posted by user: wmazurczyk || 6248 views || tracked by 7 users: [display]

IWNS 2010 : Second International Workshop on Network Steganography

FacebookTwitterLinkedInGoogle

Link: http://stegano.net/workshop
 
When Nov 4, 2010 - Nov 6, 2010
Where Nanjing, China
Submission Deadline May 30, 2010
Notification Due Jun 15, 2010
Final Version Due Jul 10, 2010
Categories    steganography   security   covert channels   information hiding
 

Call For Papers

**************************************************************************

Second International Workshop on Network Steganography - IWNS 2010
November 4-6, 2010, Nanjing, China
co-located with
The 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010)

http://stegano.net/workshop

**************************************************************************


Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data
transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of
network protocols and mechanisms, and are expected to be used in secret
communication or information sharing. Now, it becomes a hot topic due to
the wide spread of information networks, e.g., multimedia service
networks and social networks.

This year's workshop's main theme is network anomaly detection.

The workshop is dedicated to capture such areas of research as steganography,
steganalysis, and digital forensics in the meaning of network covert channels,
investigate the potential applications, and discuss the future research topics.
Research themes of the workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues related to network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography
and steganalysis
- New methods for detecting and eliminating network steganography


PAPER SUBMISSION AND PUBLICATION

Papers will be accepted based on peer review and should contain
original, high quality work. All papers must be written in English. A
paper should not exceed 5 pages (two columns IEEE format), including
figures and references with 10-12 point font.

Submission page: TBA

The papers will be published by IEEE Computer Society Press, available
in the conference, and indexed by EI Compendex and ISTP. All published
papers will be included in the IEEE Xplore database.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of some journal.

DATES

Manuscript Due: Extended to May 30, 2010 (extended)
Acceptance Notification: June 15, 2010
Registration Due: July 10, 2010
Final Manuscript Due: July 10, 2010

WORKSHOP CHAIRS

Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

ICAICN 2026   2026 2nd International Conference on Artificial Intelligence and Computer Network
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CNSCT 2026   2026 5th International Conference on Cryptography, Network Security and Communication Technology
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
NET 2026   10th International Conference on Networks and Communications
BIO 2026   8th International Conference on Bioscience & Engineering
IJCI 2026   International Journal on Cybernetics & Informatics
SNLP 2026   7thInternational Conference on Semantic & Natural Language Processing
Neural Network 2025   Call for Chapter Contributions: Neural Network Advancements in the Age of AI
DNLP 2026   7th International Conference on Data Mining and NLP