Mon, Sept. 19 9.15 - 10.30: Keynote 1 - Christian Cachin - 'From Cryptography to Steganography':
Steganography concerns methods to hide information by embedding a
secret message within another seemingly harmless message, which is
communicated over an open network. As the goal of steganography is
to
hide the presence of a message, it can be seen as the complement of
cryptography, whose goal is to hide the content of a communicated
message. A formal model of steganography has recently been developed,
and it confirms this intuition. In this talk, I will present the
theory of steganography, its development, and its applications.
Christian Cachin graduated in Computer Science from ETH Zürich
(1993). From 1992-1993 he worked at ABB Corporate Research on theory and
applications of artificial neural networks. From 1993-1997 he was at ETH
Zürich performing research in cryptography and information theory and obtained his Ph.D. in Computer Science from ETH Zürich in 1997. From 1997
to 1998 he was postdoctoral researcher at the MIT Laboratory for Computer
Science, with Prof. Ron Rivest, one of the inventors of public-key
cryptography. He has been a Research Staff Member at IBM Zurich Research
Lab since 1998, where he was involved in a number of projects in security
and distributed systems.
He has authored more than thirty publications in computer science, holds
several patents on secure protocols and cryptographic algorithms, and has
been a member of several program committees of technical conferences. He
is a Director of the International Association for Cryptologic Research
(IACR).
Together with Jan Camenisch he was program chair and organized
Eurocrypt 2004. His current research interests are cryptography, network
security, fault tolerance and distributed systems.
Mon, Sept. 19 11.00 - 12.30: Applied Cryptography
Chair: Christian Cachin
018. Fast Contract Signing with Batch Oblivious Transfer. Lubica Stanekova and Martin Stanek,
Slovak University of Technology, Slovakia and Comenius University, Slovakia
027. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation. Stefan Tillich and Johann Großschädl and Alexander Szekely,
Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria
137. Self-Healing Key Distribution Schemes with Sponsorization. Germán Sáez,
Universitat Politècnica de Catalunya
Mon, Sept. 19 13.30 - 15.30: DRM & E-commerce
Chair: Ton Kalker
023. Effective Protection Against Phishing and Web Spoofing. Rolf Oppliger, eSECURITY Technologies, Switzerland,
Sebastian Gajek, Ruhr University Bochum, Germany
031. Identity based DRM: Personal Entertainment Domain. Paul Koster, Frank Kamperman, Peter Lenoir and Koen Vrielink,
Philips Research
040. Trust and rights in multimedia content management systems. Jaime Delgado, Víctor Torres, Silvia Llorente, Eva Rodríguez,
Universitat Pompeu Fabra, Barcelona
043. Signature Amortization Using Multiple Connected Chains. Qusai Abuein (1) , Susumu Shibusawa (2),
(1) Graduate School of Science and Engineering, Ibaraki University, Japan,
(2) Dept. of Computer and Information Sciences Ibaraki University, Japan
Mon, Sept. 19 13.30 - 15.30: Special Session XML Security
Chair: Rüdiger Grimm
1. Experience XML Security. Dominik Schadow, FH Furtwangen and SALT Solutions GmbH Munich, Germany
2.
Using the XML Key Management Specification (and breaking X.509 rules as you go). Stephen Farrel and Jose Kahan
3.
How to make a Federation manageable. Christian Geuer-Pollmann, University of Siegen and Microsoft EMIC
4.
XML Signatures in an Enterprise Service Bus Environment. Eckehard Hermann and Dieter Kessler, Software AG Darmstadt, Germany
Mon, Sept. 19 16.00 - 17.30: XML Security
Chair: Rüdiger Grimm
050. Secure XMaiL or How to get rid of legacy code in secure E-Mail applications. Lars Ewers, Wolfgang Kubbilun, Lijun Liao, Jörg Schwenk,
MediaSec Technologies GmbH and Ruhr-University Bochum
091. Integrating XML Linked Time-stamps in OASIS Digital Signature Services. Ana Isabel González-Tablas Ferreres,
Karel Wouters,
KU Leuven
129. Trustworthy Verification and Visualisation of Multiple XML-Signatures. Sebastian Gajek and Wolfgang Kubbilun and Joerg Schwenk and Michael Psarros,
Horst Görtz Institute for IT-Security, Ruhr-Universität Bochum and Mediasec Technologies GmbH
Tuesday Sept. 20:
Tue, Sept. 20 9.15 - 10.30: Keynote 2 - Ton Kalker - 'About the Architecture of DRM Systems':
Firstly, in this talk we give an overview of the architecture of modern
DRM systems. Secondly, we discuss some new issues in DRM development,
including DRM interoperability, person-centric DRM and extensions to the
broadcast domain.
Ton was born in The Netherlands in 1956. He received his M.S. degree in
mathematics in 1979 from the University of Leiden, The Netherlands. From
1979 until 1983, while he was a Ph.D. candidate, he worked as a Research
Assistant at the University of Leiden. From 1983 until December 1985 he
worked as a lecturer at the Computer Science Department of the Technical
University of Delft. In January 1986 he received his Ph.D. degree in
Mathematics.
