Explore

2019 ISCWSA

International Symposium on Cryptology, Watermarking , Steganography and their Applications 2019

Ghana Technology University College, Ghana
27 - 29 March 2019
The conference ended on 29 March 2019

Important Dates

Abstract Submission Deadline
20th May 2019
Final Abstract / Full Paper Deadline
20th May 2019
Abstract Acceptance Notification
25th May 2019
Early Bird Deadline
27th May 2019

About 2019 ISCWSA

International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA 2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc..

Topics

Privacy;security;cyber security ;internet of things;communications; signal processing;networks ;security;information systems; computing;internet of things

Call for Papers

Call for Papers for May 2019: 2019 ISCWSA International Symposium on Cryptology, Watermarking , Steganography and their Applications

International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA  2019 is co-located with ICSIoT. Proceedings of full papers of the in IEEE  Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’Publons etc.. The Areas of the symposium are

-         Access Control

-         Anonymity & Pseudonymity

-         Applied Cryptography

-         Attacks & Malicious Code

-         Authentication, Identification

-         Biometrics

-         Block & Stream Ciphers

-         Blockchain Security and Privacy

-         Cryptographic Algorithms and Primitivess

-         Cryptographic Protocols

-         Cyberphysical Security

-         Data and Application Security

-         Data and Computation Integrity

-         Data Protection

-         Denial of Service Protection

-         Embedded System Security

-         Formal Methods for Security

-         Hash Functions

-         Identity Management

-         Key Management

-         Language-Based Security

-         Malware Analysis and Detection

-         Network Security

-         Security and Privacy for Big Data

-         Security and Privacy in the Cloud

-         Security in Content Delivery

-         Security in Crowdsourcing

-         Security in Grid Computing

-         Security in the Internet of Things

-         Security in Location Services

-         Security in Pervasive Systems

-         Security in Social Networks

-         Sensor Network Security

-         Trust Management

-         Usable Security

-         Virtual Private Networks

-         Wireless and Mobile Security

-         Peer-to-Peer Security & Privacy

-         Privacy-Enhancing Technologies

-         Public Key Cryptography

-         Secure Distributed Computing

-         Security Architectures

-         Security Metrics

-         Security Models

-         Security Policies

-         Cyber-Physical System

-         Cryptographic Algorithms

-         Trust Management

-         Attacks and Defenses

-         Authentication

-         Stream Cipher

-         Block Cipher

-         Key Management

-         Block Chain

-         Bitcoin

-         Security and Privacy

-         Public Key Infrastructure (PKI)

