Conference Proceedings

Proceedings of the MCSS'2012 conference are now available online: http://www.springerlink.com/content/978-3-642-30720-1/?MUD=MP

Aims and Goals of the Conference

In recent years, Multimedia Communications, Services and Security have been contributing extensively to our life experience and are expected to be among the most important applications in the future. The objective of the Multimedia Communications, Services & Security (MCSS’12) conference is to present research and developing activities contributing to aspects of multimedia communications, systems and security. We are inviting both theoretical and experimental papers as well as work-in-progress research. The main topics of interest are as follows:
  1. Audio-visual systems including novel multimedia architectures and SOMA
  2. Multimedia and data fusion in personal, sensor, p2p and ad-hoc networks
  3. Acquisition of multimedia content and QoE management in content distribution networks
  4. Seamless mobility of multimedia services including mobile and wireless access networks
  5. Watermarking technology and applications
  6. Network measurement, monitoring and performance evaluation of multimedia services
  7. Reliability, availability, serviceability of multimedia services
  8. Searching methods, search engines and applications
  9. Multimedia surveillance and compound security, object tracking and threat detection
  10. Semantic description of multimedia data and metadata information systems
  11. Intelligent monitoring of objects and areas, recognition with automatic categorization
  12. Modern computing methods for multimedia systems and authentication of multimedia content
  13. Interactive multimedia applications
  14. Ethical issues and law aspects in video surveillance, Internet monitoring, security research
  15. Intelligent urban environment observation systems including safety monitoring and evacuation
  16. Cybercrime – threats and counteracting
  17. Cryptography and data protection, including quantum cryptography
  18. Evaluation of security features in end-user applications
  19. Parallel processing of audio & video, video processing through cloud computing, video transcoding
  20. Intelligent searching of multimedia content
  21. Biometric applications
  22. Privacy protection
The conference objectives are in conformance with the objectives of the FP7 Security Research. During the conference, a presentation of the FP7 Security Research will be shown. Objectives of the FP7 Security Research are as follows:
  • to develop technologies for building capabilities needed to ensure the security of citizens from threats (terrorism, natural disasters, crime), while respecting human privacy,
  • to ensure optimal use of technologies to the benefit of civil European security,
  • to stimulate the cooperation for civil security solutions,
  • to improve the competitiveness of the European security industry, and
  • to deliver mission-oriented research results to reduce security gaps.

Call for Papers

Download the Call for Papers: Adobe PDF, 223 kB

Paper Submission

The proceedings of the MCSS 2012 will be published in the Communications in Computer and Information Science (CCIS) series from Springer. You can find more information about the series at http://www.springer.com/series/7899. The proceedings from MCSS 2011 are available at http://www.springer.com/978-3-642-21511-7.

The maximum length of papers should be 4000 words including tables and figures. Please adhere to the formatting standard for a 10-12 page manuscript of Springer-Verlag LNCS (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). The cover page must contain an abstract of about 120-180 words, 3-5 keywords, name and affiliation of author(s) as well as the corresponding author's e-mail and postal address.

To register or submit a paper, please visit EDAS. The only acceptable review manuscript format is PDF. Please make sure your manuscript has all fonts embedded.

Consistent with standard practice, each submitted paper will receive rigorous peer reviewing. Papers will be selected based on their originality, timeliness, significance, relevance and clarity of presentation. The selection will be based on full papers. Submission implies the willingness of at least one of the authors to register and present the paper, if accepted. All papers accepted to the conference are expected to be presented.

Camera Ready

Camera ready submission is handled through EDAS. In order to upload your final paper, you need a submission code, which will be provided upon successful registration. Please keep in mind that the camera ready paper must be formatted according to the provided template. The paper size needs to be A4 or US Letter, no headers or footers are allowed. The camera ready paper needs to be provided either in the Microsoft Word format (*.doc) or as a zipped (*.zip) folder with LaTeX sources. In case of the LaTeX variant, please provide also a compiled PDF document. Failure to conform to these requirements will result in removal of your paper from the conference.

