Conference programme
Day 1 – September 25th, 2013
08:00 Opening of the conference registration office09:00-10:00 Keynote Prof. Sabah A. Jassim (University of Buckingham, UK): Face Recognition from Degraded Images - Super resolution approach by non-Adaptive Image-independent Compressive sensing Dictionaries10:00-10:30 Coffee Break10:30-12:20 Biometrics (30 min per research paper, 20 min for work-in-progress papers) – Session Chair: Claus Vielhauer
Towards a Standardised Testsuite to Assess Fingerprint Matching Robustness: The StirMark Toolkit - Cross-Feature Type Comparisons (research paper)
Jutta Hämmerle-Uhl, Michael Pober, and Andreas Uhl
Achieving Anonymity Against Major Face Recognition Algorithms (research paper)
Benedikt Driessen and Markus Dürmuth
Client-Side Biometric Verification based on Trusted Computing (research paper)
Jan Vossaert, Jorn Lapon, Bart De Decker, and Vincent Naessens
Security of features describing the visual appearance of handwriting samples using the Bio-Hash algorithm of Vielhauer against an evolutionary algorithm attack (work-in-progress papers)
Andreas Hasselberg, Rene Zimmermann, Christian Kraetzer, Tobias Scheidat, Claus Vielhauer, and Karl Kümmel
12:20-13:30 Lunch Break
13:30-14:30 Applied Cryptography (30 min each)– Session Chair: Ronny Merkel
Dedicated hardware for attribute based credential verification (research paper)
Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, and Lieven De Strycker
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption (research paper)
Y. Sreenivasa Rao and Ratna Dutta
14:30-15:00 Coffee Break
15:00-16:00 Poster session (10 min each plus 10 min announcement for the evening event) Poster will be presented as poster during the evening event for detailed discussion with authors) – Session Chair: Stefan Kiltz
Authentication with Time Features for Keystroke Dynamics on Touchscreens
Matthias Trojahn, Florian Arndt, and Frank Ortmeier
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans
Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications
Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer
SocACL: An ASP-Based Access Control Language for Online Social Networks
Edward Caprin and Yan Zhang
Watermark Resynchronization: An Efficient Approach based on Eulerian Tours around a Robust Skeleton
Konstantinos Raftopoulos, Klimis Ntalianis, Paraskevi Tzouveli, Nicolas Tsapatsoulis, Aleatha Parker-Wood and Marin Ferecatu
17:00-21:00 Evening Event: Poster and Demonstration Session
Day 2 – September 26th, 2013
09:00-10:00 Keynote Prof. Sachar Paulus (Brandenburg University of Applied Sciences, Germany): Trustworthy software development
10:00-10:30 Coffee Break
10:30-12:30 Digital Watermarking, Steganography and Forensics (20 min each) – Session Chair: Christian Krätzer
Video Watermarking Scheme with High Payload and Robustness against Geometric Distortion (work-in-progress papers)
Huajian Liu, Yiyao Li, Martin Steinebach
Use of Linear Error-Correcting Subcodes in Flow Watermarking for Channels with Substitution and Deletion Errors (work-in-progress papers)
Boris Assanovich, William Puech and Iuliia Tkachenko
Detecting Resized Double JPEG Compressed Images - Using Support Vector Machine (work-in-progress papers)Hieu Cuong Nguyen and Stefan Katzenbeisser
Pit Stop for an Audio Steganography Algorithm (work-in-progress papers)Andreas Westfeld, Jürgen Wurzer, Christian Fabian, and Ernst Piller
Robust Hash Algorithms for Text (work-in-progress papers)
Martin Steinebach, Peter Klöckner, Nils Reimers, Dominik Wienand, Patrick Wolf
Hardware Based Security Enhanced Direct Memory Access (work-in-progress papers)Marcel Eckert, Igor Podebrad, and Bernd Klauer
12:30-13:40 Lunch Break
13:40- 15:00 Social Network Privacy, Security and Authentication (20 min each) – Session Chair: Mario Hildebrandt
Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity (work-in-progress papers)Takayuki Yamada, Seiichi Gohshi, Isao Echizen
E-learning of IT Security Threats: a Game Prototype for Children (work-in-progress papers)Jana Fruth, Carsten Schulze, Marleen Rohde, and Jana Dittmann
Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation (work-in-progress papers)Gábor György Gulyás, Sándor Imre
An equivalent access based approach for building collaboration model between distinct access control models (work-in-progress papers) Xiaofeng Xia