-         Quantum Cryptography

-         ABE, KDE

-         Cyber Security

-         Web Security

-         Android Security

-         FUZZY LOGIC-based Information Security Systems

-         Vulnerability Assessment

-         Cyber Forensic

-         Secure Techniques using AI

-         Secure Techniques for Big Data

-         Security in Image and Computer Vision

-         Honeypot

-         FOBO, NOMO

-         Authentication, Copyright protection, DRM, and forensic watermarking

-         Channel coding techniques for watermarking

-         Convolutional neural networks (CNN) and deep learning

-         Combination of data hiding and cryptography

-         Digital image and media forensics and anti-forensics

-         Document Security

-         Information theoretic, stochastic and capacity aspects of data hiding

-         Large-scale experimental tests and benchmarking

-         Media forensics use-cases, methodologies and tools

-         Statistical and perceptual models of multimedia content

-         Reversible data hiding

-         Robust perceptual hashing

-         Security issues, including attacks and counter-attacks

-         Steganography and steganalysis

-         Source identification

-         Visual cryptography and secret image sharing

-         Identity Management

-          Multimedia Watermarking for DRM

-          Fragile Watermarking for content authentication

-          Chaotic maps for security of Multimedia applications

-          Information hiding and cryptography

-          New applications of digital watermarking

-          Digital forensics for multimedia data

-          Protection systems against personal identity theft

-          Reversible watermarking

-          Integrity verification of multimedia content

-          Security analysis of watermarking algorithms

-          Biometrics for multimedia

-          Attacks to watermarking systems

-          Benchmarking of watermarking

-          Multimedia fingerprinting

-          Steganography and steganalysis

-         Mathematical modeling of embedding and detection

-         Information theoretic, stochastic aspects of data hiding

-         Security issues, including attacks and counter-attacks

-         Combination of data hiding and cryptography

-         Optimum watermark detection and reliable recovery

-         Estimation of watermark capacity

-         Channel coding techniques for watermarking

-         Large-scale experimental tests and benchmarking

-         New statistical and perceptual models of multimedia content

-         Reversible data hiding

-         Data hiding in special media

-         Data hiding and authentication

-         Steganography and steganalysis

-         Digital multimedia forensics & anti-forensics

-         Copyright protection, DRM, forensic watermarking

-         Visual cryptography & secret image sharing

-         Security based on human vision system

-         Information hiding techniques

-         Studies regarding the use of information hiding in cybercrime

-         Analysis of cybercrime cases related to CUIng

-         Large scale coordinated actions by LEAs from CUIng perspective

-         New steganographic & steganalysis methods

-         Local, air-gapped, and network covert channels

-         Novel countermeasures against information hiding techniques: detection, prevention, limitation

-         Evasion, obfuscation and anti-forensics techniques used by cybercriminals

-         Traffic type obfuscation techniques e.g. traffic morphing

-         Masking network attacks with another types of threats

-         Hiding covert communication within network attacks e.g. DDoS, SPAM, etc.

-         Impersonation of one cybercriminals groups by the other

-         Underground marketplaces and their business models

-         Botnet analysis from CUIng perspective

-         Methods for botnet detection and mitigation from CUIng perspective

-         Banking Trojans from CUIng perspective

-         IoT-botnets from CUIng perspective

-         Privacy enhancing techniques

-         Analysis of underground environments

-         Legal and technical aspects of Darknet research

-         Cybercrime and CPS from CUIng perspective

-         Future scenarios in cybercrime from CUIng perspective

-         Aspects and methods for sharing strategic intelligence

-         Abusing legitimate cloud-based services for masking criminal activities

-         Abusing legitimate social media services for masking criminal activities

-         Novel applications of information hiding in networks

-         Political and business issues related to network steganography

-         Information hiding in multimedia services

-         Digital forensics

-         Network communication modelling from the viewpoint of steganography

-         and steganalysis

-         New methods for detecting and eliminating network steganography

-         etc

Proceedings of full papers of International Symposium on Cryptology, Watermarking , Steganography and their Applications ISCWSA  2019 will be added to 2019 ICSIoT conference full papers and will be submitted to IEEE Xplore, IEEE CSDL and other places such as Scopus, titles of papers will be made available in Web of Science linked to ResearcherID and Clarivate Analytics’ Publons etc.

Registration for Full Paper $300 (Short paper 3-4 pages and Full paper 5-6 pages IEEE Paper template http://icsiot.ghsociety.org/template.doc) This covers presentation and conference participation.

Registration for Abstract Only $100. (Title, Name of Authors, Affiliation, Abstract and Key words)  This covers presentation and conference participation.

All selected papers further qualified for future advancement/improvement of work-done for Special Issues in reputable Journals and Book Chapters to be indexed in reputable places such as SCOPUS. Authors will be contacted in the future for submissions to these call for papers. All selected abstracts qualify for such invitations.

Submission link: https://cmt3.research.microsoft.com/CSIoT2019   

Website : http://icsiot.ghsociety.org/

Deadline for full papers submission : 20th May 2019 Final notification of acceptance : 25th May 2019 Deadline for registration : 27th May 2019 Deadline for Camera-ready : 28th May 2019 Conference date : 29th to 31th May 2019 Venue : Ghana Technology University College, Accra Ghana.

Keep Up to Date with PaperCrowd

Sign up and follow your favorite conferences.

We are no longer accepting conference submissions on PaperCrowd. We apologise for any inconvenience.