Hilton San Francisco, Union Square
San Francisco, California, United States
2 - 6 February 2014
Conference 9028
Media Watermarking, Security, and Forensics 2014
Monday - Wednesday, 3 - 5 February 2014

Due Dates:

Extended Abstract (1,000 words) and Summary (200 words): Extended to 5 August 2013

Manuscript for Post-Meeting Proceedings: 6 January 2014


The ease of capturing, manipulating, distributing, and consuming digital media (e.g. images, audio, video, graphics, and text) have raised a number of important security challenges to the forefront. These issues have prompted significant research and development activities in the areas of digital watermarking, steganography, data hiding, forensics, media identification and encryption to protect the authenticity, security, and ownership of media objects. Research results in these areas have also prompted new paradigms and applications to monetize media objects without violating their ownership rights.

The SPIE Media Watermarking, Security, and Forensics conference is now established as a premier destination for disseminating high quality cutting edge research in these areas. The conference provides an excellent venue for researchers and practitioners to present their innovative and significant work as well as to keep abreast with the latest developments in watermarking, security and forensics. A unique feature of the conference is that the submission process only requires an extended abstract describing the work in progress, with the full paper to be submitted only a few weeks before the event. This allows researchers to present early results and innovative ideas fresh from the laboratory to motivate new research directions in a timely manner. The final paper length can be anywhere between 6 and 12 pages.

The areas of interest of this conference include, but are not limited to:
  • digital watermarking and steganography: algorithms, theoretical models, applications, implementation, benchmarking, security, systems, protocols, attacks, steganalysis.
  • media forensics and authentication: fingerprinting and traitor tracing, device identification, content authentication, computer forensics, recovery of deleted multimedia, near duplicate image/video retrieval.
  • media encryption and protection: encryption and decryption techniques, visual encryption, signal processing in the encrypted domain, digital rights management.
  • optical document security: security features for banknotes, passports, ID cards and visas, substrate and printing technology, optically variable security, authentication and examination.
  • biometrics and user identification: feature extraction and management, security, attacks and countermeasures, multimodal biometric, biometric template protection and authentication, biometric systems and protocols, biometric for mobile computing applications.
  • media identification and physical object identification and interaction: watermarking, digital fingerprinting, robust hashing, media database search, mobile visual search, data-hardware security, packaging protection, RFID tags, barcode technology, near field communication (NFC), the internet of things.
Submission Guidelines
Prospective authors should submit a 1,000-word abstract summarizing (i) the application context, (ii) the technical challenge to be addressed, (iii) the research approach adopted to tackle the problem, and (iv) the theoretical or experimental results obtained so far. The submission must include a paragraph that clearly identifies the specific contribution(s), the novelty and significance of the work, and its relationship to prior work. Extended abstracts presenting work in progress must include preliminary results and give a clear indication on the type of results that will be provided in the final manuscript.;
Conference Committee
Important Dates
Abstract Due:
22 July 2013

