| |||||||||||||||
AIMS 2010 : International Workshop on Advances in Multimedia Security (AIMS 2010) | |||||||||||||||
Link: http://www.dacas.cn/asiaccs2010/AIMS2010.htm | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
With the rapid progress of internet and computing technologies, an enormous amount of digital media is appearing over network, e.g. text, audio, speech, music, image and video etc. Due to their large-scale proliferation and use, several pivotal challenges including copyright protection, integrity and authenticity verification, authentication, and access control are becoming trail-blazing research avenues for the researchers and academicians.
Finding effective and efficient ways to protect information systems, networks and sensitive data within the critical information infrastructure is challenging even with the most advanced technology, equipment and trained professionals. Intelligent techniques in information assurance have been widely and actively studied in the recent decades with a wide range of diversity of sources and these could offer many advantages in terms of usability, reliability, management, and user acceptance. As a consequence, the subject of multimedia security has attracted intensive research activities in academy, industry and also government. This workshop intents to bring together diversity of international researchers, experts and practitioners who are working in the area of Multimedia security and digital right management. We believe that this workshop will promote further co-operation between specialists of multimedia information security and other related disciplines. Furthermore, it will give interested researchers an opportunity to review the current state-of-art of the topic, exchange recent ideas, and explore promising new directions. The solicited topics of interest include, but not limited to, all aspects of Multimedia Security: • Multimedia content security • Multimedia database security • Secure multimedia communication • Secure multimedia storage and retrieval • Secure multimedia web services • Digital multimedia rights management • Digital watermarking for multimedia security • Intrusion detection in multimedia systems • Multimedia Security models and architectures • Cryptographic protocols for multimedia security • Biometrics-based multimedia security and applications • Key management in multimedia services • Authentication and authorization in multimedia systems Publication Name: Accepted papers will be published by ACM Press in conference proceedings. Final proceedings versions will be 10 pages in double-column ACM format. Paper Submission Website: http://www.easychair.org/conferences/?conf=aims2010 Submission Guidelines: Submissions must be at most ten pages in double-column ACM format (note: pages must be numbered), excluding the bibliography and well-marked appendices. Only PDF or Postscript files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Contact: Dr. Fahad Bin Muhaya Director, Prince Muqrin Chair for IT Security, King Saud University Kingdom of Saudi Arabia Email: fmuhaya@ksu.edu.sa |
|