posted by user: nidhirastogi81 || 3844 views || tracked by 14 users: [display]

WIFS 2016 : 8th IEEE International Workshop on Information Forensics and Security (WIFS)


When Dec 4, 2016 - Dec 7, 2016
Where Abu Dhabi, UAE
Submission Deadline Aug 5, 2016
Notification Due Sep 25, 2016
Final Version Due Oct 21, 2016
Categories    forensics   security   information   computer science

Call For Papers

In its 2016 edition, the IEEE International Workshop on Information Forensics and Security will continue to adhere to its earlier established wide scope, covering various aspects of forensics and information security. We invite potential authors to submit articles on the following topics but will not be limited to only these.

Forensics: evidence recovery; evidence validation; media forensics; source attribution; incident response; and counter forensics
Information and system security: authentication, vulnerability discovery/assessment; malware analysis; cyber-physical systems; mobile and intelligent devices; and physical layer fingerprinting
Biometrics: new biometric modalities; pattern recognition; multimodal decision 
making; and feature extraction
Multimedia content security: cryptography for multimedia; hashing; and data hiding
Steganography and covert communications
Hardware security: hardware trojans; PUFS; and anti-counterfeiting
Network traffic analysis
Surveillance: tracking; person (re-)identification; crowd analysis; and anti-surveillance 
and de-identification
Sousvelliance and anti-sousveillance: users collecting data from other users instead of authorities; possibilities and risks.*
Privacy in data analytics
Privacy in the Internet of everything

Submission of Papers

Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For questions contact WIFS’16 Technical Program Chairs at


The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.

Tutorial Proposals Submission

Up to four tutorials will be scheduled for the first day of the conference, Sunday December 4, 2016. Prospective tutorial contributors are encouraged to submit a tutorial proposal with the tutorial title, the presenters’ name, affiliation, and brief CV, along with the detailed structure of the tutorial to the Tutorials Chair at

Demo and Ongoing Work Proposals

This session will provide both academic researchers and industrial exhibitors to showcase innovative implementations, systems and technologies demonstrating new ideas in the field. We encourage both the submission of early research prototypes and interesting mature systems. Formal proposals must be accompanied by a description of the work or demo to be presented. All material has to be submitted to the Demo Session Chair at

Submission of SPL and TIFS Papers

Authors of IEEE Signal Processing Letters (SPL) and IEEE Transactions on Information Forensics and Security (TIFS) papers will be given the opportunity to present their work at WIFS 2015, subject to space availability and approval by the WIFS Technical Program Chairs. Proposals have to be submitted to the Technical Program Chairs at

. .

Related Resources

MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
ICML 2017   34th International Conference on Machine Learning
SoICT 2017   The Eighth Interntional Symposium on Information and Communication Technology
ICCV 2017   International Conference on Computer Vision
ICONIP 2017   International Conference on Neural Information Processing
ICCNS - Ei 2017   ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex
ICSRS - Ei 2017   2017 2nd International Conference on System Reliability and Science (ICSRS 2017)--IEEE, Ei Compendex and Scopus
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing
icicci 2017   The IEEE International Conference on Innovations in Control, Communication and Information Systems (ICICCI-2017)