Author Notification:
7 October 2013

Manuscript Due Date:
6 January 2014

Monday 3 February Show All Abstracts
Session 1: Steganography
Monday, 3 February 2014
8:30 AM - 10:10 AM
Location: Golden Gate 3
Challenging the doctrines of JPEG steganography
Paper 9028-1
Author(s):
Show Abstract
Linguistic steganography on Twitter: hierarchical language modeling with manual interaction
Paper 9028-2
Author(s):
Show Abstract
Detection of content adaptive LSB matching: a game theory approach
Paper 9028-3
Author(s):
Show Abstract
Further study on the security of S-UNIWARD
Paper 9028-34
Author(s):
Show Abstract
Session 2: Biometrics and Watermarking
Monday, 3 February 2014
10:30 AM - 12:10 PM
Location: Golden Gate 3
Are you threatening me?: Towards smart detectors in watermarking
Paper 9028-5
Author(s):
Show Abstract
On accuracy, robustness, and security of bag-of-word search systems
Paper 9028-6
Author(s):
Show Abstract
An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics
Paper 9028-7
Author(s):
Show Abstract
Robust human face recognition based on locality preserving sparse over complete block approximation
Paper 9028-8
Author(s):
Show Abstract
Video/Demo I
Monday, 3 February 2014
1:45 PM - 2:00 PM
Location: Golden Gate 3
Session Key1: Keynote Session I
Monday, 3 February 2014
2:00 PM - 3:00 PM
Location: Golden Gate 3
Digital wallet and mobile payment (Keynote Presentation)
Paper 9028-9
Author(s):
Show Abstract
Session 3: Watermarking
Monday, 3 February 2014
3:00 PM - 6:00 PM
Location: Golden Gate 3
Blind detection for disparity-coherent stereo video watermarking
Paper 9028-10
Author(s):
Show Abstract
Tuple decoders for traitor tracing schemes
Paper 9028-11
Author(s):
Show Abstract
Feature-based watermark localization in digital capture systems
Paper 9028-12
Author(s):
Show Abstract
Self-synchronization for spread spectrum audio watermarks after time scale modification
Paper 9028-13
Author(s):
Show Abstract
Drift-free MPEG-4 AVC semi-fragile watermarking
Paper 9028-14
Author(s):
Show Abstract
Watermarking textures in video games
Paper 9028-4
Author(s):
Show Abstract
Tuesday 4 February Show All Abstracts
Session Plen1: Plenary Session and Society Award Presentations
Tuesday, 4 February 2014
8:30 AM - 9:50 AM
Location: Continental Ballroom 5
Using fMRI To Reverse Engineer the Human Visual System (Plenary Presentation)
Paper 9011-301
Author(s):
Show Abstract
Session 4: Steganalysis
Tuesday, 4 February 2014
10:30 AM - 12:10 PM
Location: Golden Gate 3
Cover estimation and payload location using Markov random fields
Paper 9028-15
Author(s):
Show Abstract
A mishmash of methods for mitigating the model mismatch mess
Paper 9028-16
Author(s):
Show Abstract
Study of cover source mismatch in steganalysis and ways to mitigate its impact
Paper 9028-17
Author(s):
Show Abstract
Implementing the projected spatial rich features on a GPU
Paper 9028-18
Author(s):
Show Abstract
Session Demo2: Video/Demo II: Konica Minolta Laboratory
Tuesday, 4 February 2014
1:45 PM - 2:00 PM
Location: Golden Gate 3
Self-verifiable paper documents and automatic content verification
Paper 9028-35
Author(s):
Show Abstract
Session Key2: Keynote Session II
Tuesday, 4 February 2014
2:00 PM - 3:00 PM
Location: Golden Gate 3
Authentic or not (Keynote Presentation)
Paper 9028-36
Author(s):
Show Abstract
Session 5: Identification
Tuesday, 4 February 2014
3:00 PM - 5:35 PM
Location: Golden Gate 3
Estimation of lens distortion correction from single images
Paper 9028-20
Author(s):
Show Abstract
A reference estimator based on composite sensor pattern noise for source device identification
Paper 9028-21
Author(s):
Show Abstract
Content identification: binary content fingerprinting versus binary content encoding
Paper 9028-22
Author(s):
Show Abstract
Additive attacks on speaker recognition
Paper 9028-23
Author(s):
Show Abstract
Robust hashing for 3D models
Paper 9028-24
Author(s):
Show Abstract
Symposium Demonstration Session
Tuesday, 4 February 2014
5:30 PM - 7:30 PM
Location: Continental Ballroom 4

A symposium-wide demonstration session will be open to attendees 5:30 to 7:30 pm Tuesday evening. Demonstrators will provide interactive, hands-on demonstrations of a wide-range of products related to Electronic Imaging.
Wednesday 5 February Show All Abstracts
Session Plen2: Plenary Session and Conference Award Presentations
Wednesday, 5 February 2014
8:30 AM - 9:50 AM
Location: Continental Ballroom 5
Integrated Imaging: Creating Images from the Tight Integration of Algorithms, Computation, and Sensors (Plenary Presentation)
Paper 9011-300
Author(s):
Show Abstract
Session 6: Authentication
Wednesday, 5 February 2014
10:55 AM - 12:10 PM
Location: Golden Gate 3
(JEI Invited) Content authentication for printed images utilizing high capacity data hiding
Paper 9028-25
Author(s):
Show Abstract
A framework for fast and secure packaging identification on mobile phones
Paper 9028-26
Author(s):
Show Abstract
Printer technology authentication from micrometric scan of a single printed dot
Paper 9028-27
Author(s):
Show Abstract
Video/Demo III: Hewlett-Packard Laboratories
Wednesday, 5 February 2014
1:45 PM - 2:00 PM
Location: Golden Gate 3
Session Key3: Keynote Session III
Wednesday, 5 February 2014
2:00 PM - 3:00 PM
Location: Golden Gate 3
Photo forensics from shadows and shading (Keynote Presentation)
Paper 9028-28
Author(s):
Show Abstract
Session 7: Forensics
Wednesday, 5 February 2014
3:00 PM - 5:35 PM
Location: Golden Gate 3
Digitized locksmith forensics: automated detection and segmentation of toolmarks on highly structured surfaces
Paper 9028-29
Author(s):
Show Abstract
Two improved forensic methods of detecting contrast enhancement in digital images
Paper 9028-30
Author(s):
Show Abstract
Copy-move forgery detection from printed images
Paper 9028-31
Author(s):
Show Abstract
Countering anti-forensics by means of data fusion
Paper 9028-32
Author(s):
Show Abstract
Image counter-forensics based on feature injection
Paper 9028-33
Author(s):
Show Abstract
Concluding Remarks
Wednesday, 5 February 2014
5:35 PM - 5:45 PM
Location: Golden Gate 3
Conference Committee
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray