posted by system || 5187 views || tracked by 3 users: [display]

IH&MMSec 2014 : ACM Information Hiding and Multimedia Security Workshop

FacebookTwitterLinkedInGoogle

Link: http://www.ihmmsec.org/
 
When Jun 11, 2014 - Jun 13, 2014
Where Salzburg, Austria
Submission Deadline Jan 17, 2014
Notification Due Mar 31, 2014
Final Version Due May 2, 2014
Categories    multimedia
 

Call For Papers

Last year, the 1st ACM Information Hiding and Multimedia Security Workshop 2013 successfully merged the Information Hiding (IH) and the ACM Multimedia and Security (ACM MMSec) communities. This year's 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) continues this endeavour, providing a platform to discuss recent advances in both fields, benefitting from their synergies.

The 2nd Information Hiding and Multimedia Security Workshop focusses on both, information hiding topics such as watermarking, steganography and steganalysis, anonymity, privacy, hard-to-intercept communications, and covert/subliminal channels as well as multimedia security topics such as data hiding, robust/perceptual hashing, biometrics, video surveillance, and multimedia forensics.

The 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) will be held at the Parkhotel Brunauer in Salzburg, Austria, on June 11-13, 2014. You are invited to submit short papers (4-6 pages, showing work in progress with limited test sets for example or just giving indications or tendencies) and full papers (10-12 pages, with general and detailed research contributions).

Topics include, but are not limited to:

• Integrity verification of digital content
• Source device identification and linking
• Multimedia watermarking, fingerprinting and identification
• Multimedia network protection, privacy and security
• Multimedia authentication and encryption
• Signal Processing in the Encrypted Domain
• Steganography and steganalysis
• Biometrics
• Application of smart cards and ID cards
• Secure multimedia system design and protocol security
• Media Forensics
• Crime Scene Forensics
• Security evaluation and benchmarks
• Emerging applications
• Privacy, policy and legal issues as well as their interaction with technological development

Related Resources

JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
CCNET 2020   7th International Conference on Computer Networks & Communications
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
CLSB 2020   International Conference on Cloud Computing, Security and Blockchain
EI-CGMIP 2020   2020 2nd International Symposium on Computer Graphics, Multimedia and Image Processing (CGMIP 2020)
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
ITAS--EI, Scopus 2021   2021 Information Technology & Applications Symposium (ITAS 2021)--EI Compendex, Scopus
VRIS--SPIE, EI, Scopus 2020   SPIE--2020 2nd International Conference on Virtual Reality and Intelligent System (VRIS 2020)--EI Compendex, Scopus
ACM--ICIET--Ei and Scopus 2021   ACM--2021 9th International Conference on Information and Education Technology (ICIET 2021)--Ei Compendex, Scopus
ACM SAC - DBDM Track 2021   ACM SAC 2021 - Special Track on Databases and Big Data Management (DBDM)