posted by organizer: kesterphysics || 116 views || tracked by 1 users: [display]

ISCWSA 2019 : International Symposium on Cryptology, Watermarking , Steganography and their Applications

FacebookTwitterLinkedInGoogle

Link: http://icsiot.ghsociety.org/
 
When May 29, 2019 - May 31, 2019
Where Ghana Technology University College
Abstract Registration Due May 27, 2019
Submission Deadline May 20, 2019
Notification Due Feb 25, 2019
Final Version Due May 27, 2019
Categories    computing and engineering   applications of computing   computer communications   cyber security
 

Call For Papers

Call for Papers for May 2019: 2019 ISCWSA International Symposium on Cryptology, Watermarking , Steganography and their Applications


International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are

 Access Control
 Anonymity & Pseudonymity
 Applied Cryptography
 Attacks & Malicious Code
 Authentication, Identification
 Biometrics
 Block & Stream Ciphers
 Blockchain Security and Privacy
 Cryptographic Algorithms and Primitivess
 Cryptographic Protocols
 Cyberphysical Security
 Data and Application Security
 Data and Computation Integrity
 Data Protection
 Denial of Service Protection
 Embedded System Security
 Formal Methods for Security
 Hash Functions
 Identity Management
 Key Management
 Language-Based Security
 Malware Analysis and Detection
 Network Security
 Security and Privacy for Big Data
 Security and Privacy in the Cloud
 Security in Content Delivery
 Security in Crowdsourcing
 Security in Grid Computing
 Security in the Internet of Things
 Security in Location Services
 Security in Pervasive Systems
 Security in Social Networks
 Sensor Network Security
 Trust Management
 Usable Security
 Virtual Private Networks
 Wireless and Mobile Security
 Peer-to-Peer Security & Privacy
 Privacy-Enhancing Technologies
 Public Key Cryptography
 Secure Distributed Computing
 Security Architectures
 Security Metrics
 Security Models
 Security Policies
 Cyber-Physical System
 Cryptographic Algorithms
 Trust Management
 Attacks and Defenses
 Authentication
 Stream Cipher
 Block Cipher
 Key Management
 Block Chain
 Bitcoin
 Security and Privacy
 Public Key Infrastructure (PKI)
 Quantum Cryptography
 ABE, KDE
 Cyber Security
 Web Security
 Android Security
 FUZZY LOGIC-based Information Security Systems
 Vulnerability Assessment
 Cyber Forensic
 Secure Techniques using AI
 Secure Techniques for Big Data
 Security in Image and Computer Vision
 Honeypot
 FOBO, NOMO
 Authentication, Copyright protection, DRM, and forensic watermarking
 Channel coding techniques for watermarking
 Convolutional neural networks (CNN) and deep learning
 Combination of data hiding and cryptography
 Digital image and media forensics and anti-forensics
 Document Security
 Information theoretic, stochastic and capacity aspects of data hiding
 Large-scale experimental tests and benchmarking
 Media forensics use-cases, methodologies and tools
 Statistical and perceptual models of multimedia content
 Reversible data hiding
 Robust perceptual hashing
 Security issues, including attacks and counter-attacks
 Steganography and steganalysis
 Source identification
 Visual cryptography and secret image sharing
 Identity Management
 Multimedia Watermarking for DRM
 Fragile Watermarking for content authentication
 Chaotic maps for security of Multimedia applications
 Information hiding and cryptography
 New applications of digital watermarking
 Digital forensics for multimedia data
 Protection systems against personal identity theft
 Reversible watermarking
 Integrity verification of multimedia content
 Security analysis of watermarking algorithms
 Biometrics for multimedia
 Attacks to watermarking systems
 Benchmarking of watermarking
 Multimedia fingerprinting
 Steganography and steganalysis
 Mathematical modeling of embedding and detection
 Information theoretic, stochastic aspects of data hiding
 Security issues, including attacks and counter-attacks
 Combination of data hiding and cryptography
 Optimum watermark detection and reliable recovery
 Estimation of watermark capacity
 Channel coding techniques for watermarking
 Large-scale experimental tests and benchmarking
 New statistical and perceptual models of multimedia content
 Reversible data hiding
 Data hiding in special media
 Data hiding and authentication
 Steganography and steganalysis
 Digital multimedia forensics & anti-forensics
 Copyright protection, DRM, forensic watermarking
 Visual cryptography & secret image sharing
 Security based on human vision system
 Information hiding techniques
 Studies regarding the use of information hiding in cybercrime
 Analysis of cybercrime cases related to CUIng
 Large scale coordinated actions by LEAs from CUIng perspective
 New steganographic & steganalysis methods
 Local, air-gapped, and network covert channels
 Novel countermeasures against information hiding techniques: detection, prevention, limitation
 Evasion, obfuscation and anti-forensics techniques used by cybercriminals
 Traffic type obfuscation techniques e.g. traffic morphing
 Masking network attacks with another types of threats
 Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.
 Impersonation of one cybercriminals groups by the other
 Underground marketplaces and their business models
 Botnet analysis from CUIng perspective
 Methods for botnet detection and mitigation from CUIng perspective
 Banking Trojans from CUIng perspective
 IoT-botnets from CUIng perspective
 Privacy enhancing techniques
 Analysis of underground environments
 Legal and technical aspects of Darknet research
 Cybercrime and CPS from CUIng perspective
 Future scenarios in cybercrime from CUIng perspective
 Aspects and methods for sharing strategic intelligence
 Abusing legitimate cloud-based services for masking criminal activities
 Abusing legitimate social media services for masking criminal activities
 Novel applications of information hiding in networks
 Political and business issues related to network steganography
 Information hiding in multimedia services
 Digital forensics
 Network communication modelling from the viewpoint of steganography
 and steganalysis
 New methods for detecting and eliminating network steganography
 etc

Proceedings of full papers of International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.
Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.
Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words) This covers presentation and conference participation.
All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.
Submission link: https://cmt3.research.microsoft.com/CSIoT2019
Website : http://icsiot.ghsociety.org/
Deadline for full papers submission :
20th May 2019
Final notification of acceptance :
25th May 2019
Deadline for registration :
27th May 2019
Deadline for Camera-ready :
28th May 2019
Conference date : 29th to 31th May 2019
Venue : Ghana Technology University College, Accra Ghana.






Related Resources

JMC 2024   JOURNAL OF MATHEMATICAL CRYPTOLOGY 2024
CSW 2024   2024 3rd International Conference on Cyber Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPISCS 2024   2024 3rd International Conference on Signal Processing, Information System and Cyber Security (SPISCS 2024)
TRS 2025   Transportation Research Symposium
Call For Papers Special Issue 2024   Smart Cities, innovating in the Transformation of Urban Environments
Hacktivity 2024   Hacktivity 2024 - IT Security Festival
PJA 76(1) 2026   Rhythms of Artwork and Beyond: Humanity, Sociality, and Nature
MLNLP 2024   2024 7th International Conference on Machine Learning and Natural Language Processing (MLNLP 2024)
InCIT 2024   The 8th International Conference on Information Technology