Poster Preparation

While preparing your posters, please keep in mind that the maximum size of the poster board is 140x140 cm. A double-side tape for fixing the posters will be provided.

Special Issue of Multimedia Tools and Applications

A special issue of the journal Multimedia Tools and Applications on the topic of Multimedia Communications, Systems, and Security will be open for submission after the conference. Selected highest quality papers from the conference, will be invited to prepare extended versions of the manuscripts for consideration to the journal. The extended papers will receive rigorous peer review, performed by experts in the field.

Important Dates

Submission: 5 February 2012
Submission: 19 February 2012
Notification: 1 March 2012
Notification: 15 March 2012
Camera ready: 22 March 2012
Conference: 31 May - 1 June 2012
Time D6/201 D6/Lobby

Thursday, May 31

08:00-   Registration
10:00-11:00 OP: Object Positioning  
11:00-11:30   Coffee Break
11:30-13:00 DP: Privacy & Data Protection using Digital Watermarking and Cryptography  
13:00-14:30 Lunch in Krakus restaurant
14:30-15:30 EI: Ethical Issues and Procedures in Security Research on Video Surveillance and Internet Monitoring  
15:30-17:30   Coffee Break
16:00-18:00   PS: Posters and Expo
19:00-24:00 Social Event in Krakus Restaurant

Friday, June 1

09:30-11:00 TD: Object & Threat Detection  
11:00-11:30   Coffee Break
11:30-12:30 DC: Data Compression & Distribution  
12:30 - 14:00 Lunch in Lunch Cafe / Mensa restaurant
14:00-15:00 HM: Human-Centric Multimedia Analysis & Synthesis  
15:00-15:30   Coffee Break
15:30-17:30 CT: Cybercrime - Threats & Counteracting  
17:30- Best Paper Awards & Closing Ceremony  

10:00 - 11:00

OP: Object Positioning

Room: D6/201
Chair: Andrzej Czyzewski (Gdansk University of Technology, Poland)
Ontology Oriented Storage, Retrieval and Interpretation for a Dynamic Map System
Igor Wojnicki (AGH University, Poland); Piotr Szwed (AGH University of Science and Technology, Poland); Wojciech Chmiel (AGH University of Science and Technology, Poland); Sebastian Ernst (AGH University of Science and Technology, Poland)
Multi-Camera Vehicle Tracking Using Local Image Features and Neural Networks
Piotr Dalka (Gdansk University of Technology, Poland)
INSTREET - Application for Urban Photograph Localization
Michał Grega (AGH University of Science and Technology, Poland); Seweryn Lach (AGH University of Science and Technology, Poland); Boguslaw Cyganek (AGH University of Science and Technology, Poland)

11:30 - 13:00

DP: Privacy & Data Protection using Digital Watermarking and Cryptography

Room: D6/201
Chair: Christian Kollmitzer (FHTW Wien, Austria)
Real Data Performance Evaluation of CAISS Watermarking Scheme
Piotr Guzik (AGH University of Science and Technology, Poland); Andrzej Matiolański (AGH University of Science and Technology, Poland); Andrzej Dziech (AGH University of Science and Technology, Poland)
Video Watermarking based on DPCM and Transformcoding using permutation spectrum and QIM
Jakob Wassermann (FHTW Wien, Austria); Peter Wais (University of Applied Sciences Technikum Wien, Austria)
Security Infrastructures: Towards the INDECT System Security
Nikolai Stoianov (Technical University of Sofia, Bulgaria); Manuel Urueña (Universidad Carlos III de Madrid, Spain); Marcin Niemiec (AGH University of Science and Technology, Poland); Petr Machník (VSB-Technical University of Ostrava, Czech Republic); Gema Maestro (APIF Moviquity SA Madrid, Spain)
Asynchronous Physical Unclonable Functions - AsyncPUF
Julian Murphy (Queens University Belfast & CSIT, United Kingdom)

14:30 - 15:30

EI: Ethical Issues and Procedures in Security Research on Video Surveillance and Internet Monitoring

Room: D6/201
Chair: Jan Derkacz (AGH University of Science and Technology, Poland)
How considering Ethics fosters the acceptance of Security Research
Anne Demoisy (Rhizome s.a., Belgium)
Security systems based on profiling: legal context and fundamental rights challenges
Katarzyna Szymielewicz (Panoptykon Foundation, Poland)
Technology as a tool to fight serious crime (legal and ethical issues)
Emil Pływaczewski (University of Białystok, Poland)

16:00 - 18:00

PS: Posters and Expo

Room: D6/Lobby
Resolving Conflicts in Object Tracking in Video Stream Employing Key Point Matching
Grzegorz Szwoch (Gdansk University of Technology, Poland)
Scenario-Driven System for Open Source Intelligence
Edward Nawarecki (AGH, Poland); Grzegorz Dobrowolski (AGH University of Science and Technology, Poland); Jacek Dajda (AGH University of Science and Technology, Poland); Aleksander Byrski (AGH University of Science and Technology, Poland); Marek Kisiel-Dorohinicki (AGH University of Science and Technology, Poland)
A Novel Keystream Generator with Cryptographic Purpose
Nikolay Rusev Nikolov (University of Shoumen, Bulgaria); Nikolai Stoianov (Technical University of Sofia, Bulgaria)
Voice Trust in Public Switched Telephone Networks
Zbigniew Piotrowski (Military University of Technology, Poland); Waldemar Grabiec (Military University of Technology, Poland)
Towards hardware implementation of INDECT Block Cipher
Marcin Niemiec (AGH University of Science and Technology, Poland); Jakub Dudek (AGH University of Science and Technology, Poland); Lukasz Romanski (AGH University of Science and Technology, Poland); Marcin Święty (AGH University of Science and Technology, Poland)
Multiple sound sources localization in real time using acoustic vector sensor
Jozef Kotus (Gdansk University of Technology, Poland)
Internet Identity Analysis And Similarities Detection
Krzysztof Wilaszek (AGH University of Science and Technology, Poland); Tomasz Wojcik (AGH University of Science and Technology, Poland); Andrzej Opaliński (AGH University of Science and Technology, Poland); Wojciech Turek (AGH University of Science and Technology, Poland)
Advanced architecture of the Integrated IT Platform with high security level
Gerard Frankowski (PSNC, Poland); Marcin Jerzak (Institute of Bioorganic Chemistry, Poland)
Speaker recognition based on multilevel speech signal analysis on Polish corpus
Szymon Drgas (Poznan University of Technology, Poland); Adam Miroslaw Dabrowski (Poznan University of Technology, Poland)
Web-based Knowledge Acquisition and Management System Supporting Collaboration for Improving Safety in Urban Environment
Weronika Adrian (AGH University of Science and Technology, Poland); Krzysztof Kaczor (AGH University of Science and Technology, Poland); Antoni Robert Ligęza (AGH University of Science and Technology, Poland); Grzegorz Nalepa (AGH University of Science and Technology, Poland)
Intelligent Identification of Dangerous Situation Based on Fuzzy Classifiers
Aleksandra Maksimova (Insitute of Applied Mathematics and Mechanics, Ukraine)
Fundamental frequency extraction in speech emotion recognition
Bartłomiej Stasiak (Technical University of Lodz, Poland); Krzysztof Rychlicki-Kicior (Technical University of Lodz, Poland)
New Efficient Method of Digital Video Stabilization for In-Car Camera
Aleksander Lamża (University of Silesia in Katowice, Poland)
Polish speech dictation system as an application of voice interfaces
Grażyna Demenko (PUT, Poland)
Performance of Basic Spectral Descriptors and MRMR Algorithm to the Detection of Acoustic Events
Eva Vozarikova (Technical University of Kosice, Slovakia); Martin Lojka (Technical University of Kosice, Slovakia); Jozef Juhár (Technical University of Kosice, Slovakia); Anton Cizmar (Technical University of Kosice, Slovakia)
The Essential Security Aspects in Case of Protection of Critical Infrastructure - Practical Issues analysis as part of protection of Tele-information Critical Infrastructure Methodology
Grzegorz Sowa (ComArch S.A., Poland), Tomasz Grabowski (ComArch S.A., Poland), Monika Drabik (ComArch S.A., Poland)

