Submission deadline extended to : Friday 23rd of June, midnight (Paris time)
On-line paper submission system is now opened. Please submit papers here : https://cmt3.research.microsoft.com/WIFS2017/Submission/Index
The IEEE international Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE Information Forensics and Security (IFS) Technical Committee with the technical sponsorship of the IEEE Biometrics Council. Its major objective is to bring together researchers from relevant disciplines to exchange new ideas and the latest results and to discuss emerging challenges in different areas of information security. The 9th edition of WIFS will be held in Rennes, France, from December 4 to December 7, 2017. WIFS 2017 will feature keynote lectures, tutorials, technical & special sessions, and also demo and ongoing work sessions.
Topics of interest include, but are not limited to:
- Forensics: Multimedia forensics | Counter Forensics | Acquisition Device Identification| Evidence Validation | Benchmarking
- Biometrics: Single or Multi-Modalities Systems | Security and Privacy | Spoofing | Performance Evaluation
- Security and Communication: Covert Channels | Physical Layer Security | Steganography | Secret Key Extraction | Digital Watermarking
- Multimedia Security: Broadcast encryption | Near duplicate detection | Data Hiding | Authentication | Forensics
- Information theoretic security: Differential Privacy | Adversarial Machine Learning | Game theory | Communication with Side Information
- Cybersecurity: Model and validation | Cloud Computing | Distributed Systems with Byzantines |Social Networks | Rumors and Alternative Facts
- Hardware security: New primitives |Phyisical Unclonable Functions | Anti-Counterfeiting | Side Channels Attacks | Forensics
- Surveillance: Tracking | Object / Person Detection | Behavior Analysis| Anti-Surveillance and De-identification | Privacy
- Network Security: Intrusion Detection | Protocols | Traffic Analysis | Anonymity | Mobile Ad-hoc Networks | Internet of Things
- Applied cryptography: Processing in the encrypted domain | Multiparty computation | traitor tracing | property preserving encryption
Moreover, IEEE WIFS 2017 will host 2 special sessions on the following topics:
- Physical Object Identification and Authentication, chaired by Slava Voloshynovskiy (University of Geneva, Switzerland) and Boris Skoric (Univ. of Technology Eindhoven, The Netherlands,
- Social networks and user-generated content verification, chaired by Ewa Kijak (University of Rennes, France) and Vincent Claveau (CNRS / IRISA, Rennes)
Prospective authors are invited to submit full-length, six-page papers, including figures and references. Instructions are detailed herein. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For all questions contact WIFS’17 Technical Program Chairs at firstname.lastname@example.org.
Important!The IEEE Signal Processing Society enforces a “no-show” policy. Any accepted paper included in the final program is expected to have at least one author or qualified proxy attend and present the paper at the conference. Authors of the accepted papers included in the final program who do not attend the conference will be subscribed to a “no-show” list, compiled by the Society. The “no-show” papers will not be published by IEEE on IEEEXplore or other public access forums, but these papers will be distributed as part of the on-site electronic proceedings and the copyright of these papers will belong to the IEEE.
Important!Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). These matters are taken very seriously and the IEEE Signal Processing Society will take action against any author who has engaged in either practice.