posted by user: PSchoettle || 1079 views || tracked by 2 users: [display]

IH&MMSec 2018 : ACM Workshop on Information Hiding and Multimedia Security


When Jun 20, 2018 - Jun 22, 2018
Where Innsbruck, Austria
Submission Deadline Jan 27, 2018
Notification Due Mar 31, 2018
Final Version Due Apr 21, 2018
Categories    information hiding   multimedia   security   privacy

Call For Papers


For more than 20 years the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. Signal forensics, digital watermarking, and steganography are representative but not the only topics of interest. All pertinent works have in common that some form of host signal is involved in the realization of security and privacy goals.
This workshop has established a reputation as one of the premier outlets for research in the areas. Continuing this tradition, the workshop's 2018 edition solicits novel papers documenting research or industrial practice.


Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (e.g., images, audio, video, text, traffic):
- Forensics and counterforensics
- Steganography and steganalysis
- Covert and subliminal channels
- Watermarking and fingerprinting
- Networks and protocols
- Anonymity
- Biometrics

Using or advancing methods including, but not limited to:
- Information, coding, and complexity theory
- Game and decision theory
- Statistical modelling
- Machine learning and deep learning
- Signal processing in the encrypted domain
- Benchmarking and replication
- Obfuscation

This year we also encourage submissions in general systems security that establish a connection to the protection goals of information hiding in unusual channels, for example:
- Cracking-resistant password vaults
- Format-preserving encryption
- Algorithm-substitution attacks
- Authentication of cyber-physical systems


Authors are invited to submit both short papers (4 - 6 pages, e.g., showing work in progress with limited test sets or just giving indications or tendencies) and full papers (10 - 12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification.

There will be two awards for the most outstanding papers: one for the best paper and one for the best paper with a student as first author.

For full submission details and formatting guidelines, please visit the workshop web page at

For questions relating to the Call for Papers, please inquire with the Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).

Related Resources

CODASPY 2018   Conference on Data and Application Security and Privacy
eCrime 2018   13th Symposium on Electronic Crime Research
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
ACM MMSys 2018   ACM Multimedia Systems Conference
IJCSITY 2017   International Journal of Computational Science and Information Technology
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
IEEE - ICISE - Ei 2018   2018 3rd International Conference on Information Systems Engineering (ICISE 2018)--IEEE Xplore, Ei Compendex
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications