|
Call for Papers |
Copyright protection has become an important issue due to the growing amount of illegal content being distributed all over the world. The IHC (Information Hiding Criteria) Committee is working to improve this situation through the use of watermark technologies. In particular, it aims to help develop standard evaluation criteria and to sponsor watermark competitions based on these criteria to promote the development of protection measures for the content industry. The evaluation criteria will be revised in accordance with the advances in watermarking technology, the needs of the content industry, and the practicality of the competition.
This workshop is the first in the world to combine advanced research themes in the techniques and algorithms for information hiding based on the common criteria for evaluation. With the common evaluation criteria for information hiding, each proposed technique or algorithm is fairly compared with other ones, which is clearly beneficial not only for academia but also for industry. The workshop will provide an international forum for researchers, academicians, and practitioners in the field of fundamental tools and applications using information hiding for images, videos, audios, and texts to present their latest results in these areas.
The proceedings will be published by ACM Press and appear in ACM digital library (as with the ACM ASIACCS 2014).
Important Dates |
21 February 2014 | Paper submission deadline (extended) |
17 March 2014 | Notification of acceptance (extended) |
8 April 2014 | Camera-ready copy due |
3 June 2014 | Workshop |
Registration |
Registration should be done via the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014) Registration page
Scope and Topics |
Track A: Watermark Competition
The IHC evaluation criteria
for robust watermarking involves three documents categorized by digital contents such as
Track B: Regular Session
We do not restrict to the above topic. Papers addressing issues of secure multimedia
watermarking, fingerprinting and identification are welcomed. Theoretical and practical
coverage of the following topics will be considered. Topics of interest for the workshop
include but are not limited to:
Paper Submissions |
Submissions must be written in English, and must be at most 10 pages excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in double-column ACMSIG Proceedings format (http://www.acm.org/sigs/publications/proceedings-templates, both Option 1 and Option 2 on the page are fine) with page numbers. No changes to margins, spacing, or font sizes are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.
Submissions for Track A must involve the data evaluated on the basis of the IHC evaluation criteria (please see "Information Required for Submission" in the IHC evaluation criteria for detail (http://www.ieice.org/iss/emm/ihc/IHC_criteriaVer3.pdf)).
Submissions for Track B must be anonymized. An author's name should occur only in references to that author's related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others.
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Only one exception of overlapping is allowed for Track A if the authors' previous works are referred in their submissions. Authors of accepted papers must guarantee that their papers will be presented at the conference. Camera-ready version must be no longer than 10 pages in ACM's standard double-column format (See for detail).
Submission site
Paper submissions for IWIHC2014 will be handled through the Easy Chair conference management system.
Please visit https://www.easychair.org/conferences/?conf=iwihc2014.
Program |
Opening Ceremony 10:00 - 10:20 |
|
Invited Speech 10:20 - 11:10 Session chair: Seiichi Gohshi
|
|
Protection and Utilization of Privacy Information Noboru Babaguchi (Osaka University) |
|
Coffee Break 11:10 - 11:30 |
|
Watermark Competition 1 11:30 - 12:20 Session chair: Minoru Kuribayashi
|
|