09:30 - 11:00

TD: Object & Threat Detection

Room: D6/201
Chair: Bozena Kostek (Gdansk University of Technology, Poland)
Application of virtual gate for counting people participating in large public events
Maciej Szczodrak (Gdansk University of Technology, Poland); Krzysztof Kopaczewski (Gdansk University of Technology, Poland); Andrzej Czyzewski (Gdansk University of Technology, Poland)
Object detection and measurement using stereo images
Christian Kollmitzer (FHTW Wien, Austria)
Video Detection Algorithm Using an Optical Flow Calculation Method
Andrzej Glowacz (AGH University of Science and Technology, Poland); Zbigniew Mikrut (AGH University of Science and Technology, Poland); Piotr Pawlik (AGH University of Science and Technology, Poland)
Towards Robust Visual Knife Detection in Images: Active Appearance Models Initialised with Shape-specific Interest Points
Marcin Kmieć (AGH University of Science and Technology, Poland); Andrzej Glowacz (AGH University of Science and Technology, Poland); Andrzej Dziech (AGH University of Science and Technology, Poland)

11:30 - 12:30

DC: Data Compression & Distribution

Room: D6/201
Chair: Jakob Wassermann (FHTW Wien, Austria)
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
Piotr Czyżyk (Gdansk University of Technology, Poland); Janusz Cichowski (Gdansk University of Technology, Poland); Andrzej Czyzewski (Gdansk University of Technology, Poland); Bozena Kostek (Gdansk University of Technology, Poland)
Platon Scientific HD TV Platform in PIONIER Network
Mirosław Czyrnek (Poznań Supercomputing and Networking Center (PSNC), Poland); Jędrzej Jajor (Poznan Supercomputing and Networking Center, Poland), Ewa Kusmierek (Poznan Supercomputing and Networking Center, Poland); Cezary Mazurek (Poznan Supercomputing and Networking Center, Poland); Maciej Stroiński (Poznan Supercomputing and Networking Center, Poland), Jan Weglarz (Pozan University of Technology, Poland)
Mobile Data Collection Networks for Wireless Sensor Networks
Kai Li (University of Central Florida, USA); Kien Hua (University of Central Florida, USA)
Redefining ITU-T P.912 Recommendation Requirements for Subjects of Quality Assessments in Recognition Tasks
Mikolaj I. Leszczuk (AGH University of Science and Technology, Poland); Artur Koń (AGH University of Science and Technology, Poland); Joel Dumke (National Telecommunications and Information Administration (NTIA), USA); Lucjan Janowski (AGH University of Science and Technology, Poland)

14:00 - 15:00

HM: Human-Centric Multimedia Analysis & Synthesis

Room: D6/201
Chair: Adam Dąbrowski (Poznan University of Technology, Poland)
Face Detection and Facial Expression Recognition Using A Novel Variational Statistical Framework
Wentao Fan (Concordia University, Canada); Nizar Bouguila (Concordia University, Canada)
Face recognition from low resolution images
Tomasz Marciniak (PUT, Poland); Adam Miroslaw Dabrowski (Poznan University of Technology, Poland); Agata Chmielewska (Poznan University of Technology, Poland); Radoslaw Weychan (Poznan University of Technology, Poland)
A new method for automatic generation of animated motion
Piotr Szczuko (Gdansk University of Technology, Poland)

