CfP WIFS 2017

April 7, 2017

Call for Papers: 9th IEEE International Workshop on Information Forensics and Security (WIFS 2017)  4 - 7 December 2017 Rennes, France. The IEEE international Workshop on Information Forensics and Security (WIFS) is the primary annual event organized by the IEEE Information Forensics and Security (IFS) Technical Committee. Its major objective is to bring together researchers from relevant disciplines to exchange new ideas and the latest results and to discuss emerging challenges in different areas of information security. The 9th edition of WIFS will be held in Rennes, France, from December 4, to December 7, 2017. WIFS 2017 will feature keynote lectures, tutorials, technical & special sessions, and also demo and ongoing works sessions.

Important dates:

  • Paper submission deadline: June 19, 2017
  • Notification of paper acceptance: September 18, 2017
  • Camera-ready paper submission: October 2, 2017
  • Mandatory registration: November 6, 2017

Topics of interest include, but are not limited to:

  • - Forensics: Multimedia forensics | Counter Forensics | Acquisition Device Identification| Evidence Validation | Benchmarking
  • - Biometrics: Single or Multi-Modalities Systems | Security and Privacy | Spoofing | Performance Evaluation
  • - Security and Communication: Covert Channels | Physical Layer Security | Steganography | Secret Key Extraction | Digital Watermarking
  • - Multimedia Security: Broadcast encryption | Near duplicate detection | Data Hiding | Authentication | Forensics
  • - Information theoretic security: Differential Privacy | Adversarial Machine Learning | Game theory | Communication with Side Information
  • - Cybersecurity: Model and validation | Cloud Computing | Distributed Systems with Byzantines |Social Networks | Rumors and Alternative Facts
  • - Hardware security: New primitives |Physical Unclonable Functions | Anti-Counterfeiting | Side Channels Attacks | Forensics
  • - Surveillance: Tracking | Object / Person Detection | Behavior Analysis| Anti-Surveillance and De-identification | Privacy
  • - Network Security: Intrusion Detection | Protocols | Traffic Analysis | Anonymity | Mobile Ad-hoc Networks | Internet of Things
  • - Applied cryptography: Processing in the encrypted domain | Multiparty computation | traitor tracing | property preserving encryption

Prospective authors are invited to submit full-length, six-page papers, including figures and references. All submitted papers will go through double-blinded peer review process. The WIFS Technical Program Committee will select papers for the formal proceedings based on technical quality, relevance to the workshop, and ability to inspire new research. Accepted papers will be presented in either lecture tracks or poster sessions. Authors of the accepted papers are required to present their papers at the conference. For all questions contact WIFS’17 Technical Program Chairs at