Welcome to IH & MMSEC 2013
The list of accepted papers (27 papers accepted, 74 papers submitted, Acceptance Rate = 36%) is presented in the Program item
The ACM Workshop IHMMSEC 2013 paper submission deadline has been extended from February 8, 2013 to February 13, 2013. This new deadline is firm, and the site will be closed to submissions (both new and revisions) at midnight on February 13, 2013 (at the International Date Line, or UTC plus 12 hours).
For over a decade, two workshops have been shaping the landscape of research in multimedia security. On one hand, Information Hiding (aka. IH) was created in 1996 and focused on digital watermarking, steganography and steganalysis, anonymity and privacy, hard to intercept communications and covert/subliminal channels. On the other hand, the ACM Workshop on Multimedia and Security (aka. ACM MMSec) was initiated in 1998 and focused on data hiding, robust/perceptual hash, biometrics, video surveillance, and multimedia forensics. Key seminal works have been published in these two workshops and papers accepted for publication there attracted over 9,000 citations in total. Year after year, the two communities grew closer and the overlap between their respective scope got bigger. As a result, after 14 successful editions each, IH and ACM MMSec decided to merge in a single event in an attempt to establish synergies between the two communities while building on the reputation obtained over the years.
The 1st ACM Information Hiding and Multimedia Security Workshop (IH&MMSec) will be held at the University of Montpellier II, in southern France, on June 17-19, 2013. We hope that this first edition of this workshop, resulting from merging two long standing sustainable events, will give birth to an attractive research forum that will facilitate cross-fertilization of ideas among key stakeholders from academia, industry, practitioners and government agencies around the globe.
Scope and Topics
Papers addressing issues of secure multimedia processing, access, distribution, storage and consumption are welcomed. Theoretical and practical coverage of the following topics will be considered. We also welcome software and hardware demos.
Topics include but are not limited to:
- Integrity verification of digital content
- Source device identification and linking
- Multimedia watermarking, fingerprinting and identification
- Multimedia network protection, privacy and security
- Multimedia authentication and encryption
- Signal Processing in the Encrypted Domain
- Steganography and steganalysis
- Application of smart cards and ID cards
- Secure multimedia system design and protocol security
- Security evaluation and benchmarks
- Emerging applications
- Privacy, policy and legal issues as well as their interaction with technological development
- Pattern Recognition and Security for Crime Scene Forensics Traces
- Combination of multimodal biometrics with other forensic evidence
- Ethical and societal implications of emerging forensics in multimedia and biometrics