Note


IWDW 2022 attendees will have free online access to the conference proceedings from 8 February to 8 March 2023, which are available at https://link.springer.com/book/10.1007/978-3-031-25115-3.

Introduction


The 21st International Workshop on Digital-forensics and Watermarking (IWDW 2022) is a premier forum for researchers and practitioners working on novel researches, developments and applications of digital watermarking and forensics techniques for multimedia security. IWDW 2022 is held by Guangxi Normal University and sponsored by Institute of Information Engineering, Chinese Academy of Sciences.

We invite submissions of high-quality original research papers. Each submitted paper will be reviewed by at least 2 reviewers. Two prizes are to be awarded to the best paper and the best student paper, respectively. The proceedings of IWDW 2022 will be published on the Lecture Notes in Computer Science (LNCS) by Springer.

Important Notification: Due to the ongoing global COVID-19 pandemic, IWDW 2022 is going to be held as a hybrid conference. That is, attendees from Chinese mainland are requested to attend the conference in person, and the ones from other countries/regions who are unable to make a physical presence at the conference can attend it virtually.

Click here for a PDF version of the Call for Papers.

For authors having an accepted paper, click here for the Springer licence-to-publish form.

Important Dates


Paper Submissions: 20 September 2022    30 September 2022

Notification of Paper Acceptance: 18 October 2022    2 November 2022

Camera-Ready Paper Due: 10 November 2022   12 November 2022

Topics of Interest


The topics of interest include, but are not limited to

  • Authentication, Copyright protection, DRM, and forensic watermarking
  • Channel coding techniques for watermarking
  • Convolutional neural networks (CNN) and deep learning for multimedia security
  • Combination of data hiding and cryptography
  • Fake multimedia forensics and anti-forensics
  • AI generated multimedia and detection of them
  • Information theoretic, stochastic and capacity aspects of data hiding
  • Large-scale experimental tests and benchmarking
  • Deepfake videos and detection of them
  • Statistical and perceptual models of multimedia content for multimedia security
  • Reversible data hiding
  • Robust perceptual hashing
  • Security issues in multimedia protection, including attacks and counter-attacks
  • Steganography and steganalysis (Steganology)
  • Theoretical steganology
  • Media source forensics and identification

Contacts

Email address:

Paper submission: Dr. Hong Zhang, zhanghong@iie.ac.cn

Local arrangement: Dr. Chunqiang Yu, yu_chunqiang@126.com

Website:

www.iwdw.site