UPDATE: The MPS Workshop website has been moved to We are waiting for the CCS Web Chairs to update our link.  Please visit our new site where we are posting information regarding the workshop, updates on associated journal opportunities, and more.


Call for Papers: We live in an interconnected world where ever increasing multitudes of devices and people are connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT) and Web 2.0 (i.e., online social networks, instant messaging services and P2P systems such as blockchain based networks). As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge. Multimedia data and devices have been dominating the Internet and the IoT as more and more devices are capable of producing and handling multimedia data such as audio, image, video and computer graphics. In recent years, we have witnessed an increasing number of security incidents about hacking, security breaches, data manipulation, social engineering, and new attacks against many online systems and services, many of which are related to multimedia data and/or devices. For instance, malware is hidden within an image file on a web site, and any user who visits the website can get its machine infected immediately after its web browser displays the image. We invite researchers who are working on new and innovative methods, techniques, and proofs‐of‐concepts in multimedia privacy and security to submit papers for this workshop.

Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia data (e.g., pictures, videos, audio, and computer graphics) can be created in a short period of time. When all these data are stored in a networked environment, many people can connect to it for viewing, sharing, commenting, and storing information. In addition, multimedia data in IoT networks serves a significant purpose as many people’s status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in real time. IoT opens up many possibilities for attacks since more people can broadcast themselves and allow their networks to view and share in their lives. There are also increased criminal activities in this space such as online frauds, cyber piracy, unauthorized access, malware, denial of service, phishing, social engineering, and identity theft, many of which involve multimedia data and devices. All of these present new technical challenges in related areas in cyber security such as access control, user and device authentication, data leakage protection, privacy enhancing technologies, identity management, digital watermarking, digital right management, and digital forensics. Other new challenges include new problems such as large-scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware within multimedia data, location-based privacy with high accuracy and anonymity. Our workshop will allow a specific venue for the presentation of work addressing these concerns, specific to the multimedia privacy and security sub-community.

Topics of interest include (but are not limited to):

  • Access control and authentication for multimedia privacy and security systems
  • Identity management and standards for multimedia privacy and security systems
  • Privacy and security issues and solutions related to multimedia data on IoT networks and online social network security and privacy
  • Distributed ledger technologies, blockchain and cryptocurrencies for multimedia data and devices
  • Bystander privacy
  • Augmented/Virtual reality security and privacy
  • Encryption of all multimedia data, including homomorphic encryption
  • Security and privacy in crowdsensing
  • Multimedia forensics
  • Multimedia data Leakage and exfiltration
  • Intrusion detection/prevention systems where multimedia data play a key role
  • Large-scale simulations and experiments for multimedia privacy and security problems
  • Location-based privacy and other privacy-enhancing technologies for multimedia data and systems such as images and videos on online social networks
  • Risk mitigation, reduction, and simulation
  • Malware in multimedia data and devices
  • Multimedia data security, recovery, and segregation
  • Secure integration of multimedia data in IoT and online social networks
  • Multimedia steganography and steganalysis
  • Digital watermarking
  • Digital rights management
  • Internet-connected cameras and multiview systems
  • Human factors in multimedia security and privacy products, systems and networks
  • Cloud-based multimedia systems
  • Emerging privacy and security threats in multimedia

Submission: All papers will be submitted through EasyChair:  Regular papers (10 pages, including references) will be allotted 25 minutes for their presentations, plus 5 minutes for questions and answers. Short papers (5 pages, plus references), where authors can present work in progress, will be allowed 10 minutes for their presentations and 5 minutes for questions and answers. We welcome the submission of short papers focusing on or including demonstrations of new multimedia security and privacy systems.  Submissions should be formatted according to CCS 2018 formatting requirements provided at  All submissions will be anonymized for a double-blind review, with final acceptance decisions made by the organizers based on reviewer comments. Simultaneous submissions of papers to multiple venues is not allowed.

Important Dates:

  • 9 July, 2018 – Submission Deadline (AoE)
  • 13 August, 2018 – Author Notification
  • 19 August, 2018 – Camera-Ready Papers Due
  • 15 October, 2018 – MPS Workshop

Organizing Committee:

  • Roger Hallman (SPAWAR Systems Center Pacific, San Diego, Ca, USA)
  • Shujun Li (University of Kent, UK)

Program Committee:

  • Ivan V. Bajić (Simon Fraser University, Canada)
  • Mauro Barni (University of Siena, Italy)
  • An Braeken (Vrije Universiteit Brussel, Belgium)
  • Roberto Caldelli (National Interuniversity Consortium for Telecommunications, University of Florence, Italy)
  • Samson Cheung (University of Kentucky, USA)
  • Sherman S.M. Chow (Chinese University of Hong Kong, China)
  • Tiago Cruz (University of Coimbra, Portugal)
  • Richard Guest (University of Kent, UK)
  • Hongxin Hu (Clemson University, USA)
  • Jason R.C. Nurse (University of Oxford, UK)
  • Giovanni Pau (Kore University of Enna, Italy)
  • Yogachandran Rahulamathavan (Loughborough University in London, UK)
  • Muttukrishnan Rajarajan (City, University of London, UK)
  • Kurt Rohloff (New Jersey Institute of Technology, USA)
  • Jose Romero-Mariona (SPAWAR Systems Center Pacific, USA)
  • Jamshid Shokrollahi (Robert Bosch GmbH, Germany)
  • Mary Schurgot (LGS Innovations, USA)
  • Honggang Wang (University of Massachusetts, Dartmouth, USA)
  • KokSheik Wong (Monash University Malaysia, Malaysia)
  • Yao Zhao (Beijing Jiaotong University, China)
  • Xinpeng Zhang (Shanghai University and Fudan University, China)

Previous Events: