posted by user: Ahquaib6 || 4464 views || tracked by 9 users: [display]

IH 2010 : 12th Information Hiding Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Hiding
 
Link: http://ih2010.cpsc.ucalgary.ca
 
When Jun 28, 2010 - Jun 30, 2010
Where Calgary, Alberta, Canada
Submission Deadline Mar 13, 2010
Notification Due May 10, 2010
Final Version Due Jul 31, 2010
Categories    steganography   multimedia forensics   privacy   watermarking
 

Call For Papers

Call for Papers
12th Information Hiding Conference, 2010, Calgary, Alberta, Canada.
June 28 - 30, 2010
Web: http://ih2010.cpsc.ucalgary.ca
E-mail: ih2010@ucalgary.ca

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to investigators; and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topic share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled.

Current research themes include:
- Anonymity and privacy
- Covert/subliminal channels
- Digital rights management
- Fingerprinting and embedding codes
- Multimedia and document security
- Multimedia forensics and counter forensics
- Novel applications of information hiding
- Other data hiding domains (e.g. text, software, etc.)
- Security metrics for information hiding
- Steganography and steganalysis
- Theoretical aspects of information hiding and detection
- Watermarking (algorithms, security, attacks)


Continuing a successful series that brought together these closely linked research areas, the 12th edition of Information Hiding will be held in Calgary, Alberta, Canada.

Interested parties are invited to submit novel papers on research and practice which are related to the above areas of interest. Claims about information hiding technology, such as robustness or steganographic security, must be backed by strong evidence in the paper (such as mathematical proofs, statistical modeling or extensive testing). Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the Springer Lecture Notes in Computer Science (LNCS) format and should be no more than 15 pages including the bibliography and well-marked appendices. Accepted papers will appear in the proceedings published by Springer in the LNCS series. Authors can submit their manuscripts on-line on the conference website where detailed instructions are provided. The submitted papers should be anonymized avoiding obvious references.

General Chair:
Philip W. L. Fong, University of Calgary, Canada

Program Committee:
Rainer Boehme, International Computer Science Institute, Berkeley, USA (Co-Chair)
Rei Safavi-Naini, University of Calgary, Canada (Co-Chair)

Ross Anderson, University of Cambridge, UK
Mauro Barni, Universita di Siena, Italy
Patrick Bas, CNRS, France
Francois Cayre, GIPSA-lab/Grenoble INP, France
Ee-Chien Chang, National University of Singapore
Christian Collberg, University of Arizona, USA
Ingemar J. Cox, University College London, UK
Gwenael Doerr, Thomson Security Lab, France
Hany Farid, Dartmouth College, USA
Jessica Fridrich, SUNY Binghamton, USA
Teddy Furon, INRIA, France
Neil F. Johnson, Booz Allen Hamilton and JJTC, USA
Stefan Katzenbeisser, TU Darmstadt, Germany
Darko Kirovski, Microsoft Research, USA
John McHugh, RedJack, LLC. and University of North Carolina, USA
Ira S. Moskowitz, Naval Research Laboratory, USA
Andreas Pfitzmann, TU Dresden, Germany
Ahmad-Reza Sadeghi, Ruhr-Universitaet Bochum, Germany
Phil Sallee, Booz Allen Hamilton, USA
Berry Schoenmakers, TU/e, Netherlands
Kaushal Solanki, Mayachitra Inc., USA
Kenneth Sullivan, Mayachitra Inc., USA

Local Organization:
Department of Computer Science, University of Calgary.

Key Dates -
Submission Deadline: March 13th 2010
Notification of Acceptance: May 10th 2010
Pre-proceedings Copy: May 30th 2010
Registration Deadline for Authors: May 28th 2010
Final Version: July 31st 2010

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
NeurIPS 2025   Annual Conference on Neural Information Processing Systems
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
SEAS 2025   14th International Conference on Software Engineering and Applications
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
CSITEC 2025   11th International Conference on Computer Science, Information Technology