Menu Close

Program At-a-Glance

Please note that all times are shown in the time zone of the conference (UTC+1).

  Day 1,
Tue.
December 7
Day 2,
Wed.
December 8
Day 3,
Thu.
December 9
Day 4,
Fri.
December 10
8:30 – 9:00 Registration Registration Registration Registration
9:00 – 9:20 Conference opening Digital forensics
(4 papers)
9:20 – 10:20 Tutorial 1, part 1:
Data detectives
Biometrics
(4 papers)
SPL/T-IFS papers
presentation
(4 papers)
10:20 – 10:40 Coffee break
10:40 – 10:50 Coffee break Coffee break Coffee break
10:50 – 11:10 Digital forensics
against fake news
(4 papers)
11:10 – 12:10 Tutorial 1, part 2:
Data detectives
Privacy &
anonymity
(4 papers)
Special session
(4 papers)
12:10 – 12:30 Lunch
12:30 – 13:40 Lunch Lunch
13:40 – 14:20 Keynote 2:
Patrick de Smet
14:20 – 15:00 Tutorial 2, part 1:
Physiological forensics
Keynote 1:
Teddy Furon
SPL/T-IFS papers
presentation
(3 papers)
15:00 – 15:20 Social event
Banquet
15:20 – 15:40 Coffee break
15:40 – 15:50 Coffee break Coffee break
15:50 – 16:10 Special session
(3 papers)
16:10 – 16:50 Tutorial 2, part 2:
Physiological forensics
Steganography &
steganalysis
(4 papers)
16:50 – 17:10 Awards
17:10 – 17:30  
17:30 – 19:00   IFS-TC Meeting
19:00 – 21:00 Welcome reception  

 

Biometrics
Wednesday, December 8 (9:20 AM – 10:40 AM, UTC+1)

  • #15. Spoofing Speaker Verification With Voice Style Transfer And Reconstruction Loss – Thomas Thebaud (Orange); Gaël Le Lan (Orange Labs); Anthony Larcher (Universite du Mans – LIUM)
  • #19. Impact of Super-Resolution and Human Identification in Drone Surveillance – Akshay Agarwal (University at Buffalo); Nalini Ratha (University at Buffalo, SUNY); Mayank Vatsa (IIT Jodhpur); Richa Singh (IIT Jodhpur)
  • #37. Multi Loss Fusion For Matching Smartphone Captured Contactless Finger Images – Bhavin Jawade (University at Buffalo); Akshay Agarwal (University at Buffalo); Nalini Ratha (SUNY Buffalo); Srirangaraj Setlur (University at Buffalo, SUNY)
  • #51. Assessment of Synthetically Generated Mated Samples from Single Fingerprint Samples Instances – Simon Kirchgasser (University of Salzburg); Christoph Kauba (University of Salzburg); Andreas Uhl (University of Salzburg)

Privacy & anonymity
Wednesday, December 8 (11:10 AM – 12:30 PM, UTC+1)

  • #27. Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers – Jelle Vos (Delft University of Technology); Zekeriya Erkin (TU Delft); Christian Doerr (Hasso Plattner Institute, University of Potsdam)
  • #28. On the Recognition Performance of BioHashing on state-of-the-art Face Recognition models – Hatef Otroshi Shahreza (Idiap Research Institute); Vedrana Krivokuca (Idiap); Sébastien Marcel (IDIAP)
  • #59. Secure Collaborative Editing Using Secret Sharing – Shashank Arora (University at Albany, SUNY); Pradeep K. Atrey (University at Albany, SUNY)
  • #7. Differentially Private Generative Adversarial Networks with Model Inversion – Dongjie Chen (University of California, Davis); Sen-ching S Cheung (University of Kentucky); Chen-Nee Chuah (University of California Davis); Sally Ozonoff (University of California Davis)

Steganography & steganalysis
Wednesday, December 8 (4:10 PM – 5:30 PM, UTC+1)

  • #22. CNN Steganalyzers Leverage Local Embedding Artifacts – Yassine Yousfi (Binghamton University); Jan Butora (Binghamton University); Jessica Fridrich (“SUNY, Binghamton”)
  • #23. Data Augmentation for JPEG Steganalysis – Tomer Itzhaki (Binghamton university); Yassine Yousfi (Binghamton University); Jessica Fridrich (“SUNY, Binghamton”)
  • #33. Structural Watermarking to Deep Neural Networks via Network Channel Pruning – Hanzhou Wu (Shanghai University)
  • #39. Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing – Kaiyu Ying (Ningbo University); Wang Rangding (Ningbo University); Yan Diqun (Ningbo University)

Digital forensics
Thursday, December 9 (9:00 AM – 10:20 AM, UTC+1)

  • #21. How are PDF files published in Scientific Community? – Supriya Adhatarao (Inria); Cédric Lauradoux (Inria)
  • #24. Unsupervised JPEG Domain Adaptation for Practical Digital Image Forensics – Rony Abecidan (Université de Lille); Vincent Itier (IMT Lille-Douai); Jérémie Boulanger (Cristal); Patrick Bas (CNRS)
  • #45. Apart from in-field sensor defects, are there additional age traces hidden in a digital image? – Robert Jöchl (University of Salzburg); Andreas Uhl (University of Salzburg)
  • #48. Differential Anomaly Detection for Facial Images – Mathias Ibsen (Hochschule Darmstadt); Lazaro Janier Gonzalez-Soler (Hochschule Darmstadt); Christian Rathgeb (Hochschule Darmstadt); Pawel Drozdowski (Hochschule Darmstadt); Marta Gomez-Barrero (Hochschule Ansbach); Christoph Busch (Hochschule Darmstadt)

