1. Home
  2. Information for Authors
  3. Call for Papers

Call for Papers

Important update: all papers must be submitted on Conference Management Toolkit (CMT) following this link. All papers must be assigned a primary session in order to ease the process of reviewer selection.

You can find here a pdf / flyer version of this Call for Papers.
On the behalf of Organizing Committee, it is our great pleasure to invite you to the 14th IEEE International Workshop on Information Forensics and Security (WIFS) 2022 that will be held 12th-16th December in Shanghai, China.

WIFS is the primary annual event organized by the IEEE Information Forensics and Security (IFS) Technical Committee of the IEEE Signal Processing Society (SPS). It brings together academic researchers, government agencies and industrial from all disciplines associated with Information Forensics and Security to discuss emerging challenges and project proposals, exchange fresh ideas, share the state-of-the-art results and technical expertise as well as describe novel methods and innovative applications. Prospective authors must submit their papers following the IEEE conference template (available here) and are limited to 6 pages (including bibliography and figures).
Important note: the deadline for paper submission is slightly earlier this year: 15th June 2022 29th June 2022 (paper must be registered by June 22th see important dates for details)

Authors should devote special care that fonts, images, tables, and figures comply with common standards and do not generate problems for reviewers. Submissions not meeting the formatting requirements risk rejection without consideration of their merits.

Authors are invited to submit research papers presenting original works and addressing Information Forensics and Security aspects in a broad sense.

Topics of interest include, but are not limited to, the use or advances of the following methods:
  • Applied Cryptography
  • Biometrics
  • Blockchain Security
  • Information Theoretic Security
  • Data Privacy and Anonymity
  • Privacy and Surveillance
  • Hardware Security
  • Memory Forensics and Carving
  • Physical Layer Security
  • Network Security
  • Security, Privacy and Watermarking of Machine Learning
  • Deep Learning for Forensics
  • Digital Forensics and Analysis
  • Fake News and Misinformation
  • Multimedia Content Hash
  • Steganography, Steganalysis and Covert Communications
  • Watermarking, Data Hiding and Content Protection
Date of update 09 novembre 2022