IMPORTANT DATES

2024
Journal-first (JIST/JPI) Submissions

∙ Journal-first (JIST/JPI) Submissions Due 31 July
∙ Final Journal-first manuscripts due 31 Oct
Conference Papers Submissions
∙ Early Submission Deadline
15 Aug
∙ Extended Submission Deadline
30 Sep
∙ Late Submission Deadline
15 Oct
∙ FastTrack Proceedings Manuscripts Due 8 Jan 2025
∙ All Outstanding Manuscripts Due 21Feb 2025
Registration Opens mid-Oct
Demonstration Applications Due 21 Dec
Early Registration Ends 18 Dec


2025
Hotel Reservation Deadline 10 Jan
Symposium Begins
2 Feb
Non-FastTrack Proceedings Manuscripts Due
14 Feb

Media Watermarking, Security, and Forensics 2025

Conference keywords: watermarking, steganography, security, forensics, authentication

On this page

 

Conference Overview

The exponential growth in digital media accessibility, spanning images, audio, video, graphics, and text, has sparked the development of novel applications, while also introducing a host of significant security challenges and risks. These developments have catalyzed substantial research and development efforts in digital watermarking, steganography, data hiding, forensics, deepfakes, media identification, and encryption, all aimed at safeguarding the authenticity, veracity, security, and ownership of media content. Recent advancements in AI (Artificial Intelligence) algorithms, models, and tools, coupled with the availability of sophisticated GPU platforms, have reinvigorated research in these domains, leading to remarkable outcomes. These advancements have given rise to new paradigms and applications that optimize the use and monetization of media objects without infringing on their ownership rights or undermining their credibility.

The Media Watermarking, Security, and Forensics Conference stands as the premier event for sharing high-caliber, innovative research in these pivotal areas. It provides an exceptional forum for researchers and practitioners to present their latest advancements and stay abreast of the latest trends in watermarking, security, and forensics. The conference's technical program is enriched by keynote addresses, panel discussions, and short demonstrations from leading figures in both academia and industry. This emphasis on the practical application of research findings in industry settings distinguishes the conference and enhances its contributions to the field.

A notable feature of the conference is its streamlined submission process, which requires only a structured abstract outlining the ongoing work. This encourages the early dissemination of preliminary findings and original concepts directly from the research lab, promoting the swift initiation of new research directions. Such a feature greatly fosters the presentation of nascent innovations, enabling prompt dialogue and feedback, and thus propelling the research agenda in the field forward.

The full papers of the accepted abstracts are due a few weeks before the conference.

 

2025 Conference Topics

Digital watermarking, steganography and data hiding

  • Cutting-edge watermarking algorithms and theoretical models
  • AI-based watermarking techniques and their applications
  • Implementation strategies and benchmarking methodologies
  • Security protocols and systems
  • Novel approaches to steganalysis and combating attacks
  •  

    Media forensics and authentication

  • Watermarking/Fingerprinting and traitor tracing advancements
  • Device identification techniques and protocols
  • Content authentication methodologies
  • Detection and mitigation of deep fake content
  • Computer forensics methodologies
  • Recovery of deleted multimedia and near-duplicate image/video retrieval methods
  • AI-based forensics and authentication techniques
  •  

    Media encryption and protection

  • Advanced encryption and decryption techniques
  • Visual encryption methods and applications
  • Signal processing in encrypted domains
  • Digital rights management innovations
  • Integration of AI into encryption strategies
  •  

    Optical document security

  • Security feature advancements for banknotes, passports, ID cards, and visas
  • Substrate and printing technology innovations
  • Development of optically variable security measures
  • Authentication and examination methodologies
  •  

    Biometrics and user identification

  • Cutting-edge feature extraction and management techniques
  • Advancements in biometric security and countermeasures against attacks
  • Integration of AI algorithms into biometric systems
  • Multimodal biometric applications and protocols
  • Innovations in biometric template protection and authentication
  • Biometric systems for mobile computing applications
  •  

    Media identification and physical object identification and interaction

  • Novel approaches to watermarking and digital fingerprinting
  • Robust hashing methodologies and their applications
  • AI-based techniques for media identification
  • Media database search and mobile visual search
  • Advances in hardware security
  • Consumer packaging identification and protection
  • Integration of watermarking, RFID tags, barcode technology, and near field communication (NFC) into security protocols
  • Security of the Internet of Things and big data, and their roll in identification and interaction
  •  

    Autonomous technology security and privacy

  • Security and privacy considerations for autonomous vehicles, self-driving cars, collaborative robots, and drones
  • Utilization of AI algorithms for enhancing autonomous driving safety and privacy measures


  • These topics represent the forefront of research and innovation in the field and will serve as focal points for the 2025 conference discussions and presentations.

    2025 Special Sessions

    TBA

    2025 Committee

    Conference Chair

    Adnan Alattar, Digimarc Corporation (US)

    Program Committee

    Sebastiano Battiato, Università degli Studi di Catania (Italy)
    Marc Chaumont, Laboratory d'Informatique de Robotique et de Microelectronique de Montpellier (France)
    Scott Craver, Binghamton University (US)
    Edward Delp, Purdue University (US)
    Jana Dittmann, Otto-von-Guericke-University Magdeburg (Germany)
    Jean-luc Dugelay, EURECOM (France)
    Touradj Ebrahimi,  École Polytechnique Fédérale de Lausanne (EPFL) (Switzerland)
    Jessica Fridrich, Binghamton University (US)
    Peter Grönquist, École Polytechnique fédérale de Lausanne (EPFL) (France)
    Luca Guarnera, Università degli Studi di Catania (Italy)
    Anthony T.S. Ho, University of Surrey (UK)
    Jennifer Newman, Iowa State University (US)
    William Puech, Laboratory d’Informatique de Robotique et de Microelectronique de Montpellier (France)
    Husrev Taha Sencar, TOBB University of Economics and Technology (Turkey)
    Martin Steinebach, Fraunhofer SIT (Germany)
    Claus Vielhauer, Fachhochschule Brandenburg (Germany)
    Svyatoslav Voloshynovskiy, University de Genève (Switzerland)
    Xuandong Zhao, UC Santa Barbara (US)

     

    No content found

    No content found

    No content found