Conference Program
Registration
Tutorial by Prof. Gian Luca Marcialis and Roberto Casula, University of Cagliari, Italy: "Fingerprint Spoofing"
Lunch
Tutorial by Emilio Coppa, Sapienzia University Rome: "Software Fuzzing: How to Find Bugs One Step at a Time"
Welcome Reception at Mautkeller
Registration
Conference welcome
Security and Privacy of IoT Technologies – Complementary Approaches to Traditional Problems with a Forensics Lens
Keynote by Prof. Selcuk Uluagac
Break / Fingerprint Spoofing Results
Special Session: Biometric Forensics
Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing
Reversing Deep Face Embeddings with Probable Privacy Protection
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering
An Explainable Model-Agnostic Algorithm for CNN-based Biometrics Verification
Lunch
Steganography and Steganalysis
Observing Bag Gain in JPEG Batch Steganography
Leveraging Data Geometry to Mitigate CSM in Steganalysis
JPEG Steganalysis Using Leaked Cover Thumbnails
Practical Wiretap Code Design by Concatenated Autoencoder and LDPC Codes
Break
Audio Forensics
Protecting Voice-Controlled Devices against LASER Injection Attacks
Advancing Audio Phylogeny: A Neural Network Approach for Transformation Detection
An Open Dataset of Synthetic Speech
Optional visit to the Christmas market
Registration
Special Session: Deep Neural Network Watermarking
Robust Retraining-free GAN Fingerprinting via Personalized Normalization
Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes
Three Bricks to Consolidate Watermarks for Large Language Models
Recoverable Active Protection Framework for Neural Network Models
Break
Security and Privacy
One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks
Distribution-Agnostic Database De-Anonymization Under Synchronization Errors
Stochastic Digital Twin for Copy Detection Patterns
CDP-Sim: Similarity metric learning to identify the fake Copy Detection Patterns
Lunch / IEEE IFS TC Meeting (hybrid)
Digital Forensics and Image Forensics
Enhancement Strategies For Copy-Paste Generation and Localization in RGB Satellite Imagery
PRNU-based source camera statistical certification
The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics
Break
Cryptography
A First Look at Shill Looping in NFT Ecosystem
Private Variable-Length Coding with Non-zero Leakage
Private Variable-Length Coding with Zero Leakage
Social Dinner: "Knights Dinner" at Alte Küch'n
Registration
Audio Forensics 2
Are you Really Alone? Detecting the use of Speech Separation Techniques on Audio Recordings
Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features
Audio Spectrogram Transformer for Synthetic Speech Detection via Speech Formant Analysis
On Exploring Audio Anomaly in Speech
Break
Special Session: Biometric Forensics 2
Securing Voice Biometrics: One-Shot Learning Approach for Synthetic Deepfake Detection
Fully Homomorphic Encryption Operators for Score and Decision Level Fusion
To Impute or Not: Recommendations for Multibiometric Fusion
AlphaNet: Single Morphing Attack Detection using Multiple Contributors
Lunch
Boots on the Cyber Ground: A Survival Playbook to Digital Sovereignty
Keynote by Prof. Roberto Baldoni
Closing and Awards
Choice of social offers
Visit to the historic Nazi party rally grounds or the medieval old town and castle
Keynotes
Prof. Selcuk Uluagac:
Security and Privacy of IoT Technologies – Complementary Approaches to Traditional Problems with a Forensics Lens
Director of the Cyber-Physical Systems Security Lab, Florida International University
Prof. Roberto Baldoni:
Boots on the Cyber Ground: A Survival Playbook to Digital Sovereignty
Former Director of the Italian National Cybersecurity Agency
Accepted Papers
- An Explainable Model-Agnostic Algorithm for CNN-based Biometrics Verification (Tuesday 11:00 - 12:30)
Fernando Alonso-Fernandez (Halmstad University)*; Kevin Hernandez-Diaz (Halmstad University); Jose M Buades (University of Balearic Islands); Prayag Tiwari (Halmstad University); Josef Bigun (Halmstad University, Sweden) - Optimizing Key-Selection for Face-based One-Time Biometrics via Morphing (Tuesday 11:00 - 12:30)
