In its 2016 edition, the IEEE International Workshop on Information Forensics and Security will continue to adhere to its earlier established wide scope, covering various aspects of forensics and information security. We invite potential authors to submit articles on the following topics but will not be limited to only these.
- Forensics: evidence recovery; evidence validation; media forensics; source attribution; incident response; and counter forensics
- Information and system security: authentication, vulnerability discovery/assessment; malware analysis; cyber-physical systems; mobile and intelligent devices; and physical layer fingerprinting
- Biometrics: new biometric modalities; pattern recognition; multimodal decision making; and feature extraction
- Multimedia content security: cryptography for multimedia; hashing; and data hiding
- Steganography and covert communications
- Hardware security: hardware trojans; PUFS; and anti-counterfeiting
- Network traffic analysis
- Surveillance: tracking; person (re-)identification; crowd analysis; and anti-surveillance and de-identification
- Sousvelliance and anti-sousveillance: users collecting data from other users instead of authorities; possibilities and risks.*
- Privacy in data analytics
- Privacy in the Internet of everything
Special Session on Secure Multi-Party Computation
The past decade has witnessed a tremendous growth in distributed computation platforms from cloud computing, crowdsourcing, to mobile and IoT networks. Security and privacy of data are among users’ top concerns in migrating their sensitive information to distributed platforms. One of the strongest tools available in safeguarding distributed computation is secure Multi-Party Computation (MPC). WIFS’16 will include a special session dedicated to this area of research.
In this special session, we seek unpublished high quality papers that address latest developments in secure MPC and its applications in various signal processing and communication domains. Topics include but are not limited to novel IFS applications based on secure MPC, key innovations in key primitives such as homomorphic encryption and garbled circuits, hardware/software implementation and programming support, as well as trust and adversarial models.
This special session is organised by Samson Cheung (University of Kentucky), Zekeriya Erkin (Delft University of Technology), Shantanu Rane (Xerox Parc), and Sheng Zhong (Nanjing University). For further information please address inquiries to email@example.com.
Submission of Papers
Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. All accepted papers will be published in the IEEE conference proceedings – provided they are presented at the workshop. For questions, contact WIFS’16 Technical Program Chairs at firstname.lastname@example.org.
The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.
Tutorial Proposals Submission
Up to four tutorials will be scheduled for the first day of the conference, Sunday December 4, 2016. Prospective tutorial contributors are encouraged to submit a tutorial proposal with the tutorial title, the presenters’ name, affiliation, and brief CV, along with the detailed structure of the tutorial to the Tutorials Chair at email@example.com.
Demo and Ongoing Work Proposals
This session will provide both academic researchers and industrial exhibitors to showcase innovative implementations, systems and technologies demonstrating new ideas in the field. We encourage both the submission of early research prototypes and interesting mature systems. Formal proposals must be accompanied by a description of the work or demo to be presented. All material has to be submitted to the Demo Session Chair at firstname.lastname@example.org.
Submission of SPL and TIFS Papers
Authors of IEEE Signal Processing Letters (SPL) and IEEE Transactions on Information Forensics and Security (TIFS) papers will be given the opportunity to present their work at WIFS 2016, subject to space availability and approval by the WIFS Technical Program Chairs. Proposals have to be submitted to the Technical Program Chairs at email@example.com.
WIFS conference is a lively, four-day interaction on problems very relevant to science and industry. We invite industry partners and interested companies to come and find out more about cutting-edge research and networking opportunities. For more information and questions to get involved, please contact Industrial Relations Chair at firstname.lastname@example.org.
|May 16, 2016:|
|May 27, 2016:|
|May 27, 2016:||Tutorial Proposals|
|July 1, 2016:||Notification of Tutorial Acceptance|
|Paper Submission Deadline|
|August 12, 2016:||Demo & On-going Work Proposals|
|August 26, 2016:||SPL and TIFS Paper Submissions|
|October 3, 2016:||Notification of Paper Acceptance|
|October 3, 2016:||Notification of Demo & Ongoing Works Proposal Acceptance|
|October 21, 2016:||Submission of Camera Ready Papers|
|November 4, 2016:||End of Advance Registration|
|November 4, 2016:||Author’s Registration Deadline|
* Sousveillance means recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies. The term “sousveillance”, coined by Steve Mann, stems from the contrasting French words sur, meaning “above”, and sous, meaning “below”, i.e. “surveillance” denotes the “eye-in-the-sky” watching from above, whereas “sousveillance” denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings), or hierarchically (ordinary people doing the watching, rather than higher authorities or architectures doing the watching).