CCS MPS 2017

The 1st International Workshop on Multimedia Privacy and Security

Held on 30 October, 2017 in conjunction with the 24th ACM Conference on Computer and Communication Security (CCS 2017)

Hotel Sheraton, Downtown Dallas, Texas, USA

Scope: We live in an interconnected world where ever increasing multitudes of devices and people can be connected to each other by intelligent algorithms, apps, social networks, and the infrastructure set by Internet of Things (IoT).  As more people and their devices are connected without much restriction, the issues of security, privacy, and trust remain a challenge.  Multimedia in IoT services should provide a robust and resilient security platforms and solutions against any unauthorized access. Recent literature shows increased concerns about hacking, security breaches, data manipulation, social engineering, and new attack methods. Malware can be hidden within multimedia files and visiting infected websites can trigger its download to victims’ machines. There are a multitude of techniques to steal personal information and other sensitive media for unauthorized dissemination; imposters/identity thefts are common in social networks. In order to demonstrate the effectiveness of resilient security and privacy solutions, methods such as new standards, advance cryptography, improved algorithms for intrusion detection, personalized privacy, and isolation of questionable or malicious files can be used independently or all together to minimize the threats. 

Multimedia has expanded beyond the scope its original definition. With the rise of social media, large quantities of multimedia (e.g., pictures, videos, data, analytics and personal information) can be created in a short period of time.  When all these data are stored in a cloud environment, many people can connect to these services for viewing, sharing, commenting, and storing information.  IoT represents a collection of devices, platforms, and software that allow people to store and share data in the cloud and also connects different types of clouds altogether.  Hence, multimedia in the IoT serves a significant purpose as many people’s updates, status, locations, and live actions can be seen, disseminated, tracked, commented on, and monitored in near real time.  IoT opens up many possibilities since more people can broadcast themselves and allow their networks to view and share in their lives.  There are also increased fraudulent activities, cybercrimes, unauthorized access, malicious attacks, phishing, and impersonating/stealing identities.  This presents challenges for existing areas such as access control, authentication, data leakage, permission, social engineering, denial of service, and identity management for the attackers to impose identity, steal information, and manipulate data in the IoT environment.  Challenges also include new problems such as large scale attacks and prevention, the strength of security protection (e.g., common encryption algorithms), hiding malware with multimedia, location-based privacy with high accuracy and anonymity, underground criminal networks, and hidden security breaches.  Our workshop will allow a specific venue for the publication of work addressing these concerns, specific to the IoT ecosystem.  We invite research into new and innovative methods, techniques, and proofs‐of‐concepts supported by strong theory/algorithms and simulation/experiments to submit papers for this workshop.

Topics of interest include (but are not limited to):

  • Access control and authentication
  • IoT and Social Network security and privacy
  • Encryption of all types in multimedia, including homomorphic encryption and multi-party computation
  • Information Forensics
  • Data Leakage and Exfiltration
  • Intrusion Detection/Prevention Systems
  • Largescale simulations and experiments for security
  • Location-based privacy and other privacy-enhancing technologies
  • Risk Mitigation, reduction, and simulation
  • Identity management and standards
  • Data security, recovery, and segregation
  • Secure integration of IoT and social networks
  • Steganography
  • Internet-connected cameras and Multiview Systems
  • Human Factors in Multimedia Security and Privacy
  • Emerging Privacy and Security Threats in Multimedia


  • 9:00 - 10:00 Session I -- Privacy
    • Unwinding Ariadne's Identity Thread: Privacy Risks with Fitness Trackers and Online Social Networks; Angeliki Aktypi, Jason Nurse, and Michael Goldsmith (University of Oxford, UK)
    • A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures; Tetsushi Ohki (Shizuoka University, Japan) and Akira Otsuka (Institute of Information Technology, Japan)
  • 10:00 - 10:45 Coffee Break
  • 10:45 - 12:00 Session II -- Invited Keynote Address
    • An NSF View of Multimedia Privacy and Security; Jeremy Epstein (National Science Foundation, USA)
  • 12:00 - 2:00 Lunch
  • 2:00 - 3:00 Session III -- Image and Video Security
    • Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API; Hossein Hosseini, Baicen Xiao, and Radha Poovendran (University of Washington, USA), Andrew Clark (Worcester Polytechnic Institute, USA)
    • Approximate Thumbnail Preserving Encryption; Byron Marohn (Intel; Portland State University, USA), Charles Wright and Wu-Chi Feng (Portland State University, USA), Mike Rosulek and Rakesh B. Bobba (Oregon State University, USA)
  • 3:00 - 3:45 Coffee Break
  • 3:45 - 5:30 Session IV -- Intrusion Detection and Prevention
    • Detecting Spying and Fraud Browser Extensions; Gaurav Varshney and Manoj Misra (Indian Institute of Technology, Roorkee, India), and Pradeep K. Atrey (State University of New York at Albany, USA)
    • Discussion Panel, "Multimedia Security and Privacy with IoT and Social Networks", moderated by Kurt Rohloff (New Jersey Institute of Technology, USA) and RogerHallman (SPAWAR Systems Center Pacific, USA)

Submission: All papers will be submitted through EasyChair:  We are accepting Full, Short, and Demo Papers.  Full Papers (10-12 pages) will be allotted 25 minutes for their presentations, plus 5 minutes for questions.  Short Papers (6-8 pages) will be allotted 20 minutes for their presentations, plus 5 minutes for questions.  Demo Papers (4-8 pages) will be allotted 15 minutes for their presentations, 10 minutes for a code review, and 5 minutes for questions.  Submissions should be formatted according to the CCS 2017 formatting requirements provided at  All submissions will be anonymized for a double-blind review, with final acceptance decisions made by the organizers based on reviewer comments.  Simultaneous submissions of papers to multiple venues is not allowed.

Important Dates:

  • 14 August, 2017 – Submission Deadline - Anywhere on Earth
  • 4 September, 2017 – Author Notifications
  • 17 September, 2017 – Camera-Ready Papers Due

Organizing Committee:

  • Chair – Mr. Roger Hallman, SPAWAR Systems Center Pacific, San Diego, Ca, USA
  • Co-chair – Professor Kurt Rohloff, New Jersey Institute of Technology, Newark, NJ, USA
  • Co-chair – Professor Victor Chang, Xi’an Jiaotong Liverpool University, Suzhou, China

Program Committee:

  • Professor Ivan V. Bajić ​– Simon Fraser University, Canada
  • Professor An Braeken – Vrije Universiteit Brussel, Belgium
  • Professor Roberto Caldelli CNIT - National Interuniversity Consortium for Telecommunications, University of Florence, Italy
    Professor Samson Cheung ​– University of Kentucky, USA
  • Professor Sherman S.M. Chow – Chinese University of Hong Kong, Hong Kong
    Professor Tiago Cruz – University of Coimbra, Portugal
  • Professor Hongxin Hu ​– Clemson University, USA
  • Dr. Shujun Li – University of Surrey, United Kingdom
  • Dr. Jason R.C. Nurse – University of Oxford, United Kingdom
  • Professor Giovanni Pau – Kore University of Enna, Italy
  • Dr. Jose Romero-Mariona ​– SPAWAR Systems Center Pacific, USA
  • Dr. Jamshid Shokrollahi ​– Robert Bosch GmbH, Germany
  • Dr. Mary Shurgot ​– LGS Innovations, USA
  • Professor Honggang Wang – University of Massachusetts, Dartmouth, USA