Daile Osorio Roig (Hochschule Darmstadt)*; Mahdi Ghafourian (Universidad Autónoma de Madrid); Christian Rathgeb (Hochschule Darmstadt); Ruben Vera-Rodriguez (Universidad Autónoma de Madrid); Christoph Busch (Hochschule Darmstadt); Julian Fierrez (Universidad Autonoma de Madrid) - Reversing Deep Face Embeddings with Probable Privacy Protection (Tuesday 11:00 - 12:30)
Daile Osorio Roig (Hochschule Darmstadt)*; Paul-Anton Gerlitz (Hochschule Darmstadt); Christian Rathgeb (Hochschule Darmstadt); Christoph Busch (Hochschule Darmstadt) - MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering (Tuesday 11:00 - 12:30)
Pia Bauspieß (Hochschule Darmstadt)*; Chiara-Marie Zok (Hochschule Darmstadt); Anamaria Costache (NTNU - Norwegian University of Science and Technology); Christian Rathgeb (Hochschule Darmstadt); Jascha Kolberg (Hochschule Darmstadt); Christoph Busch (Hochschule Darmstadt) - Observing Bag Gain in JPEG Batch Steganography (Tuesday 14:00 - 15:30)
Edgar Kaziakhmedov (Binghamton University)*; Jessica Fridrich ("SUNY, Binghamton"); Eli Dworetzky (Binghamton University) - Leveraging Data Geometry to Mitigate CSM in Steganalysis (Tuesday 14:00 - 15:30)
Rony ABECIDAN (CNRS)*; Patrick Bas (CNRS); Vincent Itier (Univ. Montpellier); Jeremie Boulanger (Cristal); Tomas Pevny (Czech Technical University in Prague) - JPEG Steganalysis Using Leaked Cover Thumbnails (Tuesday 14:00 - 15:30)
Martin Beneš (Universität Innsbruck)*; Benedikt Lorch (Universität Innsbruck); Rainer Böhme (Universität Innsbruck) - Practical Wiretap Code Design by Concatenated Autoencoder and LDPC Codes (Tuesday 14:00 - 15:30)
Shangxuan Lyu (TU Braunschweig); Ramprasad Raghunath (TU Braunschweig); Luca Kunz (TU Braunschweig); Karl Besser (Princeton University); Pin-Hsun Lin (TU Braunschweig)*; Eduard Jorswieck (TU Braunschweig) - Protecting Voice-Controlled Devices against LASER Injection Attacks (Tuesday 16:00 - 17:15)
Hashim Ali (University of Michigan)*; Hafiz Malik (University of Michigan - dearborn); Dhimant Khuttan (University of Michigan Dearborn); Rafi Ud Daula Refat (University of Michigan-Dearborn) - Advancing Audio Phylogeny: A Neural Network Approach for Transformation Detection (Tuesday 16:00 - 17:15)
Milica Gerhardt (Fraunhofer IDMT)*; Luca Cuccovillo (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT) - An Open Dataset of Synthetic Speech (Tuesday 16:00 - 17:15)
Artem Yaroshchuk (Fraunhofer Institute for Digital Media Technology)*; Christoforos Papastergiopoulos (CERTH/ITI); Luca Cuccovillo (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT); Konstantinos Votis (Centre for Reasearch and Technology Hellas / Information Technologies Institute); Dimitrios Tzovaras (Centre for Research and Technology Hellas) - Robust Retraining-free GAN Fingerprinting via Personalized Normalization (Wednesday 9:00 - 10:30)
Jianwei Fei (Jinan University)*; Zhihua Xia (Jinan University); Benedetta Tondi (University of Siena); Mauro Barni (University of Siena) - Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-based Codes (Wednesday 9:00 - 10:30)
Elena Rodríguez-Lois (atlanTTic Research Center, University of Vigo)*; Fernando Perez-Gonzalez (Universidad de Vigo) - Three Bricks to Consolidate Watermarks for Large Language Models (Wednesday 9:00 - 10:30)
Pierre Fernandez (Meta AI)*; Antoine Chaffin (IRISA/IMATAG); Karim TIT (Inria); Vivien Chappelier (Imatag); Teddy Furon (Inria) - Recoverable Active Protection Framework for Neural Network Models (Wednesday 9:00 - 10:30)
Lin Huang (university of ShangHai for Science and Technology); Gejian Zhao (USST); Chuan Qin (University of Shanghai for Science and Technology)* - One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks (Wednesday 11:00 - 12:30)
Felix Klement (University of Passau)*; Emily Vorderwülbeke (University of Passau); Stefan Katzenbeisser (University of Passau) - Distribution-Agnostic Database De-Anonymization Under Synchronization Errors (Wednesday 11:00 - 12:30)
