ACM Workshop on Information Hiding and Multimedia Security

IH&MMSec 2018


Security & Trust & Testing



-------------------------------------------------------------------------
For more than 20 years the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. Signal forensics, digital watermarking, and steganography are representative but not the only topics of interest. All pertinent works have in common that some form of host signal is involved in the realization of security and privacy goals.
This workshop has established a reputation as one of the premier outlets for research in the areas. Continuing this tradition, the workshop's 2018 edition solicits novel papers documenting research or industrial practice.
-------------------------------------------------------------------------
Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (e.g., images, audio, video, text, traffic):
- Forensics and counterforensics
- Steganography and steganalysis
- Covert and subliminal channels
- Watermarking and fingerprinting
- Networks and protocols
- Anonymity
- Biometrics
Using or advancing methods including, but not limited to:
- Information, coding, and complexity theory
- Game and decision theory
- Statistical modelling
- Machine learning and deep learning
- Signal processing in the encrypted domain
- Benchmarking and replication
- Obfuscation
This year we also encourage submissions in general systems security that establish a connection to the protection goals of information hiding in unusual channels, for example:
- Cracking-resistant password vaults
- Format-preserving encryption
- Algorithm-substitution attacks
- Authentication of cyber-physical systems
-------------------------------------------------------------------------
Authors are invited to submit both short papers (4 - 6 pages, e.g., showing work in progress with limited test sets or just giving indications or tendencies) and full papers (10 - 12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification.
There will be two awards for the most outstanding papers: one for the best paper and one for the best paper with a student as first author.
For full submission details and formatting guidelines, please visit the workshop web page at https://www.ihmmsec.org.
For questions relating to the Call for Papers, please inquire with the Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).