In December 1985 he joined the Philips Research Laboratories Eindhoven.
Until January 1990 he worked in the field of Computer Aided Design. He
specialized in (semi) automatic tools for system verification. He was a
member of the Processing and Architectures for Content MANagement group (PACMAN)
of Philips Research, working on security of multimedia content, with an
emphasis on watermarking and fingerprinting for video and audio. In
November 1999 he became a part-time professor in the Signal Processing
Systems group of Jan Bergmans in the area of 'signal processing methods
for data protection'. Currently is at Hewlett-Packet Laboratories in
Palo Alto leading a small group on Media Security.
He is a Fellow of the IEEE for his contributions to practical
applications of watermarking, in particular watermarking for DVD-Video
copy protection. He co-founded the IEEE Transactions on Information
Forensics and Security.
His other research interests include wavelets, multirate signal
processing, motion estimation, psycho physics, digital video compression
and medical image processing.
Tue, Sept. 20 11.00 - 12.30: Media Encryption
Chair: Dominik Engel
021. A Key Embedded Video Codec for Secure Video Multicast. Hao Yin, Chuang Lin, Feng Qiu, Xiaowen Chu, Geyong Min,
Computer Science and Technology Department, Tsinghua University
070. Puzzle - A Novel Video Encryption Algorithm. Fuwen Liu and Hartmut Koenig,
Department of Computer Science, BTU, Cottbus
082. Selective Image Encryption using JBIG. Roman Pfarrhofer and Andreas Uhl,
Carinthia Tech Institute (CTI) and Salzburg University
Tue, Sept. 20 11.00 - 12.30: Network Security
Chair: Bart de Decker
020. Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-hoc Networks. Huafei Zhu, Feng Bao, Tieyan Li,
Department of Information Security, Institute for Infocomm Research, A-Star
090. Polymorphic Code Detection with GA optimized Markov Models. Udo Payer and Stefan Kraxberger,
Institute of Applied Information Processing and Communications
119. A Secure Context Management for QoS-aware Vertical Handovers in 4G Networks. Minsoo Lee and Gwanyeon Kim and Sehyun Park,
School of Electrical & Electronics Engineering, Chung-Ang University
Tue, Sept. 20 14.00 - 15.30: Multimedia Security
Chair: Andreas Uhl
028. On reversibility of random binning techniques: multimedia perspectives. Sviatoslav Voloshynovskiy-1, Oleksiy Koval-1, Emre Topak-1, Jose Emilio Vila-Forcen-1 and Pedro Comesana Alfaro-2, and Thierry Pun-1,
1-CUI-University of Geneva, Stochastic Image Processing Group, Switzerland,
2-Signal Processing in Communications Group Signal Theory &
Communications Department, University of Vigo, Spain
032. A Graph-Theoretic Approach to Steganography. Stefan Hetzl and Petra Mutzel,
Vienna University of Technology and University of Dortmund
106. Non-Interactive Watermark Detection for a Correlation-Based Watermarking Scheme. Andre Adelsbach and Markus Rohe and Ahmad-Reza Sadeghi,
Ruhr Universität Bochum, Germany
Tue, Sept. 20 14.00 - 15.30: Work in Progress Session 1 - Poster Format
143. Biometrics: Different approaches for using Gaussian Mixture Models in Handwriting. Sascha Schimke, Athanosios Valsamakis, Claus Vielhauer, Yannis Stylianou,
Universitaet Magdeburg
108. INVUS: INtelligent VUlnerability Scanner. Türker Akyüz, Ibrahim Sogukpinar,
Gebze Institute of Technology, Computer Engineering
138. Personal Rights Management - enabling privacy rights in digital online
content. Mina Deng, Lothar Fritsch, Klaus Kursawe,
KU Leuven, Uni Frankfurt
107. Flexible Traitor Tracing for Anonymous Attacks.
Hongxia Jin and Jeffery Lotspiech,
IBM Almaden Research Center
133. Efficient Key Distribution for Closed Meetings in the Internet. Fuwen Liu and Hartmut Koenig,
TU Cottbus
Tue, Sept. 20 16.00 - 17.30: Privacy
Chair: Jana Dittmann
030. Video Surveillance: A Distributed Approach to protect Privacy. Martin Schaffer and Peter Schartner,
University of Klagenfurt, Austria
037. Privacy-Preserving Electronic Health Records. Liesje Demuynck (KU Leuven, Belgium), Bart De Decker (KU Leuven, Belgium)
081. Using XACML for Privacy Control in SAML-based Identity Federations. Wolfgang Hommel,
Leibniz Computing Center Munich
Tue, Sept. 20 16.00 - 17.30: Mobile Security
Chair: Stefan Katzenbeisser
007. Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets. Wiebke Dresp,
Department of Information Systems,
University of Regensburg, Germany
039. Assessment of Palm OS susceptibility to malicious code threats. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen,
Distrinet research group, Department of Computer Science,
K.U.Leuven
Celestijnenlaan 200A, B-3001 Leuven, Belgium
085. Implementation of Credit-Control Authorization with embedded the Mobile IPv6 Authentication. HyunGon Kim and ByeongKyun Oh,
Mokpo National University and Mokpo National University
Wednesday Sept. 21:
Wed, Sept. 21 9.15 - 10.30: Keynote 3
Ingemar J. Cox - 'Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation
watermarking':
Ingemar Cox is currently Professor and Chair of Telecommunications in the Departments
of Electronic Engineering and Computer Science at University College
London as well as Director of UCL's Adastral Park Postgraduate
Campus. He is currently a holder of a Royal Society Wolfson Fellowship.
