Les commentaires sont clos.

IEEE Workshop on Information Forensics and Security

30 Mars 2017

Catégorie : Conférence internationale


The 2017 IEEE international Workshop on Information Forensics and Security (WIFS)
December 4, to December 7, 2017
Rennes, France


The IEEE international Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE Information Forensics and Security (IFS) Technical Committee. Its major objective is to bring together researchers from relevant disciplines to exchange new ideas and the latest results and to discuss emerging challenges in different areas of information security. The 9th edition of WIFS will be held in Rennes, France, from December 4, to December 7, 2017. WIFS 2017 will feature keynote lectures, tutorials, technical & special sessions, and also demo and ongoing works sessions.

Authors willing to submit regular papers published in the conference proceedings and IEEEXplore:

  • Paper submission deadline: June 19, 2017
  • Notification of paper acceptance: September 18, 2017
  • Camera-ready paper submission: October 2, 2017
  • Mandatory registration: November 6, 2017

Application for a tutorial session:

  • Tutorial proposal deadline: May 15, 2017
  • Notification of acceptance: June 12, 2017

Proposal for demos and on-going work posters:

  • Proposal deadline: September 25, 2107
  • Notification of acceptance: October 9, 2017

Topics of interest include, but are not limited to:

  • Forensics: Multimedia forensics | Counter Forensics | Acquisition Device Identification| Evidence Validation | Benchmarking
  • Biometrics: Single or Multi-Modalities Systems | Security and Privacy | Spoofing | Performance Evaluation
  • Security and Communication: Covert Channels | Physical Layer Security | Steganography | Secret Key Extraction | Digital Watermarking
  • Multimedia Security: Broadcast encryption | Near duplicate detection | Data Hiding | Authentication | Forensics
  • Information theoretic security: Differential Privacy | Adversarial Machine Learning | Game theory | Communication with Side Information
  • Cybersecurity: Model and validation | Cloud Computing | Distributed Systems with Byzantines |Social Networks | Rumors and Alternative Facts
  • Hardware security: New primitives |Phyisical Unclonable Functions | Anti-Counterfeiting | Side Channels Attacks | Forensics
  • Surveillance: Tracking | Object / Person Detection | Behavior Analysis| Anti-Surveillance and De-identification | Privacy
  • Network Security: Intrusion Detection | Protocols | Traffic Analysis | Anonymity | Mobile Ad-hoc Networks | Internet of Things
  • Applied cryptography: Processing in the encrypted domain | Multiparty computation | traitor tracing | property preserving encryption

Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For all questions contact WIFS’17 Technical Program Chairs at