Program of IWDCF 2017

November 17

On-site Registration9:00—17:00

Training Building(江西警察学院培训楼)

Morning, November 18

Opening Ceremony, Welcome Speech and Taking Photo8:30—9:20

Academic Report Hall(学术报告厅)

Keynote Session:(9:20—11:55

Session Chair: Xianfeng Zhao, Chinese Academy of Sciences

Administration Building, Meeting Room 316(行政楼316会议室)

1. Intelligent Surveillance 9:209:55

Speaker: Wei Qi Yan, Auckland University of Technology, New Zealand

2. I didn’t download the pornography video and I don’t know how it got into my computer” – Can we trust the suspect?9:5510:30

Speaker: Kam Pui Chow, University of Hong Kong, Hong Kong, China

Coffee Break 10:3010:45

3. JPEG Image Forensics10:4511:20

Speaker: Bin Li, Shenzhen Key Laboratory of Media Security, Shenzhen University, China

4. Digital Image/Video Forensics: A Model-based Computer Vision Approach11:2011:55

Speaker: Wei Wang, Institute of Automation, Chinese Academy of Sciences, China

Afternoon, November 18

Session IDigital Forensics14:0015:4020 min/paper

Session Chair: Liping Ding, Chinese Academy of Sciences

Administration Building, Meeting Room 325(行政楼325会议室)

1. Survey of Differential Privacy in Graph Data (Paper 52)

Yuning Song, Feng Yuan, Liping Ding

2. A Framework for Dark Web Threat Intelligence Analysis (Paper 49)

Zhang Xuan, K. P. Chow

3. Risking Assessment of Illegal Fund Raising for P2P lending via Similarity Weight (Paper 8)

Jianying Xiong, Min Tu

4. A Highly Efficient Remote Access Trojan Detection Method (Paper 16)

Xianda Wu, Wei Jiang, Xiang Cui, Chaoge Liu

5. An Improved Encryption Scheme for Traitor Tracing from Lattice (Paper 37)

Qing Ye, Mingxing Hu, Guangxuan Chen, Panke Qin

Coffee Break 15:4016:00

Session IIPublic Security16:0017:0020 min/paper

Session Chair: Kam Pui Chow, University of Hong Kong

Administration Building, Meeting Room 325(行政楼325会议室)

1. Keyframe-Based Vehicle Surveillance Video Retrieval with Deep Feature (Paper 27)

Xiaoxi Liu, Ju Liu, Lingchen Gu

2. Research on Public Transportation System Evaluation Model Based on Fuzzy Cloud Mode (Paper 28)

Min Tu, Shiyang Xu, Mingwei Chen, Jianfeng Xu

3. Analysis of WeChat Subscription Influence Based on Topic Diffusion (Paper 18)

Cong Zhang, Kaiming Liu, Lidong Zhai, Fan Wu, Hui Lu

Session IIIMultimedia Forensics14:0015:2020 min/paper

Session Chair: Wei Lu, Sun Yet-San University

Administration Building, Meeting Room 316(行政楼316会议室)

1. Digital image splicing detection based on Markov features in QDCT and QWT domain (Paper 7)

Ruxin Wang, Wei Lu, Shijun Xiang, Xianfeng Zhao, Jinwei Wang

2. Copy-move Forgery Localization Using Convolutional Neural Networks and CFA Features (Paper 51)

Lu Liu, Yao Zhao, Rongrong Ni

3. A Multi-branch Convolutional Neural Network for Detecting Double JPEG compression (Paper 29)

Bin Li, Hu Luo, Haoxin Zhang, Shunquan Tan, Zhongzhou Ji

4. A Universal Image Forensics of Smoothing Filtering (Paper 43)

Anjie Peng, Gao Yu, Qiong Zhang, Xiangui Kang

Coffee Break 15:2015:40

Session IVSteganography and Steganalysis15:4017:2020 min/paper

Session Chair: Xiaolong Li, Beijing Jiaotong University

Administration Building, Meeting Room 316(行政楼316会议室)

1. Asymmetric Distortion Function for JPEG Steganography using Block Artifact Compensation (Paper 2)

Zichi Wang, Zhaoxia Yin, Xinpeng Zhang

2. Detecting and Distinguishing Adaptive and Non-adaptive Steganography by Image Segmentation (Paper 53)

Jie Zhu, Xianfeng Zhao, Qingxiao Guan

3. Steganalysis of AMR Based on Statistical Features of Pitch Delay (Paper 21)

Yanpeng Wu, Huiji Zhang, Yi Sun, Minghui Chen

4. Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine       (Paper 33)

Ping Zhong, Mengdi Li, Juan Wen, Yiming Xue     

5. Breaking Steganography: Slight Modification with Distortion Minimization (Paper 23)

Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng

Morning, November 19

Session VSystem Security9:0011:2020 min/paper

Session Chair: Guozi Sun, Nanjing University of Posts and Telecommunications

Administration Building, Meeting Room 325(行政楼325会议室)

1. Research on Threat Information Network Based on Link Prediction (Paper 42)

Jin Du, Feng Yuan, Liping Ding, Xuehua Liu, Guangxuan Chen

2. Dynamic Provable Data Possession of Multiple Copies in Cloud Storage Based on Full-node of AVL Tree (Paper 50)

You Li, Min Long, Fei Peng

3. General Construction for Extended Visual Cryptography Scheme Using QR Codes (Paper 19)

Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen

Coffee Break 10:0010:20

4. Bilateral-recursive Region Re-routing Signaling Crankback Scheme in Optical Networks for Real-time Information Warfare (Paper 24)

Panke Qin, Jingru Wu, Guangxuan Chen, Xudong Li, Yongli Tang

5. Research of Register Pressure Aware Loop Optimizations for Compiler (Paper 36)

Xuehua Liu, Feng Yuan, Liping Ding, Jun Ma  

6. A Proposed Secure Trust Strategy for Cross Domain Federation in Cloud    (Paper 38)

Guangxuan Chen, Junchao Fang, Liping Ding, Panke Qin, Jin Du

Session VIWatermarking and Fingerprint9:0010:0020 min/paper

Session Chair: Hongxia Wang, Southwest Jiaotong University

Administration Building, Meeting Room 316(行政楼316会议室)

1. A Cloud-User Watermarking Protocol: Protecting the Right to Be Forgotten for the Outsourced Plain Images   (Paper 4)

Xiaojuan Dong, Weiming Zhang, Xianjun Hu, Keyang Liu

2. Print-Scan Resilient Binary Map Watermarking Based on DCT and Scrambling (Paper 46)

Fei Peng, Shuai-Ping Wang, Min Long

3. Fingerprint Image Hashing Based on Minutiae Points and Shape Context (Paper 12)

Sani Abdullahi, Hongxia Wang, Asad Malik

Coffee Break 10:0010:10

Session VIIReversible Data Hiding10:1011:5020 min/paper

Session Chair: Fangjun Huang, Sun Yet-San University

Administration Building, Meeting Room 316(行政楼316会议室)

1. Reversible Data Hiding based on Adaptive Block Selection Strategy (Paper 25)

Dan Huang, Fangjun Huang

2. A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation (Paper 44)

Jian Li, Jinwei Wang, Shuang Yu

3. Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation    (Paper 6)

Yuanxin Wu, Wen Diao, Dongdong Hou, Weiming Zhang, Nenghai Yu

4. Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image (Paper 41)

Asad Malik, Hongxia Wang, Han-Zhou Wu, Sani Abdullahi

5. A New Kind of High Capacity Reversible Data Hiding Method (Paper 32)

Bin Ma, Yun Qing Shi