/595. Accessed: May. 24, 2018.
@article{595-16,
url = {http://sigport.org/595},
author = {Santosh Tirunagari },
publisher = {IEEE SigPort},
title = {Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics},
year = {2016} }
TY - EJOUR
T1 - Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics
AU - Santosh Tirunagari
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/595
ER -
Santosh Tirunagari. (2016). Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics. IEEE SigPort. http://sigport.org/595
Santosh Tirunagari, 2016. Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics. Available at: http://sigport.org/595.
Santosh Tirunagari. (2016). "Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics." Web.
1. Santosh Tirunagari. Windowed DMD as a Microtexture Descriptor for Finger Vein Counter-spoofing in Biometrics [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/595

Generalized Tally-Based Decoders for Traitor Tracing and Group Testing

Paper Details

Authors:
Boris Skoric
Submitted On:
23 February 2016 - 1:44pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

WIFS2015_Skoric.pdf

(493 downloads)

Keywords

Subscribe

[1] Boris Skoric, "Generalized Tally-Based Decoders for Traitor Tracing and Group Testing", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/594. Accessed: May. 24, 2018.
@article{594-16,
url = {http://sigport.org/594},
author = {Boris Skoric },
publisher = {IEEE SigPort},
title = {Generalized Tally-Based Decoders for Traitor Tracing and Group Testing},
year = {2016} }
TY - EJOUR
T1 - Generalized Tally-Based Decoders for Traitor Tracing and Group Testing
AU - Boris Skoric
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/594
ER -
Boris Skoric. (2016). Generalized Tally-Based Decoders for Traitor Tracing and Group Testing. IEEE SigPort. http://sigport.org/594
Boris Skoric, 2016. Generalized Tally-Based Decoders for Traitor Tracing and Group Testing. Available at: http://sigport.org/594.
Boris Skoric. (2016). "Generalized Tally-Based Decoders for Traitor Tracing and Group Testing." Web.
1. Boris Skoric. Generalized Tally-Based Decoders for Traitor Tracing and Group Testing [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/594

Pages