Table of Contents
MM&Sec 2011 Workshop Organization vii
Session 1: Forensics I
Convergence of Digital and Traditional Forensic Disciplines:A First Exemplary Study for Digital Dactyloscopy 1
Mario Hiidebrandt, Stefan Kiltz (Otto-van-Guericke University ofMagdeburg),Ina Grossmann (State Police Headquarters Saxony-Anhalt),Claus Vielhauer (Brandenburg University ofApplied Sciences)
• Seam Carving Estimation Using Forensic Hash 9
Wenjun Lu, Min Wu (University ofMaryland, College Park)
• Exposing Image Forgery with Blind Noise Estimation 15
Ximyu Pan, Xing Zhang, Siwei Lyu (SUNY, Albany)
Session 2: Forensics II
• CFA Pattern Identification of Digital Cameras Using Intermediate Value Counting 21
Chang-Hee Choi, Jung-Ho Choi, Heung-Kyu Lee (KoreaAdvanced Institute ofScience and Technology)
• Latent Fingerprint Detection using a Spectral Texture Feature 27
Tobias Kiertscher, Robert Fischer, Clans Vielhauer (Brandenburg University ofApplied Sciences)
• Malicious Fingerprint Traces:
A Proposal for an Automated Analysis of Printed Amino Acid
Dots using HoughCircles 33
Mario Hiidebrandt, Stefan Kiltz, Jana Dittmann (Otto-van-Guericke University ofMagdeburg),Claus Vielhauer (Brandenburg University ofApplied Sciences)
Session 3: Biometrics
• Evaluation of Binary Pixel Aging Curves of Latent Fingerprint Traces
for Different Surfaces Using a Chromatic White Light (CWL) Sensor 41
Ronny Merkel (Otto-von-Guericke-University ofMagdeburg),
Anja Brautigam (State Police Headquarters ofSaxony-Anhalt),Christian Kraetzer, Jana Dittmann (Otto-von-Guericke-University ofMagdeburg),Claus Vielhauer (Brandenburg University ofApplied Sciences)
• Using Global Knowledge of Users' Typing Traits
to Attack Keystroke Biometrics Templates 51
Abdul Serwadda, Vir V. Phoha, Ankunda Kiremire (Louisiana Tech University)
• Comparative Study on Fusion Strategies for Biometric Handwriting 61
Tobias Scheidat, Claus Vielhauer, Robert Fischer (Brandenburg University ofAppliedSciences)
Session 4: Steganography
• On Dangers of Overtraining Steganography to Incomplete Cover Model 69
Jan Kodovsky, Jessica Fridrich, Vojt5ch Holub (Binghamton University)
• Steganalysis of DCT-Embedding Based Adaptive Steganography and YASS 77
Qingzhong Liu (Sam Houston State University)
• A Square-Root Law for Active Wardens 87
Enping Li, Scott Craver (Binghamton University)
v
Session 5: Protocols
• Semi-automated Communication Protocol Security Verification
for Watermarking - Pros and Cons Illustrated on a Complex Application Scenario 93
Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann
(Otto-von-Guericke University)
• Processing Encrypted Floating Point Signals 103
Martin Franz, Stefan Katzenbeisser (CASED & Technische Universtilat Darmstadt)
• Multi-biometrics Based Crypto-biometric Session Key Generation
and Sharing Protocol 109
Sanjay Kanade, Dijana Petrovska-Delacretaz, BemadetteDorizzi (Institiil TELECOM: TELECOMSudParis)
Session 6: Applications
• Contextualizing Security for Digital Long-Term Preservation 115
Kim Qian, Maik Sbhott, Christian Kraetzer (Otto-von-Guericke University Magdeburg),Matthias Hemmje (University ofHagen)
• Building Multimedia Security Applications in the MPEG ReconfigurableVideo Coding (RVC) Framework 121
Junaid Jameel Ahmad, Shujun Li (University ofKonstanz), Ihab Amer (German University in Cairo),Marco Mattavelli (Ecole Polyteclmique Federate de Lausanne)
Author Index 131
vi