posted by system || 6736 views || tracked by 3 users: [display]

IH&MMSec 2014 : ACM Information Hiding and Multimedia Security Workshop

FacebookTwitterLinkedInGoogle

Link: http://www.ihmmsec.org/
 
When Jun 11, 2014 - Jun 13, 2014
Where Salzburg, Austria
Submission Deadline Jan 17, 2014
Notification Due Mar 31, 2014
Final Version Due May 2, 2014
Categories    multimedia
 

Call For Papers

Last year, the 1st ACM Information Hiding and Multimedia Security Workshop 2013 successfully merged the Information Hiding (IH) and the ACM Multimedia and Security (ACM MMSec) communities. This year's 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) continues this endeavour, providing a platform to discuss recent advances in both fields, benefitting from their synergies.

The 2nd Information Hiding and Multimedia Security Workshop focusses on both, information hiding topics such as watermarking, steganography and steganalysis, anonymity, privacy, hard-to-intercept communications, and covert/subliminal channels as well as multimedia security topics such as data hiding, robust/perceptual hashing, biometrics, video surveillance, and multimedia forensics.

The 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) will be held at the Parkhotel Brunauer in Salzburg, Austria, on June 11-13, 2014. You are invited to submit short papers (4-6 pages, showing work in progress with limited test sets for example or just giving indications or tendencies) and full papers (10-12 pages, with general and detailed research contributions).

Topics include, but are not limited to:

• Integrity verification of digital content
• Source device identification and linking
• Multimedia watermarking, fingerprinting and identification
• Multimedia network protection, privacy and security
• Multimedia authentication and encryption
• Signal Processing in the Encrypted Domain
• Steganography and steganalysis
• Biometrics
• Application of smart cards and ID cards
• Secure multimedia system design and protocol security
• Media Forensics
• Crime Scene Forensics
• Security evaluation and benchmarks
• Emerging applications
• Privacy, policy and legal issues as well as their interaction with technological development

Related Resources

ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IJESA 2025   International Journal of Embedded Systems and Applications
ICEIT 2026   IEEE--2026 the 15th International Conference on Educational and Information Technology (ICEIT 2026)
JARES 2025   International Journal of Advance Robotics & Expert Systems
SPIE-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
IEEE ICIPMC 2025   IEEE--2025 4th International Conference on Image Processing and Media Computing (ICIPMC 2025)
IVSP 2026   2026 8th International Conference on Image, Video and Signal Processing (IVSP 2026)
IPMV 2026   2026 8th International Conference on Image Processing and Machine Vision (IPMV 2026)
Ei/Scopus-CVCM 2025   2025 6th International Conference on Computer Vision, Communications and Multimedia(CVCM 2025)
SOICT 2025   The 14th International Symposium on Information and Communication Technology