

{"id":326,"date":"2017-06-06T13:52:55","date_gmt":"2017-06-06T11:52:55","guid":{"rendered":"https:\/\/project.inria.fr\/wifs2017\/?page_id=326"},"modified":"2017-11-27T17:17:04","modified_gmt":"2017-11-27T16:17:04","slug":"demo-sessions","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/wifs2017\/program\/demo-sessions\/","title":{"rendered":"IEEE TIFS, On-going Works Posters and Demos Session"},"content":{"rendered":"<p><strong>IEEE Transactions on Information Forensics Security Posters<\/strong><\/p>\n<ul>\n<li><em>Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection<\/em>, C. M. Pun, C. Yan and X. C. Yuan, in IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 377-391, Feb. 2017.<\/li>\n<li><em>Quaternion-Based Image Hashing for Adaptive Tampering Localization<\/em>, C. P. Yan, C. M. Pun and X. C. Yuan, in IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2664-2677, Dec. 2016.<\/li>\n<li><i class=\"\">Authorship Attribution for Social Media Forensics,\u00a0<\/i>A. Rocha, W. J. Scheirer, C. W. Forstall, T. Cavalcante, A. Theophilo, B. Shen, A. R. B. Carvalho, and E. Stamatatos, in IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 5-33, Jan. 2017.<\/li>\n<li><em>User Authentication via PRNU-Based Physical Unclonable Functions<\/em>, D. Valsesia, G. Coluccia, T. Bianchi and E. Magli, in IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1941-1956, Aug.\u00a02017.<\/li>\n<\/ul>\n<p><strong>On-going Works Posters<\/strong><\/p>\n<ul>\n<li><em>Your Browser is the Key:\u00a0Multi-Factor Authentication\u00a0With Spoof-Resistant Browser\u00a0Fingerprinting<\/em>, A. Garel, G. Le Guelvouit<\/li>\n<li><em>Localization of misleading content in images from social networks<\/em>, C. Maigrot, E. Kijak, V. Claveau<\/li>\n<li><em>Content-based Hash for Document Integrity Check<\/em>,\u00a0I. Tkachenko and P. Gomez-Kr\u00e4mer<\/li>\n<li><em>ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks<\/em>,\u00a0Moreno Ambrosin, Paolo Braca, Mauro Conti, Riccardo Lazzeretti<\/li>\n<li><em>Securely and privately verifiable protest<\/em>, Daniel Bosk, Sonja Buchegger, S\u00e9bastien Gambs<\/li>\n<li><em>BOOST: Break Our Optical Security Technology<\/em>, Behrooz Razeghi, Boris Skoric, Slava Voloshynovskiy<\/li>\n<\/ul>\n<p><strong>Demos<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/ampedsoftware.com\" target=\"_blank\" rel=\"noopener\">Amped Software<\/a>: Forensic Image and Video Enhancement and Authentication<\/li>\n<li><a href=\"https:\/\/fr.ariadnext.com\" target=\"_blank\" rel=\"noopener\">AriadNEXT<\/a>: Identity Document Verification<\/li>\n<li><a href=\"https:\/\/b-com.com\/en\/bcom-ultra-marker\" target=\"_blank\" rel=\"noopener\">b-com<\/a>:\u00a0Forensics Watermarking for 360 Degrees videos<\/li>\n<li><a href=\"https:\/\/castlabs.com\" target=\"_blank\" rel=\"noopener\">castLabs<\/a>: Over-The-Top Forensic Watermarking for Enhanced Content Protection<\/li>\n<li><a href=\"http:\/\/www.hpl.hp.com\/research\/\" target=\"_blank\" rel=\"noopener\">HP Labs<\/a>: \u00a0Mobile Forensic Imaging<\/li>\n<li><a href=\"https:\/\/www.ictlab.srl\" target=\"_blank\" rel=\"noopener\">iCTLab SRL<\/a>: Web-based Framework for Social Image Ballistics<\/li>\n<li><a href=\"https:\/\/team.inria.fr\/tamis\/\" target=\"_blank\" rel=\"noopener\">Inria Tamis<\/a>:\u00a0Malware Detection by Behavioral Analysis<\/li>\n<li><a href=\"http:\/\/lamark.io\" target=\"_blank\" rel=\"noopener\">Lamark<\/a>: Automated Image Copyright Reporting in Printed Media<\/li>\n<li><a href=\"http:\/\/www.toothpic.eu\" target=\"_blank\" rel=\"noopener\">ToothPic<\/a>: PRNU Compression for Image Retrieval and User Authentication<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>IEEE Transactions on Information Forensics Security Posters Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection, C. M. Pun, C. Yan and X. C. Yuan, in IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 377-391, Feb. 2017. Quaternion-Based Image Hashing for Adaptive Tampering Localization, C. P. Yan,\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/wifs2017\/program\/demo-sessions\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1161,"featured_media":0,"parent":522,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-326","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/users\/1161"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/comments?post=326"}],"version-history":[{"count":24,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/326\/revisions"}],"predecessor-version":[{"id":609,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/326\/revisions\/609"}],"up":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/pages\/522"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/wifs2017\/wp-json\/wp\/v2\/media?parent=326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}