posted by user: nidhirastogi81 || 7108 views || tracked by 14 users: [display]

WIFS 2016 : 8th IEEE International Workshop on Information Forensics and Security (WIFS)


When Dec 4, 2016 - Dec 7, 2016
Where Abu Dhabi, UAE
Submission Deadline Aug 5, 2016
Notification Due Sep 25, 2016
Final Version Due Oct 21, 2016
Categories    forensics   security   information   computer science

Call For Papers

In its 2016 edition, the IEEE International Workshop on Information Forensics and Security will continue to adhere to its earlier established wide scope, covering various aspects of forensics and information security. We invite potential authors to submit articles on the following topics but will not be limited to only these.

Forensics: evidence recovery; evidence validation; media forensics; source attribution; incident response; and counter forensics
Information and system security: authentication, vulnerability discovery/assessment; malware analysis; cyber-physical systems; mobile and intelligent devices; and physical layer fingerprinting
Biometrics: new biometric modalities; pattern recognition; multimodal decision 
making; and feature extraction
Multimedia content security: cryptography for multimedia; hashing; and data hiding
Steganography and covert communications
Hardware security: hardware trojans; PUFS; and anti-counterfeiting
Network traffic analysis
Surveillance: tracking; person (re-)identification; crowd analysis; and anti-surveillance 
and de-identification
Sousvelliance and anti-sousveillance: users collecting data from other users instead of authorities; possibilities and risks.*
Privacy in data analytics
Privacy in the Internet of everything

Submission of Papers

Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For questions contact WIFS’16 Technical Program Chairs at


The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.

Tutorial Proposals Submission

Up to four tutorials will be scheduled for the first day of the conference, Sunday December 4, 2016. Prospective tutorial contributors are encouraged to submit a tutorial proposal with the tutorial title, the presenters’ name, affiliation, and brief CV, along with the detailed structure of the tutorial to the Tutorials Chair at

Demo and Ongoing Work Proposals

This session will provide both academic researchers and industrial exhibitors to showcase innovative implementations, systems and technologies demonstrating new ideas in the field. We encourage both the submission of early research prototypes and interesting mature systems. Formal proposals must be accompanied by a description of the work or demo to be presented. All material has to be submitted to the Demo Session Chair at

Submission of SPL and TIFS Papers

Authors of IEEE Signal Processing Letters (SPL) and IEEE Transactions on Information Forensics and Security (TIFS) papers will be given the opportunity to present their work at WIFS 2015, subject to space availability and approval by the WIFS Technical Program Chairs. Proposals have to be submitted to the Technical Program Chairs at

. .

Related Resources

ICCC--IEEE, Ei Compendex and Scopus 2018   2018 4th IEEE International Conference on Computer and Communications (ICCC 2018)--Ei Compendex and Scopus
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
ASYNC 2018   24st IEEE International Symposium on Asynchronous Circuits and Systems
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
APCCAS--IEEE, Ei and Scopus 2018   IEEE--2018 14th Asia Pacific Conference on Circuits and Systems (APCCAS 2018)--Ei Compendex and Scopus
SciSec 2018   The 1st International Conference on Science of Cyber Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ICAISE--IEEE, EI and Scopus 2018   2018 International Conference on Artificial Intelligence and Software Engineering (ICAISE 2018)--IEEE, EI Compendex and Scopus