Login Paper Search My Schedule Paper Index Help

My ICASSP 2019 Schedule

Note: Your custom schedule will not be saved unless you create a new account or login to an existing account.
  1. Create a login based on your email (takes less than one minute)
  2. Perform 'Paper Search'
  3. Select papers that you desire to save in your personalized schedule
  4. Click on 'My Schedule' to see the current list of selected papers
  5. Click on 'Printable Version' to create a separate window suitable for printing (the header and menu will appear, but will not actually print)

Clicking on the Add button next to a paper title will add that paper to your custom schedule.
Clicking on the Remove button next to a paper will remove that paper from your custom schedule.

IFS-P4: Steganography, Watermarking and Secret Sharing Systems

Session Type: Poster
Time: Friday, May 17, 13:30 - 15:30
Location: Poster Area E, Meeting Room 1A
Session Chair: Remi Congranne, Université de technologie de Troyes
 
  IFS-P4.1: A NEW SPATIAL STEGANOGRAPHIC SCHEME BY MODELING IMAGE RESIDUALS WITH MULTIVARIATE GAUSSIAN MODEL
         Xinghong Qin; Shenzhen University
         Bin Li; Shenzhen University
         Jiwu Huang; Shenzhen University
 
  IFS-P4.2: ATTACKS ON DIGITAL WATERMARKS FOR DEEP NEURAL NETWORKS
         Tianhao Wang; University of Waterloo
         Florian Kerschbaum; University of Waterloo
 
  IFS-P4.3: RHFCN: FULLY CNN-BASED STEGANALYSIS OF MP3 WITH RICH HIGH-PASS FILTERING
         Yuntao Wang; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
         Xiaowei Yi; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
         Xianfeng Zhao; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
         Ante Su; State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences
 
  IFS-P4.4: INAUDIBLE SPEECH WATERMARKING BASED ON SELF-COMPENSATED ECHO-HIDING AND SPARSE SUBSPACE CLUSTERING
         Shengbei Wang; Tianjin Polytechnic University
         Weitao Yuan; Tianjin Polytechnic University
         Jianming Wang; Tianjin Polytechnic University
         Masashi Unoki; Japan Advanced Institute of Science and Technology
 
  IFS-P4.5: QUANTIZED GAUSSIAN EMBEDDING STEGANOGRAPHY
         Mehdi Sharifzadeh; University of Illinois at Chicago
         Mohammed Aloraini; University of Illinois at Chicago
         Dan Schonfeld; University of Illinois at Chicago
 
  IFS-P4.6: DIGITALLY ANNEALED SOLUTION FOR THE VERTEX COVER PROBLEM WITH APPLICATION IN CYBER SECURITY
         Mohammad Javad-Kalbasi; Isfahan University of Technology
         Keivan Dabiri; University of Toronto
         Shahrokh Valaee; University of Toronto
         Ali Sheikholeslami; University of Toronto
 
  IFS-P4.7: MAXIMALLY SEPARATED AVERAGES PREDICTION FOR HIGH FIDELITY REVERSIBLE DATA HIDING
         Dibakar Hazarika; Indian Institute of Technology Kharagpur
         Sobhan Kanti Dhara; Indian Institute of Technology Kharagpur
         Debashis Sen; Indian Institute of Technology Kharagpur
 
  IFS-P4.8: PREDICTION-ERROR-ORDERING FOR HIGH-FIDELITY REVERSIBLE DATA HIDING
         Ioan Catalin Dragoi; Valahia University of Targoviste
         Dinu Coltuc; Valahia University of Targoviste
 
  IFS-P4.9: A FORMAT-COMPLIANT SELECTIVE SECRET 3D OBJECT SHARING SCHEME BASED ON SHAMIR’S SCHEME
         Sébastien Beugnon; LIRMM/STRATEGIES
         William Puech; LIRMM/Univ. Montpellier
         Jean-Pierre Pedeboy; STRATEGIES