Digital forensics against fake news
Thursday, December 9 (10:50 AM – 12:10 PM, UTC+1)

  • #5. Robust Image Hashing for Detecting Small Tampering Using a Hyperrectangular Region – Toshiki Itagaki (Sony Semiconductor Solutions Corporation); Yuki Funabiki (Sony Corporation); Toru Akishita (Sony Semiconductor Solutions Corporation)
  • #34. Scalable Fact-checking with Human-in-the-Loop – Jing Yang (University of Campinas); Didier Augusto Vega-Oliveros (University of Campinas); Taís Seibt (Universidade do Vale do Rio dos Sino); Anderson Rocha (UNICAMP)
  • #42. Source Attribution of Online News Images by Compression Analysis – Michael Albright (Kitware Inc.); Nitesh Menon (Kitware Inc.); Kristy Roschke (Arizona State University); Arslan Basharat (Kitware Inc.)
  • #50. Time Scaling Detection and Estimation in Audio Recordings – Michele Pilia (Politecnico di Milano); Sara Mandelli (Politecnico di Milano); Paolo Bestagini (Politecnico di Milano); Stefano Tubaro (Politecnico di Milano, Italy)

SPL/T-IFS papers presentation
Friday, December 10 (9:20 AM – 10:40 AM, UTC+1)

  • On Microstructure Estimation Using Flatbed Scanners for Paper Surface-Based Authentication – Runze Liu and Chau-Wai Wong, IEEE Transactions on Information Forensics and Security 2021, vol. 16
  • DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing – Rizhao Cai, Haoliang Li, Shiqi Wang, Changsheng Chen and Alex C. Kot, IEEE Transactions on Information Forensics and Security 2021, vol. 16
  • Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms – Qiongxiu Li, Jaron Skovsted Gundersen, Richard Heusdens and Mads Græsbøll Christensen, IEEE Transactions on Information Forensics and Security 2021, vol. 16
  • Unsupervised and Self-Adaptative Techniques for Cross-Domain Person Re-Identification – Gabriel C. Bertocco, Fernanda Andaló and Anderson Rocha, IEEE Transactions on Information Forensics and Security 2021, vol. 16

Special session: Forensics and security of physical objects – Security of printed codes
Friday, December 10 (11:10 AM – 12:30 PM, UTC+1)

  • #4. Fusing Multiscale Texture and Residual Descriptors for Multilevel 2D Barcode Rebroadcasting Detection – Anselmo Ferreira (University of Siena); Changsheng Chen (Shenzhen University); Mauro Barni (University of Siena)
  • #8. Mobile authentication of copy detection patterns: how critical is to know fakes? – Olga Taran (Geneva University); Joakim Tutt (University of Geneva); Taras Holotyak (Geneva University); Roman Chaban (University of Geneva); Slavi Bonev (University of Geneva); Slava Voloshynovskiy (University of Geneva)
  • #14. Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? – Roman Chaban (University of Geneva); Olga Taran (Geneva University); Joakim Tutt (University of Geneva); Taras Holotyak (Geneva University); Slavi Bonev (University of Geneva); Slava Voloshynovskiy (University of Geneva)
  • #54. Can Copy Detection Patterns be copied? Evaluating the performance of attacks and highlighting the role of the detector – Elyes Khermaza (Scantrust); Iuliia Tkachenko (LIRIS); Justin Picard (Scantrust)

SPL/T-IFS papers presentation
Friday, December 10 (2:20 PM – 3:20 PM, UTC+1)

  • Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off – Quentin Giboulot, Rémi Cogranne and Patrick Bas, IEEE Transactions on Information Forensics and Security 2021, vol. 16
  • Non-Degraded Adaptive HEVC Steganography by Advanced Motion Vector Prediction – Shuowei Liu, Beibei Liu, Yongjian Hu and Xianfeng Zhao, IEEE Signal Processing Letters 2021, vol. 28
  • Reliable Camera Model Identification Using Sparse Gaussian Processes – Benedikt Lorch, Franziska Schirrmacher, Anatol Maier and Christian Riess, IEEE Signal Processing Letters 2021, vol. 28

Special session: Forensics and security of physical objects
Friday, December 10 (3:50 PM – 4:50 PM, UTC+1)

  • #11. Quality of Service Guarantees for Physical Unclonable Functions – Onur Günlü (Technische Universitaet Berlin); Rafael F. Schaefer (Technische Universität Berlin); H. Vincent Poor (Princeton University)
  • #13. 3D Print-Scan Resilient Localized Mesh Watermarking – Yanmei Chen (University of Science and Technology of China); Zehua Ma (University of Science and Technology of China); Hang Zhou (Simon Fraser University); Weiming Zhang (University of Science and Technology of China)
  • #52. Self-embedding watermarking method for G-code used in 3D printing – Zhenyu Li (State Key Laboratory of Mathematical Engineering and Advanced Computing); Daofu Gong; Lei Tan; Xiangyang Luo (State Key Laboratory of Mathematical Engineering and Advanced Computing); Fenlin Liu (Zhengzhou Science and Technology Institute); Adrian Bors (University of York)