Conference Information
IH & MMSEC 2022: ACM Workshop on Information Hiding and Multimedia Security
https://www.ihmmsec.orgSubmission Date: |
2022-02-20 |
Notification Date: |
|
Conference Date: |
2022-06-27 |
Location: |
Santa Barbara, California, USA |
Years: |
10 |
CCF: c Viewed: 22217 Tracked: 22 Attend: 3
Call For Papers
The paper formatting instructions and the submission link are available at the bottom of this page. For more than 20 years, the fields of Information Hiding and Multimedia Security have blended advances of multiple disciplines, accumulating a substantial body of knowledge. This workshop has established a reputation as one of the premier outlets for research in these and related areas. Continuing this tradition, the workshop's 2022 edition solicits novel papers documenting research or industrial practice. The workshop will be held at the spectacular campus of the University of California, Santa Barbara. Submitted papers should address security and privacy aspects in relation to multimedia host signals in a broad sense (images, audios, videos, texts, network traffic, etc.): Forensics and counterforensics Steganography and steganalysis Covert and subliminal channels Watermarking and fingerprinting Networks and protocols Anonymity and privacy Biometrics and deep fake analytics Topics of interest include, but are not limited to, the use or advances of the following methods: Information, coding, and complexity theory Game and decision theory Statistical modelling Machine learning and deep learning Adversarial machine learning DNN watermarking Deep learning security Secure Signal Processing Benchmarking and replication Obfuscation and Privacy-preserving systems Authors are invited to submit either short papers (4-6 pages, for preliminary yet interesting results) or full papers (10-12 pages, with general and detailed research contributions). Full papers are expected to back their key claims with strong evidence (such as mathematical proofs, statistical modelling, or extensive testing). Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference. Submissions should be properly anonymized for double blinded review, therefore authors and their affiliations should be removed and language be adjusted to prevent easy identification. There will be two awards for the most outstanding papers: one for the best paper and one for the best student paper, with a student as first author. Proceedings will be produced and published by ACM. For questions relating to the Call for Papers, please feel free to contact the Program Chairs.
Last updated by Dou Sun in 2022-01-27
Best Papers
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICICCT | International Conference on Internet & Cloud Computing Technology | 2013-09-15 | 2013-11-06 |
WoTBD | International Symposium on Web of Things and Big Data | 2015-08-30 | 2015-10-06 |
CPS | International Conference on Embedded, Pervasive and Cyber-Physical Systems | 2014-10-17 | 2014-11-17 |
SETN | Hellenic Conference on Artificial Intelligence | 2020-05-29 | 2020-09-02 |
ECNLPIR | European Conference on Natural Language Processing and Information Retrieval | 2022-10-20 | 2022-11-18 |
ICIP | International Conference on Image Processing | 2022-02-16 | 2022-10-16 |
MSE' | International Conference on Materials Science and Engineering | 2023-04-29 | 2023-05-13 |
IFIPTM | IFIP WG 11.11 International Conference on Trust Management | 2019-04-09 | 2019-07-17 |
AIKE | Artificial Intelligence and Knowledge Engineering | 2020-10-15 | 2020-12-09 |
ICT4AWE | International Conference on Information and Communication Technologies for Ageing Well and e-Health | 2015-12-07 | 2016-04-21 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
b | ACM Transactions of Information and System Security | ACM | 1094-9224 | |
c | IET Information Security | 0.862 | IET | 1751-8709 |
International Journal of Information Security | 1.988 | Springer | 1615-5262 | |
a | IEEE Transactions on Information Forensics and Security | 6.211 | IEEE | 1556-6013 |
c | Information Management & Computer Security | Emerald | 0968-5227 | |
c | EURASIP Journal on Information Security | Springer | 1687-417X | |
c | International Journal of Information Security and Privacy | Idea Group Inc | 1930-1650 | |
Information Polity | IOS Press | 1570-1255 | ||
c | Information and Management | 10.32 | Elsevier | 0378-7206 |
International Journal of Information Management | 18.95 | Elsevier | 0268-4012 |
Full Name | Impact Factor | Publisher |
---|---|---|
ACM Transactions of Information and System Security | ACM | |
IET Information Security | 0.862 | IET |
International Journal of Information Security | 1.988 | Springer |
IEEE Transactions on Information Forensics and Security | 6.211 | IEEE |
Information Management & Computer Security | Emerald | |
EURASIP Journal on Information Security | Springer | |
International Journal of Information Security and Privacy | Idea Group Inc | |
Information Polity | IOS Press | |
Information and Management | 10.32 | Elsevier |
International Journal of Information Management | 18.95 | Elsevier |
Recommendation