posted by user: PSchoettle || 5468 views || tracked by 10 users: [display]

IH&MMSec 2018 : ACM Workshop on Information Hiding and Multimedia Security

FacebookTwitterLinkedInGoogle

Link: https://www.ihmmsec.org/
 
When Jun 20, 2018 - Jun 22, 2018
Where Innsbruck, Austria
Submission Deadline Jan 27, 2018
Notification Due Mar 31, 2018
Final Version Due Apr 21, 2018
Categories    information hiding   multimedia   security   privacy
 

Call For Papers

-------------------------------------------------------------------------

For more than 20 years the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. Signal forensics, digital watermarking, and steganography are representative but not the only topics of interest. All pertinent works have in common that some form of host signal is involved in the realization of security and privacy goals.
This workshop has established a reputation as one of the premier outlets for research in the areas. Continuing this tradition, the workshop's 2018 edition solicits novel papers documenting research or industrial practice.

-------------------------------------------------------------------------

Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (e.g., images, audio, video, text, traffic):
- Forensics and counterforensics
- Steganography and steganalysis
- Covert and subliminal channels
- Watermarking and fingerprinting
- Networks and protocols
- Anonymity
- Biometrics

Using or advancing methods including, but not limited to:
- Information, coding, and complexity theory
- Game and decision theory
- Statistical modelling
- Machine learning and deep learning
- Signal processing in the encrypted domain
- Benchmarking and replication
- Obfuscation

This year we also encourage submissions in general systems security that establish a connection to the protection goals of information hiding in unusual channels, for example:
- Cracking-resistant password vaults
- Format-preserving encryption
- Algorithm-substitution attacks
- Authentication of cyber-physical systems

-------------------------------------------------------------------------

Authors are invited to submit both short papers (4 - 6 pages, e.g., showing work in progress with limited test sets or just giving indications or tendencies) and full papers (10 - 12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification.

There will be two awards for the most outstanding papers: one for the best paper and one for the best paper with a student as first author.

For full submission details and formatting guidelines, please visit the workshop web page at https://www.ihmmsec.org.

For questions relating to the Call for Papers, please inquire with the Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).

Related Resources

RecSys 2019   13th ACM Conference on Recommender Systems
CLOUD 2019   8th International Conference on Cloud Computing: Services and Architecture
MLDM 2019   15th International Conference on Machine Learning and Data Mining MLDM 2019
AISCA 2019   3rd International Conference on Artificial Intelligence, Soft Computing And Applications
ICMR 2019   International Conference on Multimedia Retrieval
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
SIGIR 2019   International ACM SIGIR Conference on Research and Development in Information Retrieval
SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
KDD 2019   25TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING
IJE 2018   International Journal of Education