tl img
tl img

News

02/2013
IH 2012 proceedings are now available from Springer.

06/01/2012
Presentations and pre-proceedings are now available online.

05/05/2012
The program is now online.

04/13/2012
Those who plan to attend IH 2012 but have not arranged accommodation yet should mind that the special conference rates for the Hotel Shattuck Plaza are only valid for reservations made by Monday, April 16. Read more ...

04/07/2012
Registration is now open.

04/06/2012
The list of accepted papers is now online.

03/06/2012
Civolution is sponsoring IH 2012. We thank Civolution for their support. N.B. Civolution is now recruiting Research Scientists.

02/16/2012
Technicolor is sponsoring IH 2012. We thank Technicolor for their continued support.

02/11/2012
The electronic paper submission system is now closed for submissions. We thank all authors for their contribution.

02/01/2012
Information about conference venue and hotel is now online.

12/2011
The IH 2012 submission system is now accepting your manuscripts.

09/2011
IH 2011 proceedings are now available from Springer.

Next Event

The next IH event will be organized as a joint meeting with the ACM MM&Sec Workshop:

ACM Workshop on Information Hiding
and Multimedia Security 2013

Montpellier, June, 17-19, 2013

http://www.ihmmsec.org

About Information Hiding

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to digital investigators and privacy techniques try to hide relational information such as the actors' identities in anonymous communication systems. These and other topics share the notion that security is defined by the difficulty to make (or avoid) inference on certain properties of host data, which therefore has to be well understood and modeled.

Current research themes include:

  • Anonymity and privacy
  • Covert/subliminal channels
  • Digital rights management
  • Fingerprinting and embedding codes
  • Multimedia and document security
  • Multimedia forensics and counter forensics
  • Novel applications of information hiding
  • Other data hiding domains (e.g. text, software, etc.)
  • Security metrics for information hiding
  • Steganography and steganalysis
  • Theoretical aspects of information hiding and detection
  • Watermarking (algorithms, security, attacks)

Thank You!

The organizers of IH 2012 thank all participants for making this event a successful and interesting conference. IH 2012 would also not have been possible without the generous financial support by Technicolor and Civolution, as well as the organizers of IH 2011 in Prague. We also would like to thank ICSI Berkeley, UC Davis, the Daivd Brower Center, Rockridge Market Hall Caterers and Yacht Connections International for their contribution to the success of this year's conference.

Local Support

IH 2012 Sponsors