default search action
15th WIFS 2023: Nürnberg, Germany
- IEEE International Workshop on Information Forensics and Security, WIFS 2023, Nürnberg, Germany, December 4-7, 2023. IEEE 2023, ISBN 979-8-3503-2491-4
- Tilak Sharma, Mahika Wason, Vishnu Boddeti, Arun Ross, Nalini K. Ratha:
Fully Homomorphic Encryption Operators for Score and Decision Fusion in Biometric Identification. 1-6 - Pierre Fernandez, Antoine Chaffin, Karim Tit, Vivien Chappelier, Teddy Furon:
Three Bricks to Consolidate Watermarks for Large Language Models. 1-6 - Juan E. Tapia, Christoph Busch:
AlphaNet: Single Morphing Attack Detection Using Multiple Contributors. 1-6 - Martin Benes, Benedikt Lorch, Rainer Böhme:
JPEG Steganalysis Using Leaked Cover Thumbnails. 1-6 - Amirreza Zamani, Tobias J. Oechtering, Mikael Skoglund:
Private Variable-Length Coding with Non-Zero Leakage. 1-6 - Luca Cuccovillo, Milica Gerhardt, Patrick Aichroth:
Audio Spectrogram Transformer for Synthetic Speech Detection via Speech Formant Analysis. 1-6 - Edoardo Daniele Cannas, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp:
Enhancement Strategies For Copy-Paste Generation & Localization in RGB Satellite Imagery. 1-6 - Hashim Ali, Dhimant Khuttan, Rafi Ud Daula Refat, Hafiz Malik:
Protecting Voice-Controlled Devices Against LASER Injection Attacks. 1-6 - Amirreza Zamani, Tobias J. Oechtering, Deniz Gündüz, Mikael Skoglund:
Private Variable-Length Coding with Zero Leakage. 1-6 - Pia Bauspieß, Chiara-Marie Zok, Anamaria Costache, Christian Rathgeb, Jascha Kolberg, Christoph Busch:
MT-PRO: Multibiometric Template Protection Based On Homomorphic Transciphering. 1-6 - Davide Salvi, Mirco Pezzoli, Sara Mandelli, Paolo Bestagini, Stefano Tubaro:
Are you Really Alone? Detecting the use of Speech Separation Techniques on Audio Recordings. 1-6 - Tiago Roxo, Joana Cabral Costa, Pedro R. M. Inácio, Hugo Proença:
On Exploring Audio Anomaly in Speech. 1-6 - Hédi Zeghidi, Carlos Fernando Crispim Junior, Iuliia Tkachenko:
CDP-Sim: Similarity Metric Learning to Identify the Fake Copy Detection Patterns. 1-6 - Melissa R. Dale, Elliot Singer, Bengt J. Borgström, Arun Ross:
To Impute or Not: Recommendations for Multibiometric Fusion. 1-6 - Dailé Osorio Roig, Paul A. Gerlitz, Christian Rathgeb, Christoph Busch:
Reversing Deep Face Embeddings with Probable Privacy Protection. 1-6 - Serhat Bakirtas, Elza Erkip:
Distribution-Agnostic Database De-Anonymization Under Synchronization Errors. 1-6 - Artem Yaroshchuk, Christoforos Papastergiopoulos, Luca Cuccovillo, Patrick Aichroth, Konstantinos Votis, Dimitrios Tzovaras:
An Open Dataset of Synthetic Speech. 1-6 - Fernando Alonso-Fernandez, Kevin Hernandez-Diaz, Jose Maria Buades Rubio, Prayag Tiwari, Josef Bigün:
An Explainable Model-Agnostic Algorithm for CNN-Based Biometrics Verification. 1-6 - Felix Klement, Emily Vorderwülbeke, Stefan Katzenbeisser:
One Standard to Rule Them All? Assessing the Disruptive Potential of Jamming Attacks on Matter Networks. 1-6 - Edgar Kaziakhmedov, Eli Dworetzky, Jessica J. Fridrich:
Observing Bag Gain in JPEG Batch Steganography. 1-6 - Elena Rodríguez Lois, Fernando Pérez-González:
Towards Traitor Tracing in Black-and-White-Box DNN Watermarking with Tardos-Based Codes. 1-6 - Sarah Barrington, Romit Barua, Gautham Koorma, Hany Farid:
Single and Multi-Speaker Cloned Voice Detection: From Perceptual to Learned Features. 1-6 - Lin Huang, Gejian Zhao, Chuan Qin:
Recoverable Active Protection Framework for Neural Network Models. 1-6 - Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomás Pevný:
Leveraging Data Geometry to Mitigate CSM in Steganalysis. 1-6 - Jianwei Fei, Zhihua Xia, Benedetta Tondi, Mauro Barni:
Robust Retraining-free GAN Fingerprinting via Personalized Normalization. 1-6 - Ankit Gangwal, Apoorva Thirupathi, Alessandro Brighente, Mauro Conti:
A First Look at Shill Looping in NFT Ecosystem. 1-6 - Awais Khan, Khalid Mahmood Malik:
Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection. 1-6 - Dailé Osorio Roig, Mahdi Ghafourian, Christian Rathgeb, Rubén Vera-Rodríguez, Christoph Busch, Julian Fiérrez:
Optimizing Key-Selection for Face-Based One-Time Biometrics via Morphing. 1-6 - Kim Strandberg, Ulf Arnljung, Tomas Olovsson:
The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics. 1-6 - Marina Gardella, Pablo Musé, Miguel Colom, Jean-Michel Morel, Denis Perraud:
PRNU-Based Source Camera Statistical Certification. 1-6 - Yury Belousov, Olga Taran, Vitaliy Kinakh, Slava Voloshynovskiy:
Stochastic Digital Twin for Copy Detection Patterns. 1-6 - Milica Gerhardt, Luca Cuccovillo, Patrick Aichroth:
Advancing Audio Phylogeny: A Neural Network Approach for Transformation Detection. 1-6 - Shangxuan Lyu, Ramprasad Raghunath, Luca Kunz, Karl-Ludwig Besser, Pin-Hsun Lin, Eduard A. Jorswieck:
Practical Wiretap Code Design by Concatenated Autoencoder and LDPC Codes. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.