Conference Information
WIFS 2019: IEEE International Workshop on Information Forensics and Security
https://wifs2019.tudelft.nl
Submission Date:
2020-06-30 Extended
Notification Date:
2020-09-15
Conference Date:
2019-12-09
Location:
Delft, The Netherlands
Years:
11
Viewed: 21470   Tracked: 5   Attend: 4

Call For Papers
IEEE WIFS is the unique workshop series organized by the IEEE Information Forensics and Security (IFS) Technical Committee. It is a major forum that brings together researchers from a large range of areas of information forensics and security to discuss advanced research and developments in several topics. The 11th edition of WIFS will special sessions, along with oral and poster sessions for technical research. Topics of interest include, but are not limited to:

Applied Cryptography 	
Information Theoretic Security
Biometrics 	
Network Security
Communication and Physical Layer Security 	
Steganography and Covert Communications Surveillance
Data Privacy and Anonymity 	
Surveillance
Digital Forensics and Analysis 	
Usability and Human Factors
Hardware Security 	
Watermarking and Multimedia Content Protection

Regular Papers: Regular Paper submission to WIFS 2019 can be up to 6 pages including bibliography. All papers should be prepared according to the IEEE conference template that will be provided on the workshop website. Papers accepted and presented at WIFS 2019 will be available in the IEEE Xplore digital library. It is IEEE policy to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple journals, conferences, or workshops with proceedings. Double submissions will be immediately rejected.

Demos and Work-in-Progress: The Demo and Work-in-Progress session at WIFS 2019 is open to researchers in academia and to industrial exhibitors. Submissions with an emphasis on application related to forensics and security are encouraged. Please see the website for more details.

Authors of papers accepted recently for the IEEE Transactions on Information Forensics and Security or the IEEE Signal Processing Letters will be given the opportunity to present their work subject to approval by the program chairs.
Last updated by Xy Z in 2020-04-24
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
bb3ICISSInternational Conference on Information Systems Security2025-08-102025-10-032025-12-16
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
cIH & MMSECACM Workshop on Information Hiding and Multimedia Security2025-02-282025-04-122025-06-18
cCRITISInternational Conference on Critical Information Infrastructures Security2018-04-302018-06-182018-09-24
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
b4MINESInternational Conference on Multimedia Information Networking and Security2013-07-202013-07-252013-11-01
Related Journals
CCFFull NameImpact FactorPublisherISSN
Information Fusion15.5Elsevier1566-2535
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
The Information Society3.0Taylor & Francis0197-2243
cEURASIP Journal on Information Security2.1Springer1687-417X
Journal of Information Science1.7SAGE0165-5515
cIET Information Security1.300IET1751-8709
Information Polity1.300IOS Press1570-1255
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650