IWIHC 2014


The First International Workshop
on Information Hiding and its Criteria for evaluation

June 3, 2014, Kyoto, JAPAN

To be held in conjunction with the 9th ACM Symposium on Information,
Computer and Communications Security (ASIACCS 2014)
.

CFP | Important dates | Scope and Topics | Paper submissions | Program | Organizers

Call for Papers

Call for papers (PDF)

Copyright protection has become an important issue due to the growing amount of illegal content being distributed all over the world. The IHC (Information Hiding Criteria) Committee is working to improve this situation through the use of watermark technologies. In particular, it aims to help develop standard evaluation criteria and to sponsor watermark competitions based on these criteria to promote the development of protection measures for the content industry. The evaluation criteria will be revised in accordance with the advances in watermarking technology, the needs of the content industry, and the practicality of the competition.

This workshop is the first in the world to combine advanced research themes in the techniques and algorithms for information hiding based on the common criteria for evaluation. With the common evaluation criteria for information hiding, each proposed technique or algorithm is fairly compared with other ones, which is clearly beneficial not only for academia but also for industry. The workshop will provide an international forum for researchers, academicians, and practitioners in the field of fundamental tools and applications using information hiding for images, videos, audios, and texts to present their latest results in these areas.

The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014).

return to top

Important Dates

21 February 2014   Paper submission deadline (extended)
17 March 2014   Notification of acceptance (extended)
8 April 2014   Camera-ready copy due
3 June 2014   Workshop
return to top

Registration

Registration should be done via the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) Registration page

return to top

Scope and Topics

Track A: Watermark Competition
The IHC evaluation criteria for robust watermarking involves three documents categorized by digital contents such as

We encourage researchers to submit papers that highlight the techniques and algorithms for robust watermark based on the common criteria. The papers should involves the data evaluated on the basis of the IHC evaluation criteria (please see “Information Required for Submission” in the IHC evaluation criteria for detail). Among the schemes satisfying the criteria, we will select some schemes getting high robustness and high quality.

Track B: Regular Session
We do not restrict to the above topic. Papers addressing issues of secure multimedia watermarking, fingerprinting and identification are welcomed. Theoretical and practical coverage of the following topics will be considered. Topics of interest for the workshop include but are not limited to:

return to top

Paper Submissions

Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates, both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

Submissions for Track A must involve the data evaluated on the basis of the IHC evaluation criteria (please see "Information Required for Submission" in the IHC evaluation criteria for detail (http://www.ieice.org/iss/emm/ihc/IHC_criteriaVer3.pdf)).

Submissions for Track B must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.

Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Only one exception of overlapping is allowed for Track A if the authors' previous works are referred in their submissions. Authors of accepted papers must guarantee that their papers will be presented at the conference. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format (See for detail).

Submission site
Paper submissions for IWIHC2014 will be handled through the Easy Chair conference management system.
Please visit https://www.easychair.org/conferences/?conf=iwihc2014.

