[PET] CFP: ACM Workshop on Information Hiding and Multimedia Security 2018 (IH&MMSec '18)

Pasquini, Cecilia Cecilia.Pasquini at uibk.ac.at
Mon Dec 18 14:53:44 GMT 2017

We Apologize if you receive multiple copies of this CFP!

ACM Workshop on Information Hiding and Multimedia Security 2018
June 20-22nd 2018
Innsbruck, Austria

For more than 20 years the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. Signal forensics, digital watermarking, and steganography are representative but not the only topics of interest. All pertinent works have in common that some form of host signal is involved in the realization of security and privacy goals. This workshop has established a reputation as one of the premier outlets for research in the areas. Continuing this tradition, the workshop’s 2018 edition solicits novel papers documenting research or industrial practice.

Moreover, we are glad to announce that the technical program will feature 2 keynote talks from:

  *   Prof. Ross Anderson, University of Cambridge, UK. [Founder of the Information Hiding Workshop in 1996!]
  *   Prof. Luisa Verdoliva, University of Naples Federico II, Italy.

Important dates

Paper submission: January 27, 2018

Acceptance notification: March 31, 2018

Camera-ready submission: April 21, 2018

Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (e.g., images, audio, video, text, traffic):

  *   Forensics and counterforensics

  *   Steganography and steganalysis

  *   Covert and subliminal channels

  *   Watermarking and fingerprinting

  *   Networks and protocols

  *   Anonymity

  *   Biometrics

Using or advancing methods including, but not limited to:

  *   Information, coding, and complexity theory

  *   Game and decision theory

  *   Statistical modelling

  *   Machine learning and deep learning

  *   Signal processing in the encrypted domain

  *   Benchmarking and replication

  *   Obfuscation

This year we also encourage submissions in general systems security that establish a connection to the protection goals of information hiding in unusual channels, for example:

  *   Cracking-resistant password vaults

  *   Format-preserving encryption

  *   Algorithm-substitution attacks

  *   Authentication of cyber-physical systems

Authors are invited to submit both short papers (4–6 pages, e.g., showing work in progress with limited test sets or just giving indications or tendencies) and full papers (10–12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing).

Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification.

There will be two awards for the most outstanding papers: one for the best paper and one for the best paper with a student as first author.

Proceedings will be produced and published by ACM.

For questions relating to the Call for Papers, please inquire with the Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.links.org/pipermail/pet/attachments/20171218/0208bb10/attachment.html>

More information about the PET mailing list