Program At-a-Glance
Please note that all times are shown in the time zone of the conference (UTC+1).
Day 1, Tue. December 7 |
Day 2, Wed. December 8 |
Day 3, Thu. December 9 |
Day 4, Fri. December 10 |
|
---|---|---|---|---|
8:30 – 9:00 | Registration | Registration | Registration | Registration |
9:00 – 9:20 | Conference opening | Digital forensics (4 papers) |
||
9:20 – 10:20 | Tutorial 1, part 1: Data detectives |
Biometrics (4 papers) |
SPL/T-IFS papers presentation (4 papers) |
|
10:20 – 10:40 | Coffee break | |||
10:40 – 10:50 | Coffee break | Coffee break | Coffee break | |
10:50 – 11:10 | Digital forensics against fake news (4 papers) |
|||
11:10 – 12:10 | Tutorial 1, part 2: Data detectives |
Privacy & anonymity (4 papers) |
Special session (4 papers) |
|
12:10 – 12:30 | Lunch | |||
12:30 – 13:40 | Lunch | Lunch | ||
13:40 – 14:20 | Keynote 2: Patrick de Smet |
|||
14:20 – 15:00 | Tutorial 2, part 1: Physiological forensics |
Keynote 1: Teddy Furon |
SPL/T-IFS papers presentation (3 papers) |
|
15:00 – 15:20 | Social event Banquet |
|||
15:20 – 15:40 | Coffee break | |||
15:40 – 15:50 | Coffee break | Coffee break | ||
15:50 – 16:10 | Special session (3 papers) |
|||
16:10 – 16:50 | Tutorial 2, part 2: Physiological forensics |
Steganography & steganalysis (4 papers) |
||
16:50 – 17:10 | Awards | |||
17:10 – 17:30 | ||||
17:30 – 19:00 | IFS-TC Meeting | |||
19:00 – 21:00 | Welcome reception |
Biometrics
Wednesday, December 8 (9:20 AM – 10:40 AM, UTC+1)
- #15. Spoofing Speaker Verification With Voice Style Transfer And Reconstruction Loss – Thomas Thebaud (Orange); Gaël Le Lan (Orange Labs); Anthony Larcher (Universite du Mans – LIUM)
- #19. Impact of Super-Resolution and Human Identification in Drone Surveillance – Akshay Agarwal (University at Buffalo); Nalini Ratha (University at Buffalo, SUNY); Mayank Vatsa (IIT Jodhpur); Richa Singh (IIT Jodhpur)
- #37. Multi Loss Fusion For Matching Smartphone Captured Contactless Finger Images – Bhavin Jawade (University at Buffalo); Akshay Agarwal (University at Buffalo); Nalini Ratha (SUNY Buffalo); Srirangaraj Setlur (University at Buffalo, SUNY)
- #51. Assessment of Synthetically Generated Mated Samples from Single Fingerprint Samples Instances – Simon Kirchgasser (University of Salzburg); Christoph Kauba (University of Salzburg); Andreas Uhl (University of Salzburg)
Privacy & anonymity
Wednesday, December 8 (11:10 AM – 12:30 PM, UTC+1)
- #27. Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers – Jelle Vos (Delft University of Technology); Zekeriya Erkin (TU Delft); Christian Doerr (Hasso Plattner Institute, University of Potsdam)
- #28. On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models – Hatef Otroshi Shahreza (Idiap Research Institute); Vedrana Krivokuca (Idiap); Sébastien Marcel (IDIAP)
- #59. Secure Collaborative Editing Using Secret Sharing – Shashank Arora (University at Albany, SUNY); Pradeep K. Atrey (University at Albany, SUNY)
- #7. Differentially Private Generative Adversarial Networks with Model Inversion – Dongjie Chen (University of California, Davis); Sen-ching S Cheung (University of Kentucky); Chen-Nee Chuah (University of California Davis); Sally Ozonoff (University of California Davis)
Steganography & steganalysis
Wednesday, December 8 (4:10 PM – 5:30 PM, UTC+1)
- #22. CNN Steganalyzers Leverage Local Embedding Artifacts – Yassine Yousfi (Binghamton University); Jan Butora (Binghamton University); Jessica Fridrich (“SUNY, Binghamton”)
- #23. Data Augmentation for JPEG Steganalysis – Tomer Itzhaki (Binghamton university); Yassine Yousfi (Binghamton University); Jessica Fridrich (“SUNY, Binghamton”)
- #33. Structural Watermarking to Deep Neural Networks via Network Channel Pruning – Hanzhou Wu (Shanghai University)
- #39. Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing – Kaiyu Ying (Ningbo University); Wang Rangding (Ningbo University); Yan Diqun (Ningbo University)
Digital forensics
Thursday, December 9 (9:00 AM – 10:20 AM, UTC+1)
- #21. How are PDF files published in Scientific Community? – Supriya Adhatarao (Inria); Cédric Lauradoux (Inria)
- #24. Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics – Rony Abecidan (Université de Lille); Vincent Itier (IMT Lille-Douai); Jérémie Boulanger (Cristal); Patrick Bas (CNRS)
- #45. Apart from in-field sensor defects, are there additional age traces hidden in a digital image? – Robert Jöchl (University of Salzburg); Andreas Uhl (University of Salzburg)
- #48. Differential Anomaly Detection for Facial Images – Mathias Ibsen (Hochschule Darmstadt); Lazaro Janier Gonzalez-Soler (Hochschule Darmstadt); Christian Rathgeb (Hochschule Darmstadt); Pawel Drozdowski (Hochschule Darmstadt); Marta Gomez-Barrero (Hochschule Ansbach); Christoph Busch (Hochschule Darmstadt)
Digital forensics against fake news
Thursday, December 9 (10:50 AM – 12:10 PM, UTC+1)
- #5. Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region – Toshiki Itagaki (Sony Semiconductor Solutions Corporation); Yuki Funabiki (Sony Corporation); Toru Akishita (Sony Semiconductor Solutions Corporation)
- #34. Scalable Fact-checking with Human-in-the-Loop – Jing Yang (University of Campinas); Didier Augusto Vega-Oliveros (University of Campinas); Taís Seibt (Universidade do Vale do Rio dos Sino); Anderson Rocha (UNICAMP)
- #42. Source Attribution of Online News Images by Compression Analysis – Michael Albright (Kitware Inc.); Nitesh Menon (Kitware Inc.); Kristy Roschke (Arizona State University); Arslan Basharat (Kitware Inc.)