return to top

Program

Opening Ceremony
10:00 - 10:20
Invited Speech
10:20 - 11:10
Session chair: Seiichi Gohshi
    Protection and Utilization of Privacy Information
Noboru Babaguchi (Osaka University)
Coffee Break
11:10 - 11:30
Watermark Competition 1
11:30 - 12:20
Session chair: Minoru Kuribayashi
Robust Video Watermarking for MPEG Compression and DA-AD Conversion
Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam and Heung-Kyu Lee (KAIST, Korea)
Watermarking Based on the Difference of Discrete Cosine Transform Coefficients and an Error-Correcting Code
Hyunho Kang and Keiichi Iwamura (Tokyo University of Science, Japan)
Lunch Time
12:20 - 13:30
Watermark Competition 2
13:30 - 14:45
Session chair: Motoi Iwata
DCT-OFDM Based Watermarking Scheme Robust against Clipping Attack
Masaki Hakka, Minoru Kuribayashi and Masakatu Morii (Kobe University, Japan)
Digital Watermarking Method Using LDPC Code for Clipped Image
Nobuhiro Hirata and Masaki Kawamura (Yamaguchi University, Japan)
Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria
Hironobu Tozuka (Osaka University, Japan), Maki Yoshida (National Institute of Information and Communications Technology, Japan) and Toru Fujiwara (Osaka University, Japan)
Coffee Break
14:45 - 15:00
Information Hiding 1
15:00 - 15:50
Session chair: Hyunho Kang
A Detection Method of Subliminal Channel based on VoIP Communication
Huaizhou Tao, Donghong Sun and Yongfeng Huang (Tsinghua University, China)
Reversible Data Hiding by Adaptive Modification of Prediction Errors
Reza Moradi Rad, Simying Ong and Koksheik Wong (University of Malaya, Malaysia)
Coffee Break
15:50 - 16:05
Information Hiding 2
16:05 - 16:55
Session chair: Masaki Kawamura
Audio Watermarking Based on Amplitude Modulation and Modulation Masking
Akira Nishimura (Tokyo University of Information Sciences, Japan)
High Capacity Data Hiding Method in DNA with Mutation Handling
Kevin Nathanael Santoso (Pukyong National University, Korea), Suk-Hwan Lee (Tongmyong University, Korea), and Ki-Ryong Kwon (Pukyong National University, Korea)

return to top

Organizers


General Co-Chairs
Keiichi Iwamura                 Tokyo University of Science, Japan
Ki-Ryong Kwon                 Pukyong National University, Korea

Program Co-Chairs
Seiichi Gohshi             Kogakuin University, Japan
Minoru Kuribayashi             Kobe University, Japan

Web and Publicity Chairs
Hyunho Kang                     Tokyo University of Science, Japan
Motoi Iwata                     Osaka Prefecture University, Japan

Program Committee
Rainer Bohme     University of Munster, Germany
Chin-Chen Chang     Feng Chia University, Taiwan
Ee-Chien Chang     National University of Singapore, Singapore
Marc Chaumont     LIRMM / University of Nimes, France
Isao Echizen     National Institute of Informatics, Japan
Masaaki Fujiyoshi     Tokyo Metropolitan University, Japan
Fernando Perez-Gonzalez     University of Vigo, Spain
Anthony TS Ho     University of Surrey, UK
Ton Kalker     Huawei Technologies Co. Ltd, USA
Kitahiro Kaneda     Canon Inc., Japan
Masaki Kawamura     Yamaguchi University, Japan
Hyoung Joong Kim     Korea University, Korea
Kazuhiro Kondo     Yamagata University, Japan
Seung-Geun Kwon     Kyungil University, Korea
Heung-Kyu Lee     KAIST, Korea
Suk-Hwan Lee     Tongmyung University, Korea
Baiying Lei     Shenzhen University, China
Michiharu Niimi     Kyushu Institute of Technology, Japan
Akira Nishimura     Tokyo University of Information Science, Japan
Akio Ogihara     Kinki University, Japan
Kotaro Sonoda     Nagasaki University, Japan
Youichi Takashima     NTT Service Evolution Labs., Japan
Masashi Unoki     JAIST, Japan
Andreas Westfeld     HTW Dresden, Germany
Sven Wohlgemuth     CASED/Technical University Darmstadt, Germany
KokSheik Wong     University of Malaya, Malaysia
Shijun Xiang     Jinan University, China

return to top

hosted by IHC

What is IHC ?
IHC means Information Hiding and its Criteria for evaluation committee. IHC's activities are (1) Develop criteria for evaluating robust watermarking schemes, (2) Disclose these criteria, and call for schemes that meet them, (3) Evaluate schemes on the basis of the criteria and identify those that meet them, (4) Call for attacks on the identified schemes, and (5) Evaluate the effectiveness of the attacks. For more details, please visit our site.