Call for papers

Information Hiding 2004
May 23-25, 2004

Many researchers are interested in hiding information or, conversely,
in preventing others from doing so or detecting and extracting the
hidden data. Although the protection of digital intellectual property
has recently motivated most of the research in this area, there are
many other applications of increasing interest to both the academic
and business communities. Current research themes include:

    *      anonymous communications,
    *      covert channels in computer systems,
    *      detection of hidden information (steganalysis),
    *      digital elections,
    *      digital forensic,
    *      information hiding aspects of privacy,
    *      low-probability-of-intercept communications,
    *      steganography,
    *      subliminal channels in cryptographic protocols,
    *      watermarking for protection of intellectual property,
    *      other applications of watermarking. 

The last five workshops brought together these closely linked areas of
study and proved to be a success.

This sixth international workshop on information hiding will be held
in Toronto from Sunday 23rd May to Tuesday 25th May 2004.

Proceedings will be published as Lecture Notes in Computer Science
(LNCS) by Springer Verlag.

Instructions for authors

Interested parties are invited to submit novel papers on research and
practice which are related to the above areas of interest. We want a
balanced program and seek submissions on topics such as anonymous
communication, anonymous online transactions, privacy, and
covert/subliminal communications, along with our usual quality
steganography, watermarking and fingerprinting submissions.
Submissions must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Technical papers should follow the
required format. The papers should be at most 15 pages including the
bibliography and well-marked appendices. Technical papers will appear
in the proceedings. The submitted papers should be anonymized avoiding
obvious references.

Claims about information hiding technology, such as robustness or
steganographic security, must be backed by strong evidence in the
paper (such as mathematical proofs, statistical modelling or extensive
testing) and the authors must be prepared to publicly discuss such
claims at the workshop.

Authors can submit their papers via the IH2004 conference management
tool where detailed instructions are provided. Questions regarding the
program should be directed to the program chairs, Jessica Fridrich and 
Mike Reiter.
All other questions should be directed to the general 
Richard Owens.

Submissions received after the submission deadline or failing to
conform to the guidelines risk rejection without consideration of
their merits. Where possible all further communications to authors
will be via email.

paper submissions started: 16th October 2003
paper submissions finished: 12th December 2003, 07:00 GMT
notification of acceptance: 17th March 2004
camera-ready copy for pre-proceedings: 17th April 2004  
Workshop: 23th-25th May 2004
camera-ready copy for proceedings due: 24rd June 2004
proposals for the next workshop: 30th June 2002

Program committee

Ross J. Anderson (University of Cambridge, England)
Jan Camenisch (IBM Zurich Research Laboratory, Switzerland)
Christian Collberg (University of Arizona)
Ingemar J. Cox (NEC Research Institute, U.S.A.)
Jessica Fridrich (SUNY Binghamton, U.S.A.) - program chair
John McHugh (SEI/CERT, U.S.A.)
Ira S. Moskowitz (Naval Research Laboratory, U.S.A.)
Job Oostveen (Philips Research, Netherlands)
Richard C. Owens (University of Toronto) - general chair
Fabien A. P. Petitcolas (Microsoft Research, England)
Andreas Pfitzmann (Dresden University of Technology, Germany)
Mike Reiter (Carnegie Mellon University, U.S.A.) - program chair