IH: Information Hiding



Past:   Proceedings on DBLP

Future:  Post a CFP for 2013 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
IH 2012 14th Information Hiding Conference
May 15, 2012 - May 18, 2012 Berkeley, California Feb 5, 2012
IH 2011 13th Information Hiding Conference
May 18, 2011 - May 20, 2011 Prague, Czech Republic Jan 31, 2011
IH 2010 12th Information Hiding Conference
Jun 28, 2010 - Jun 30, 2010 Calgary, Alberta, Canada Mar 13, 2010
IH 2009 11th Information Hiding
Jun 7, 2009 - Jun 10, 2009 Darmstadt, Germany Feb 1, 2009

Present CFP : 2012


Berkeley, California

Email: organizers@ihconference.org
Web: http://www.ihconference.org

For many years, Information Hiding has captured the imagination of researchers.
Digital watermarking and steganography protect information, conceal secrets or
are used as core primitives in digital rights management schemes. Steganalysis
and forensics pose important challenges to digital investigators and privacy
techniques try to hide relational information such as the actors' identities in
anonymous communication systems. These and other topics share the notion that
security is defined by the difficulty to make (or avoid) inference on certain
properties of host data, which therefore has to be well understood and modeled.

Current research themes include:
* Anonymity and privacy
* Covert/subliminal channels
* Digital rights management
* Fingerprinting and embedding codes
* Multimedia and document security
* Multimedia forensics and counter forensics
* Novel applications of information hiding
* Other data hiding domains (e.g. text, software, etc.)
* Security metrics for information hiding
* Steganography and steganalysis
* Theoretical aspects of information hiding and detection
* Watermarking (algorithms, security, attacks)

Continuing a successful series that brought together experts in these closely
linked research areas, the

14th edition of Information Hiding will be held in Berkeley, California.

Interested parties are invited to submit novel papers on research and practice
which are related to the above areas of interest. Claims about information
hiding technology, such as robustness or steganographic security, must be backed
by strong evidence in the paper (such as mathematical proofs, statistical
modeling and/or extensive testing).

Submissions must not substantially overlap papers that have been published or
that are simultaneously submitted to a journal or a conference with proceedings.
Submissions should follow the Springer Lecture Notes in Computer Science (LNCS)
format and should be no more than 15 pages including the bibliography and
well-marked appendices. Accepted papers have to be presented at the workshop and
will appear in the proceedings published by Springer in the LNCS series. Authors
can submit their manuscripts on-line on the conference website where detailed
instructions are provided. The submitted papers should be anonymized avoiding
obvious references for a double-blind review process.


Submission deadline February 5, 2012
Notification of acceptance April 1, 2012
Camera-ready papers for pre-proceedings April 29, 2012
Conference May 15-18, 2012
Camera-ready papers for post-proceedings July 1, 2012


* Dipak Ghosal, UC Davis, USA (general chair)
* Matthias Kirchner, ICSI Berkeley (program chair)

* Ross Anderson, University of Cambridge, UK
* Mauro Barni, Universita di Siena, Italy
* Patrick Bas, CNRS, France
* Rainer Boehme, University of Muenster, Germany
* Francois Cayre, GIPSA-lab/Grenoble INP, France
* Ee-Chien Chang, National University of Singapore, Singapore
* Christian Collberg, University of Arizona, USA
* Ingemar J. Cox, University College London, UK
* Scott Craver, SUNY Binghamton, USA
* George Danezis, Microsoft Research Cambridge, UK
* Gwenael Doerr, Technicolor, France
* Tomas Filler, Digimarc Corp., USA
* Jessica Fridrich, SUNY Binghamton, USA
* Neil F. Johnson, Booz Allen Hamilton and JJTC, USA
* Stefan Katzenbeisser, TU Darmstadt, Germany
* Andrew Ker, University of Oxford, UK
* Darko Kirovski, Microsoft Research, USA
* John McHugh, University of North Carolina and RedJack, LLC., USA
* Ira S. Moskowitz, Naval Research Laboratory, USA
* Tomas Pevny, Czech Technical University, Czech Republic
* Ahmad-Reza Sadeghi, TU Darmstadt, Germany
* Rei Safavi-Naini, University of Calgary, Canada
* Berry Schoenmakers, TU Eindhoven, The Netherlands
* Kaushal Solanki, Eyenuk, LLC, USA
* Kenneth Sullivan, Mayachitra Inc., USA
* Paul Syverson, Naval Research Laboratory, USA

Related Resources

IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
RAID 2017   20th International Symposium on Research in Attacks, Intrusions and Defenses
ACM--ICCIP 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
AVSS 2017   14-th IEEE International Conference on Advanced Video and Signal-Based Surveillance
CUING 2017   International Workshop on Criminal Use of Information Hiding
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
ICCIP - EI, ACM 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
COMIT 2017   International Conference on Computer Science and Information Technology
EuropeanSeC 2017   2017 European Security Conference