He received his B.Sc. from University College London and Ph.D. from
Oxford University. He was a member of the Technical Staff at AT\&T Bell
Labs at Murray Hill from 1984 until 1989 where his research interests
were focused on mobile robots. In 1989 he joined NEC Research
Institute in Princeton, NJ as a senior research scientist in the
computer science division. At NEC, his research shifted to
problems in computer vision and he was responsible for creating the
computer vision group at NECI. He has worked on problems to do with
stereo and motion correspondence and multimedia issues of
image database retrieval and watermarking. In 1999,
he was awarded the IEEE Signal Processing Society Best Paper Award
(Image and Multidimensional Signal Processing Area) for a paper he
co-authored on watermarking. From 1997-1999, he served
as Chief Technical Officer of Signafy, Inc, a subsiduary of NEC
responsible for the commercialization of watermarking.
Between 1996 and 1999, he
led the design of NEC's watermarking proposal for DVD video disks and
later colloborated with IBM in developing the technology behind the
joint "Galaxy" proposal supported by Hitachi, IBM, NEC, Pioneer and
Sony.
In 1999, he
returned to NEC Research Institute as a Research Fellow.
He is a senior member of the IEEE, a Fellow of the IEE and a Fellow of
the Royal Society for Arts and Manufactures. He is on the editorial
board of the Pattern Analysis and Applications Journal and an
associate editor of the IEEE Trans. on Information Forensics and Security.
He is co-author of a book entitled "Digital
Watermarking" and the co-editor of two books, `Autonomous Robots
Vehicles' and `Partitioning Data Sets: With Applications to
Psychology, Computer Vision and Target Tracking'.
Wed, Sept. 21 11.00 - 12.30: Biometrics & Access Control
Chair: Martin Steinebach
064. Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. Andrea Oermann, Claus Vielhauer, Jana Dittmann,
Otto-von-Guericke University Magdeburg, Germany
092. Decentralised Access Control in 802.11 Networks. Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno,
Politecnico di Torino, Dipartimento di Automatica e Informatica
124. Multimodal Biometrics for Voice and Handwriting. Claus Vielhauer and Tobias Scheidat,
Advanced Multimedia and Security Lab, Otto-von-Guericke University Magdeburg
Wed, Sept. 21 11.00 - 12.30: Work in Progress Session 2 - Poster Format
008. Blind Statistical Steganalysis of Additive Steganography Using Wavelet
Higher Order Statistics. Taras Holotyak and Jessica Fridrich and Sviatoslav Voloshynovskiy,
Department of Electrical and Computer Engineering, SUNY at Binghamton, USA and
Department of Computer Science, University of Geneva, Switzerland
078. Applying LR Cube Analysis to JSteg Detection. Kwangsoo Lee and Changho Jung and Sangjin Lee and HyungJun Kim and Jongin Lim,
CIST Korea
034. Digital signatures based on invertible watermarks for video authentication. Enrico Hauer and Jana Dittmann,
Fraunhofer Institute IPSI, 64293 Darmstadt, Germany and Otto-von-Guericke University
036. A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents. R. Villan, S. Voloshynovskiy, F. Deguillaume, Y. Rytsar, O. Koval, E. Topak, E. Rivera, and T. Pun,
Computer Vision and Multimedia Laboratory,
Dept. of Computer Science,
University of Geneva
077. Semantically Extended Digital Watermarking Model for Multimedia Content. Huajian Liu and Lucilla Croce Ferri and Martin Steinebach,
Fraunhofer IPSI - Integrated Publication and Information Systems Institute
088. An Architecture for Secure Policy Enforcement in E-Government Services Deployment. Nikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland,
Institute for Data Communication Systems, University of Siegen, Germany
098. Some Critical Aspects of the PKIX TSP.
Cristian Marinescu and Nicolae Tapus,
University "Politehnica" Bucharest
110. Motivations for a theoretical approach to WYSIWYS.
Antonio Lioy and Gianluca Ramunno and Marco Domenico Aime,
and Massimiliano Pala,
Politecnico di Torino, Dipartimento di Automatica e Informatica