Call for Papers

Submissions are due by February 8, 2018.

Click here for a PDF version of the Call for Papers.

For more than 20 years the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. Signal forensics, digital watermarking, and steganography are representative but not the only topics of interest. All pertinent works have in common that some form of host signal is involved in the realization of security and privacy goals. This workshop has established a reputation as one of the premier outlets for research in the areas. Continuing this tradition, the workshop’s 2018 edition solicits novel papers documenting research or industrial practice.

Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (e.g., images, audio, video, text, traffic): 

  • Forensics and counterforensics

  • Steganography and steganalysis

  • Covert and subliminal channels

  • Watermarking and fingerprinting

  • Networks and protocols

  • Anonymity

  • Biometrics

Using or advancing methods including, but not limited to:

  • Information, coding, and complexity theory

  • Game and decision theory

  • Statistical modelling

  • Machine learning and deep learning

  • Signal processing in the encrypted domain

  • Benchmarking and replication

  • Obfuscation

This year we also encourage submissions in general systems security that establish a connection to the protection goals of information hiding in unusual channels, for example:

  • Cracking-resistant password vaults

  • Format-preserving encryption

  • Algorithm-substitution attacks

  • Authentication of cyber-physical systems

Authors are invited to submit both short papers (4–6 pages, e.g., showing work in progress with limited test sets or just giving indications or tendencies) and full papers (10–12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing).

Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification.

There will be two awards for the most outstanding papers: one for the best paper and one for the best paper with a student as first author.

Proceedings will be produced and published by ACM.

For questions relating to the Call for Papers, please inquire with the Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).

 

 

Formatting instructions

Technical papers submitted for ACM IH&MMSec '18 are to be written in English. Short papers must be 4-6 pages long, while full papers must be 10-12 pages long (including bibliography in both cases). Submissions must follow the new ACM conference template (please use sigconf style). Submissions should not use older ACM formats or non-standard formatting, and must be in pdf format. Authors should devote special care that fonts, images, tables and figures comply with common standards and do not generate problems for reviewers. Submissions not meeting the formatting requirements risk rejection without consideration of their merits.

All submissions should be appropriately anonymized. Author names and affiliations should not appear in the paper. The authors should avoid obvious self-references and should appropriately blind them if used. The list of authors cannot be changed after the acceptance decision is made unless approved by the Program Chairs.

Manuscripts can be submitted here.