Location, venue and maps

A clickable campus map can be found at this link right here. Note the following important locations:

  • The conference venue is the Friend Center, attached to the Computer Science building. The Sunday reception will be held in Sherrerd Hall, across the courtyard from the Friend Center. This is about 0.4miles from the Nassau Inn. The reception starts at 7pm on Sunday.
  • The Dinky Station is where the train from New York arrives on campus. This is south of the Nassau Inn, across campus by about 0.4 miles.
  • The Nassau Inn is not on this map, but it is right above 1 Palmer Square in the top center. The Inn is in the square, just past the post office.

The Banquet venue is the Mountain Lakes House, at 57 Mountain Avenue. This is a little under a mile from the Hotel, to the north.

 

Things to do in Princeton

Princeton is a small but upscale town with a thriving downtown, the Nassau Inn being right in the middle. Across from the hotel is the university campus, whose tranquil and pastoral architecture is work exploring. Beyond this, here is a list of specific locations worth checking out.

  • Visit the Princeton Art Museum.The Princeton Museum of Art is on campus, across from the Hotel.

    Also, if you are an art buff, you may want to check out the tap room in the basement of the Nassau Inn: behind the bar is one of the few murals painted in place by Norman Rockwell. As is the case with many of his works, he painted himself into it.

  • If you are in town on Sunday at 1pm, you may want to walk to the Graduate College and hear the weekly carillon concert. The graduate college is in the west end of campus, and sports a 20-ton carillon with 67 bells, one of the few in the country. Every week the carillon is played from 1 to 1:45pm.
  • Visit the Bent Spoon. This is right in the same courtyard as the Nassau Inn, and features the best gelato in New Jersey.
  • Visit Grounds for Sculplture. Off I295 driving towards Trenton, Grounds for Sculpture is a sculpture garden of unusual size. If you have a car, you might want to consider finding it.
  • If you are a history buff and have a car, you may want to check out the Princeton Battlefield. This is the site of the battle of Princeton, a turning point in the American revolutionary war. The site includes a small museum, and a replanted shoot from the Mercer Oak (Gen. Hugh Mercer died at the foot of this tree, which finally fell down from strong winds in 2002.)
  • See if you can find the steganographic message concealed in the exterior of the Computer Science building. This is the brick building merged with the Friend Center, our conference venue. Hint: the message payload is small, and it isn’t anything you don’t already know.

 

Registration Open

Registration is open for ACM MMSEC 2009, at the RegOnline online registration site.

The registration fees are as follows:

Before August 15 After August 15 Students
ACM/SIG member $335.00 ACM/SIG member $385.00 Student $200.00
Non-member $385.00 Non-member $435.00

 

MM&SEC 2009

NOTE: The submission deadline has been extended to May 7, 2009.

The 11th ACM workshop on Multimedia and Security will be held in Princeton, New Jersey, USA on September 7th and 8th of 2009.

OBJECTIVES

  • Discussion of emerging technologies in digital multimedia authentication, encryption, identification, fingerprinting, steganography and steganalysis, secure multimedia networking and biometric user authentication.
  • Identification of critical high impact research problems addressing specific deficiencies in the field of secure multimedia distribution and consumption.
  • Formulation of target applications of identified technologies in both the commercial, civilian, and military sectors.
  • Exposition of legal, business and technology policy issues relevant to multimedia security.

Scope

Papers addressing security in multimedia processing, transmission, and consumption are welcomed. Both theoretical concepts dealing with fundamental performance issues and application-oriented contributions within this scope will be considered. Software and hardware demonstrations are highly encouraged.

Topics include, but are not limited to:

Topics include, but are not limited to,
  • Multimedia watermarking, fingerprinting and identification.
  • Multimedia authentication and encryption. Signal processing in
    encrypted domains.
  • Steganography and steganalysis.
  • Data hiding in biometrics, security issues of biometrics, biometric
    template protection, security in multimodal and multifactor authentication.
  • Practical systems exhibiting data hiding characteristics.
  • Digital media forensics.
  • Multimedia network protection, privacy and security.
  • Secure multimedia system design, trusted computing, and protocol security.
  • Security evaluation and benchmarks.
  • Emerging applications.
  • Legal and business issues as well as their interaction with
    technological development.
  • Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperability and accessibility.

Paper submission and templates

The ACM formatting rules and templates can be found at
http://www.acm.org/sigs/pubs/proceed/template.html. Full papers should be 6–10
pages long, short papers 4–6 pages long.

To submit a paper, visit our submission site at https://cmt.research.microsoft.com/ACMMMS2009/. Create a new user account,
login, and follow the submission instructions.

These instructions can also be found on the submissions tab at the top of the page.