- #50. Time Scaling Detection and Estimation in Audio Recordings – Michele Pilia (Politecnico di Milano); Sara Mandelli (Politecnico di Milano); Paolo Bestagini (Politecnico di Milano); Stefano Tubaro (Politecnico di Milano, Italy)
SPL/T-IFS papers presentation
Friday, December 10 (9:20 AM – 10:40 AM, UTC+1)
- On Microstructure Estimation Using Flatbed Scanners for Paper Surface-Based Authentication – Runze Liu and Chau-Wai Wong, IEEE Transactions on Information Forensics and Security 2021, vol. 16
- DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing – Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen and Alex C. Kot, IEEE Transactions on Information Forensics and Security 2021, vol. 16
- Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms – Qiongxiu Li, Jaron Skovsted Gundersen, Richard Heusdens and Mads Græsbøll Christensen, IEEE Transactions on Information Forensics and Security 2021, vol. 16
- Unsupervised and Self-Adaptative Techniques for Cross-Domain Person Re-Identification – Gabriel C. Bertocco, Fernanda Andaló and Anderson Rocha, IEEE Transactions on Information Forensics and Security 2021, vol. 16
Special session: Forensics and security of physical objects – Security of printed codes
Friday, December 10 (11:10 AM – 12:30 PM, UTC+1)
- #4. Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection – Anselmo Ferreira (University of Siena); Changsheng Chen (Shenzhen University); Mauro Barni (University of Siena)
- #8. Mobile authentication of copy detection patterns: how critical is to know fakes? – Olga Taran (Geneva University); Joakim Tutt (University of Geneva); Taras Holotyak (Geneva University); Roman Chaban (University of Geneva); Slavi Bonev (University of Geneva); Slava Voloshynovskiy (University of Geneva)
- #14. Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? – Roman Chaban (University of Geneva); Olga Taran (Geneva University); Joakim Tutt (University of Geneva); Taras Holotyak (Geneva University); Slavi Bonev (University of Geneva); Slava Voloshynovskiy (University of Geneva)
- #54. Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector – Elyes Khermaza (Scantrust); Iuliia Tkachenko (LIRIS); Justin Picard (Scantrust)
SPL/T-IFS papers presentation
Friday, December 10 (2:20 PM – 3:20 PM, UTC+1)
- Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off – Quentin Giboulot, Rémi Cogranne and Patrick Bas, IEEE Transactions on Information Forensics and Security 2021, vol. 16
- Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction – Shuowei Liu, Beibei Liu, Yongjian Hu and Xianfeng Zhao, IEEE Signal Processing Letters 2021, vol. 28
- Reliable Camera Model Identification Using Sparse Gaussian Processes – Benedikt Lorch, Franziska Schirrmacher, Anatol Maier and Christian Riess, IEEE Signal Processing Letters 2021, vol. 28
Special session: Forensics and security of physical objects
Friday, December 10 (3:50 PM – 4:50 PM, UTC+1)
- #11. Quality of Service Guarantees for Physical Unclonable Functions – Onur Günlü (Technische Universitaet Berlin); Rafael F. Schaefer (Technische Universität Berlin); H. Vincent Poor (Princeton University)
- #13. 3D Print-Scan Resilient Localized Mesh Watermarking – Yanmei Chen (University of Science and Technology of China); Zehua Ma (University of Science and Technology of China); Hang Zhou (Simon Fraser University); Weiming Zhang (University of Science and Technology of China)
- #52. Self-embedding watermarking method for G-code used in 3D printing – Zhenyu Li (State Key Laboratory of Mathematical Engineering and Advanced Computing); Daofu Gong; Lei Tan; Xiangyang Luo (State Key Laboratory of Mathematical Engineering and Advanced Computing); Fenlin Liu (Zhengzhou Science and Technology Institute); Adrian Bors (University of York)