IH&MMSec 2018
6th ACM Workshop on Information Hiding and Multimedia Security
Innsbruck, Austria
June 20 - June 22, 2018

Submission deadline: January 27, 2018

For more than 20 years the fields of Information Hiding and Multimedia
Security have blended advances of multiple disciplines, accumulating a
substantial body of knowledge. Signal forensics, digital watermarking,
and steganography are representative but not the only topics of
interest. All pertinent works have in common that some form of host
signal is involved in the realization of security and privacy goals.

This workshop has established a reputation as one of the premier
outlets for research in the areas. Continuing this tradition, the
workshop's 2018 edition solicits novel papers documenting research or
industrial practice.

Submitted papers should address security and privacy aspects in
relation to multimedia host signals in a broad sense (e.g., images,
audio, video, text, traffic):

- Forensics and counterforensics
- Steganography and steganalysis
- Covert and subliminal channels
- Watermarking and fingerprinting
- Networks and protocols
- Anonymity
- Biometrics

Using or advancing methods including, but not limited to:
- Information, coding, and complexity theory
- Game and decision theory
- Statistical modelling
- Machine learning and deep learning
- Signal processing in the encrypted domain
- Benchmarking and replication
- Obfuscation

This year we also encourage submissions in general systems security
that establish a connection to the protection goals of information
hiding in unusual channels, for example:

- Cracking-resistant password vaults
- Format-preserving encryption
- Algorithm-substitution attacks
- Authentication of cyber-physical systems

Authors are invited to submit both short papers (4 - 6 pages, e.g.,
showing work in progress with limited test sets or just giving
indications or tendencies) and full papers (10 - 12 pages, with
general and detailed research contributions). Full papers are expected
to back their key claims with strong evidence (such as mathematical
proofs, statistical modelling, or extensive testing). Submissions must
not substantially overlap with papers that have been published or that
are simultaneously submitted to a journal or a conference. Submissions
should be properly anonymized for double blinded review, therefore
authors and their affiliations should be removed and language be
adjusted to prevent easy identification.

There will be two awards for the most outstanding papers: one for the
best paper and one for the best paper with a student as first author.

For full submission details and formatting guidelines, please visit
the workshop web page at https://www.ihmmsec.org.

For questions relating to the Call for Papers, please inquire with the
Technical Program Chairs: Giulia Boato (giulia DOT boato AT unitn DOT
it) and Pascal Schöttle (pascal DOT schoettle AT uibk DOT ac DOT at).