Robust Video Watermarking for MPEG Compression and DA-AD Conversion Jong-Uk Hou, Jin-Seok Park, Do-Guk Kim, Seung-Hun Nam and Heung-Kyu Lee (KAIST, Korea) |
|
Watermarking Based on the Difference of Discrete Cosine Transform Coefficients and an Error-Correcting Code Hyunho Kang and Keiichi Iwamura (Tokyo University of Science, Japan) |
|
Lunch Time 12:20 - 13:30 |
|
Watermark Competition 2 13:30 - 14:45 Session chair: Motoi Iwata
|
|
DCT-OFDM Based Watermarking Scheme Robust against Clipping Attack Masaki Hakka, Minoru Kuribayashi and Masakatu Morii (Kobe University, Japan) |
|
Digital Watermarking Method Using LDPC Code for Clipped Image Nobuhiro Hirata and Masaki Kawamura (Yamaguchi University, Japan) |
|
Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria Hironobu Tozuka (Osaka University, Japan), Maki Yoshida (National Institute of Information and Communications Technology, Japan) and Toru Fujiwara (Osaka University, Japan) |
|
Coffee Break 14:45 - 15:00 |
|
Information Hiding 1 15:00 - 15:50 Session chair: Hyunho Kang
|
|
A Detection Method of Subliminal Channel based on VoIP Communication Huaizhou Tao, Donghong Sun and Yongfeng Huang (Tsinghua University, China) |
|
Reversible Data Hiding by Adaptive Modification of Prediction Errors Reza Moradi Rad, Simying Ong and Koksheik Wong (University of Malaya, Malaysia) |
|
Coffee Break 15:50 - 16:05 |
|
Information Hiding 2 16:05 - 16:55 Session chair: Masaki Kawamura
|
|
Audio Watermarking Based on Amplitude Modulation and Modulation Masking Akira Nishimura (Tokyo University of Information Sciences, Japan) |
|
High Capacity Data Hiding Method in DNA with Mutation Handling Kevin Nathanael Santoso (Pukyong National University, Korea), Suk-Hwan Lee (Tongmyong University, Korea), and Ki-Ryong Kwon (Pukyong National University, Korea) |
|
Organizers |
Keiichi Iwamura | Tokyo University of Science, Japan | |
Ki-Ryong Kwon | Pukyong National University, Korea |
Seiichi Gohshi | Kogakuin University, Japan | |
Minoru Kuribayashi | Kobe University, Japan |
Hyunho Kang | Tokyo University of Science, Japan | |
Motoi Iwata | Osaka Prefecture University, Japan |
Rainer Bohme | University of Munster, Germany | |
Chin-Chen Chang | Feng Chia University, Taiwan | |
Ee-Chien Chang | National University of Singapore, Singapore | |
Marc Chaumont | LIRMM / University of Nimes, France | |
Isao Echizen | National Institute of Informatics, Japan | |
Masaaki Fujiyoshi | Tokyo Metropolitan University, Japan | |
Fernando Perez-Gonzalez | University of Vigo, Spain | |
Anthony TS Ho | University of Surrey, UK | |
Ton Kalker | Huawei Technologies Co. Ltd, USA | |
Kitahiro Kaneda | Canon Inc., Japan | |
Masaki Kawamura | Yamaguchi University, Japan | |
Hyoung Joong Kim | Korea University, Korea | |
Kazuhiro Kondo | Yamagata University, Japan | |
Seung-Geun Kwon | Kyungil University, Korea | |
Heung-Kyu Lee | KAIST, Korea | |
Suk-Hwan Lee | Tongmyung University, Korea | |
Baiying Lei | Shenzhen University, China | |
Michiharu Niimi | Kyushu Institute of Technology, Japan | |
Akira Nishimura | Tokyo University of Information Science, Japan | |
Akio Ogihara | Kinki University, Japan | |
Kotaro Sonoda | Nagasaki University, Japan | |
Youichi Takashima | NTT Service Evolution Labs., Japan | |
Masashi Unoki | JAIST, Japan | |
Andreas Westfeld | HTW Dresden, Germany | |
Sven Wohlgemuth | CASED/Technical University Darmstadt, Germany | |
KokSheik Wong | University of Malaya, Malaysia | |
Shijun Xiang | Jinan University, China |
hosted by IHC |
What is IHC ?
IHC means Information Hiding and its Criteria for evaluation committee.
IHC's activities are (1) Develop criteria for evaluating robust watermarking schemes,
(2) Disclose these criteria, and call for schemes that meet them,
(3) Evaluate schemes on the basis of the criteria and identify those that meet them,
(4) Call for attacks on the identified schemes, and
(5) Evaluate the effectiveness of the attacks.
For more details, please visit our site.