posted by user: wmazurczyk || 4042 views || tracked by 7 users: [display]

IWNS 2010 : Second International Workshop on Network Steganography


When Nov 4, 2010 - Nov 6, 2010
Where Nanjing, China
Submission Deadline May 30, 2010
Notification Due Jun 15, 2010
Final Version Due Jul 10, 2010
Categories    steganography   security   covert channels   information hiding

Call For Papers


Second International Workshop on Network Steganography - IWNS 2010
November 4-6, 2010, Nanjing, China
co-located with
The 2010 International Conference on Multimedia Information Networking and
Security (MINES 2010)


Network steganography is part of information hiding focused on modern
networks and is a method of hiding secret data in users' normal data
transmissions, ideally, so it cannot be detected by third parties.
Steganographic techniques arise and evolve with the development of
network protocols and mechanisms, and are expected to be used in secret
communication or information sharing. Now, it becomes a hot topic due to
the wide spread of information networks, e.g., multimedia service
networks and social networks.

This year's workshop's main theme is network anomaly detection.

The workshop is dedicated to capture such areas of research as steganography,
steganalysis, and digital forensics in the meaning of network covert channels,
investigate the potential applications, and discuss the future research topics.
Research themes of the workshop will include:

- Steganography and steganalysis
- Covert/subliminal channels
- Novel applications of information hiding in networks
- Political and business issues related to network steganography
- Information hiding in multimedia services
- Digital forensics
- Network communication modelling from the viewpoint of steganography
and steganalysis
- New methods for detecting and eliminating network steganography


Papers will be accepted based on peer review and should contain
original, high quality work. All papers must be written in English. A
paper should not exceed 5 pages (two columns IEEE format), including
figures and references with 10-12 point font.

Submission page: TBA

The papers will be published by IEEE Computer Society Press, available
in the conference, and indexed by EI Compendex and ISTP. All published
papers will be included in the IEEE Xplore database.

The extended versions of high-quality papers selected from the workshop
will be published in a special issue of some journal.


Manuscript Due: Extended to May 30, 2010 (extended)
Acceptance Notification: June 15, 2010
Registration Due: July 10, 2010
Final Manuscript Due: July 10, 2010


Krzysztof Szczypiorski, Warsaw University of Technology, Poland
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Related Resources

TMA 2018   Network Traffic Measurement and Analysis Conference
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
CUING 2018   Criminal Use of Information Hiding
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
PHuN 2018   Second Annual Posthuman Network (PHuN) Graduate Student Conference
USENIX-Security 2018   27th USENIX Security Symposium
SUNBELT 2018   SUNBELT 2018 : Sunbelt Conference of the International Network for Social Network Analysis
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
ACII 2018   Advanced Computational Intelligence: An International Journal
ICMBN--ACM, Ei & Scopus 2018   ACM--2018 The 2nd International Conference on Multimedia, Broadcasting and Network (ICMBN 2018)--Ei & Scopus