Serhat Bakirtas (New York University)*; Elza Erkip (elza@nyu.edu) - Stochastic Digital Twin for Copy Detection Patterns (Wednesday 11:00 - 12:30)
Yury Belousov (University of Geneva)*; Olga Taran (Geneva University); Vitaliy Kinakh (University of Geneva); Slava Voloshynovskiy (University of Geneva) - CDP-Sim: Similarity metric learning to identify the fake Copy Detection Patterns (Wednesday 11:00 - 12:30)
Hédi Zeghidi (LIRIS); Carlos F Crispim-Junior (Univ Lyon, Lyon 2, LIRIS); Iuliia Tkachenko (LIRIS)* - Enhancement Strategies For Copy-Paste Generation and Localization in RGB Satellite Imagery (Wednesday 14:00 - 15:15)
Edoardo Daniele Cannas (Politecnico di Milano); Sriram Baireddy (Purdue University); Paolo Bestagini (Politecnico di Milano)*; Stefano Tubaro (Politecnico di Milano, Italy); Edward J. Delp (Purdue University) - PRNU-based source camera statistical certification (Wednesday 14:00 - 15:15)
Marina Gardella (École normale superieure Paris-Saclay)*; Pablo Musé (Universidad de la República, Uruguay); Miguel Colom (ENS Paris-Saclay); Jean-Michel Morel (Centre Borelli ENS Paris-Saclay); Denis Perraud (Laboratoire Central de Criminalistique Numérique, Sous-Direction de la Criminalistique, Service National de Police Scientifique) - The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics (Wednesday 14:00 - 15:15)
Kim Strandberg (Volvo Cars)*; Ulf Arnljung (Volvo Cars); Tomas Olovsson (Chalmers University of Technology) - A First Look at Shill Looping in NFT Ecosystem (Wednesday 15:45 - 17:00)
Ankit Gangwal (IIIT Hyderabad)*; Apoorva Thirupathi (IIIT Hyderabad); Alessandro Brighente (University of Padova); Mauro Conti (University of Padua) - Private Variable-Length Coding with Non-zero Leakage (Wednesday 15:45 - 17:00)
Amirreza Zamani (KTH Royal Institute of Technology)*; Tobias Oechtering (KTH Royal Institute of Technology); Mikael Skoglund (KTH Royal Institute of Technology) - Private Variable-Length Coding with Zero Leakage (Wednesday 15:45 - 17:00)
Amirreza Zamani (KTH Royal Institute of Technology)*; Tobias Oechtering (KTH Royal Institute of Technology); Deniz Gunduz (Imperial College London); Mikael Skoglund (KTH Royal Institute of Technology) - Are you Really Alone? Detecting the use of Speech Separation Techniques on Audio Recordings (Thursday 9:00 - 10:30)
Davide Salvi (Politecnico di Milano); Mirco Pezzoli (Politecnicno di Milano); Sara Mandelli (Politecnico di Milano); Paolo Bestagini (Politecnico di Milano)*; Stefano Tubaro (Politecnico di Milano, Italy) - Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features (Thursday 9:00 - 10:30)
Sarah Barrington (University of California, Berkeley); Romit Barua (UC Berkeley); Gautham Koorma (University of California, Berkeley); Hany Farid (University of California, Berkeley)* - Audio Spectrogram Transformer for Synthetic Speech Detection via Speech Formant Analysis (Thursday 9:00 - 10:30)
Luca Cuccovillo (Fraunhofer IDMT)*; Milica Gerhardt (Fraunhofer IDMT); Patrick Aichroth (Fraunhofer IDMT) - On Exploring Audio Anomaly in Speech (Thursday 9:00 - 10:30)
Tiago Roxo (Universidade da Beira Interior)*; Joana C. Costa (Universidade da Beira Interior); Pedro R. M. Inácio (Universidade da Beira Interior); Hugo Proenca (U-Beira Interior) - Securing Voice Biometrics: One-Shot Learning Approach for Synthetic Deepfake Detection (Thursday 11:00 - 12:30)
awais khan (oakland university); Khalid Mahmood Malik (Oakland University)* - Fully Homomorphic Encryption Operators for Score and Decision Level Fusion (Thursday 11:00 - 12:30)
Tilak Sharma (University at Buffalo ); Mahika Wason (University at Buffalo); Vishnu Boddeti (Michigan State University); Arun Ross (Michigan State University); Nalini Ratha (SUNY Buffalo)* - To Impute or Not: Recommendations for Multibiometric Fusion (Thursday 11:00 - 12:30)
Melissa R Dale (Michigan State University)*; Elliot Singer (MIT Lincoln lab); Jonas Borgstrom (MIT Lincoln Laboratory); Arun Ross (Michigan State University) - AlphaNet: Single Morphing Attack Detection using Multiple Contributors (Thursday 11:00 - 12:30)
Juan Tapia (hda)*; Christoph Busch (Hochschule Darmstadt)