posted by user: fillert || 11178 views || tracked by 14 users: [display]

IH 2011 : 13th Information Hiding Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Hiding
 
Link: http://ihconference.org
 
When May 18, 2011 - May 20, 2011
Where Prague, Czech Republic
Submission Deadline Jan 31, 2011
Notification Due Mar 28, 2011
Final Version Due Apr 25, 2011
Categories    communications   cryptography   security   information security
 

Call For Papers

CALL FOR PAPERS

13th INFORMATION HIDING CONFERENCE, MAY 18 - 20, 2011
Prague, Czech Republic

Email: organizers@ihconference.org
Web: http://www.ihconference.org

SUBMISSION DEADLINE HAS BEEN POSTPONED TO January 31 2011.

For many years, Information Hiding has captured the imagination of researchers.
Digital watermarking and steganography protect information, conceal secrets or
are used as core primitives in digital rights management schemes. Steganalysis
and forensics pose important challenges to investigators; and privacy techniques
try to hide relational information such as the actors' identities in anonymous
communication systems. These and other topic share the notion that security is
defined by the difficulty to make (or avoid) inference on certain properties of
host data, which therefore has to be well understood and modeled.

Current research themes include:
* Anonymity and privacy
* Covert/subliminal channels
* Digital rights management
* Fingerprinting and embedding codes
* Multimedia and document security
* Multimedia forensics and counter forensics
* Novel applications of information hiding
* Other data hiding domains (e.g. text, software, etc.)
* Security metrics for information hiding
* Steganography and steganalysis
* Theoretical aspects of information hiding and detection
* Watermarking (algorithms, security, attacks)

Continuing a successful series that brought together experts in these closely
linked research areas, the

13th edition of Information Hiding will be held in Prague, Czech Republic.

Interested parties are invited to submit novel papers on research and practice
which are related to the above areas of interest. Claims about information hiding
technology, such as robustness or steganographic security, must be backed by strong
evidence in the paper (such as mathematical proofs, statistical modeling or
extensive testing).

Submissions must not substantially overlap papers that have been published or that
are simultaneously submitted to a journal or a conference with proceedings. Submissions
should follow the Springer Lecture Notes in Computer Science (LNCS) format and should be
no more than 15 pages including the bibliography and well-marked appendices. Accepted
papers will appear in the proceedings published by Springer in the LNCS series. Authors
can submit their manuscripts on-line on the conference website where detailed instructions
are provided. The submitted papers should be anonymized avoiding obvious references.

KEY DATES:
Submission deadline January 31, 2011
Notiffication of acceptance March 28, 2011
Camera-ready papers for pre-proceedings April 25, 2011
Conference May 18-20, 2011
Camera-ready papers for post-proceedings July 4, 2011

PROGRAM COMMITTEE
* Tomas Pevny, Czech Technical University, Czech Republic (general chair)

* Tomas Filler, SUNY Binghamton, USA (program co-chair)
* Andrew Ker, University of Oxford (program co-chair)
* Scott Craver, SUNY Binghamton, USA (program co-chair)

* Ross Anderson, University of Cambridge, UK
* Mauro Barni, Universita di Siena, Italy
* Patrick Bas, CNRS, France
* Rainer Bohme, University of Munster, Germany
* Francois Cayre, GIPSA-lab/Grenoble INP, France
* Ee-Chien Chang, National University of Singapore, Singapore
* Christian Collberg, University of Arizona, USA
* Ingemar J. Cox, University College London, UK
* George Danezis, Microsoft Research Cambridge, UK
* Gwenael Doerr, Technicolor, France
* Philip W. L. Fong, University of Calgary, Canada
* Jessica Fridrich, SUNY Binghamton, USA
* Teddy Furon, INRIA, France
* Neil F. Johnson, Booz Allen Hamilton and JJTC, USA
* Stefan Katzenbeisser, TU Darmstadt, Germany
* Darko Kirovski, Microsoft Research, USA
* John McHugh, University of North Carolina, USA and RedJack, LLC.
* Ira S. Moskowitz, Naval Research Laboratory, USA
* Ahmad-Reza Sadeghi, Ruhr-Universitat Bochum, Germany
* Rei Safavi-Naini, University of Calgary, Canada
* Phil Sallee, Booz Allen Hamilton, USA
* Berry Schoenmakers, TU Eindhoven, The Netherlands
* Kaushal Solanki, Mayachitra Inc., USA
* Kenneth Sullivan, Mayachitra Inc., USA
* Paul Syverson, Naval Research Laboratory, USA

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ISEEIE 2025   2025 5th International Symposium on https://www.iseeie.org/, Electronics and Information Engineering (ISEEIE 2025)
ICITA 2025   19th International Conference on Information Technology and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust