posted by system || 7218 views || tracked by 3 users: [display]

IH&MMSec 2014 : ACM Information Hiding and Multimedia Security Workshop

FacebookTwitterLinkedInGoogle

Link: http://www.ihmmsec.org/
 
When Jun 11, 2014 - Jun 13, 2014
Where Salzburg, Austria
Submission Deadline Jan 17, 2014
Notification Due Mar 31, 2014
Final Version Due May 2, 2014
Categories    multimedia
 

Call For Papers

Last year, the 1st ACM Information Hiding and Multimedia Security Workshop 2013 successfully merged the Information Hiding (IH) and the ACM Multimedia and Security (ACM MMSec) communities. This year's 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) continues this endeavour, providing a platform to discuss recent advances in both fields, benefitting from their synergies.

The 2nd Information Hiding and Multimedia Security Workshop focusses on both, information hiding topics such as watermarking, steganography and steganalysis, anonymity, privacy, hard-to-intercept communications, and covert/subliminal channels as well as multimedia security topics such as data hiding, robust/perceptual hashing, biometrics, video surveillance, and multimedia forensics.

The 2nd Information Hiding and Multimedia Security Workshop (IH&MMSec) will be held at the Parkhotel Brunauer in Salzburg, Austria, on June 11-13, 2014. You are invited to submit short papers (4-6 pages, showing work in progress with limited test sets for example or just giving indications or tendencies) and full papers (10-12 pages, with general and detailed research contributions).

Topics include, but are not limited to:

• Integrity verification of digital content
• Source device identification and linking
• Multimedia watermarking, fingerprinting and identification
• Multimedia network protection, privacy and security
• Multimedia authentication and encryption
• Signal Processing in the Encrypted Domain
• Steganography and steganalysis
• Biometrics
• Application of smart cards and ID cards
• Secure multimedia system design and protocol security
• Media Forensics
• Crime Scene Forensics
• Security evaluation and benchmarks
• Emerging applications
• Privacy, policy and legal issues as well as their interaction with technological development

Related Resources

CCCN 2026   ACM--2026 The 4th International Conference on Cloud Computing and Computer Network (CCCN 2026)
Ei/Scopus-DMNLP 2026   2026 3rd International Conference on Data Mining and Natural Language Processing (DMNLP 2026)
IEEE-ICECCS 2026   2025 IEEE International Conference on Electronics, Communications and Computer Science (ICECCS 2026)
IJMIP 2026   International Journal of Multimedia and Image Processing
IEEE-Ei/Scopus-ICISC 2026   2025 6th International Conference on Intelligent System and Computing (ICISC 2026)
DMA 2026   12th International Conference on Data Mining and Applications
Ei/Scopus-CMLDS 2026   2026 3rd International Conference on Computing, Machine Learning and Data Science (CMLDS 2026)
CGIP 2026   2026 4th International Conference on Computer Graphics and Image Processing (CGIP 2026)
ACM ICCAI 2026   ACM--2026 12th International Conference on Computing and Artificial Intelligence (ICCAI 2026)
IJITMC 2026   The International Journal of Information Technology, Modeling and Computing