15:30 - 17:30

CT: Cybercrime - Threats & Counteracting

Room: D6/201
Chair: Manuel Urueña (Universidad Carlos III de Madrid, Spain)
Unsupervised Feature Selection for Spherical Data Modeling: Application to Image-Based Spam Filtering
Ola Amayri (Concordia University, Canada); Nizar Bouguila (Concordia University, Canada)
Classification of Malware Network Activity
Gilles Berger-Sabbatel (CNRS, France); Andrzej Duda (Grenoble Institute of Technology, France)
Latent semantic analysis evaluation of conceptual dependency driven focused crawling
Krzysztof Dorosz (Jagiellonian University, Poland); Michał Korzycki (AGH University of Science and Technology, Poland)
Detecting Sexual Predators from Textual Based Chats
Suraj Pandey (University of York, United Kingdom); Ioannis Klapaftis (University of York, United Kingdom); Suresh Manandhar (University of York, United Kingdom)
Information security governance in critical infrastructures with enterprise architecture
Tomasz Chmielecki (AGH University of Science and Technology, Poland), Piotr Chołda (AGH University of Science and Technology, Poland), Piotr Pacyna (AGH University of Science and Technology, Poland), Paweł Potrawka (AGH University of Science and Technology, Poland), Norbert Rapacz (AGH University of Science and Technology, Poland), Rafał Stankiewicz (AGH University of Science and Technology, Poland), Piotr Wydrych (AGH University of Science and Technology, Poland)

General Chair

  • Andrzej Dziech, AGH University of Science and Technology, Poland
    dziech (at) kt (.) agh (.) edu (.) pl

Committee Chairs

  • Andrzej Dziech, AGH University of Science and Technology, Poland
    dziech (at) kt (.) agh (.) edu (.) pl
  • Andrzej Czyżewski, Gdansk University of Technology, Poland
    indect (at) sound (.) eti (.) pg (.) gda (.) pl

Technical Program Committee

  • Emil Altimirski, Technical University of Sofia
  • Alexander Bekiarski, Technical University - Sofia
  • Fernando Boavida, University of Coimbra
  • Eduardo Cerqueira, Federal University of Para
  • Ryszard Choras, University of Technology and Life Sciences
  • Marilia Curado, University of Coimbra
  • Andrzej Czyzewski, Gdansk University of Technology
  • Jacek Danda, AGH University of Science and Technology
  • Jan Derkacz, AGH University of Science and Technology
  • Marek Domanski, Poznan University of Technology
  • Andrzej Duda, Grenoble Institute of Technology
  • Andrzej Dziech, AGH University of Science and Technology
  • Andrzej Glowacz, AGH University of Science and Technology
  • Czeslaw Jedrzejek, Poznan University of Technology
  • Nils Johanning, InnoTec Data
  • Jozef Juhar, Technical University of Kosice
  • Marek Kisiel-Dorohnicki, AGH University of Science and Technology
  • Ioannis Klapaftis, University of York
  • Christian Kollmitzer, FHTW Wien
  • Bożena Kostek, Gdansk University of Technology
  • Zbigniew Kotulski, Warsaw University of Technology
  • Anton Kummert, University of Wuppertal
  • David Larrabeiti, Universidad Carlos III de Madrid
  • Mikolaj Leszczuk, AGH University of Science and Technology
  • Antoni Ligęza, AGH University of Science and Technology
  • Józef Lubacz, Warsaw University of Technology
  • Wiesław Lubaszewski, AGH University of Science and Technology
  • Suresh Manandhar, University of York
  • Tomasz Marciniak, Poznan University of Technology
  • Wojciech Mazurczyk, Warsaw University of Technology
  • Libor Michalek, Vysoka Skola Banska – Technicka Univerzita Ostrava
  • Andrzej Pach, AGH University of Science and Technology
  • Zdzislaw Papir, AGH University of Science and Technology
  • Anna Paulson, NTIA/Institute for Telecommunication Sciences
  • Haluk Sarlan, PSI Transcom GmbH
  • Władysław Skarbek, Warsaw University of Technology
  • Irena Stange, U.S. Department of Commerce
  • Nikolai Stoianov, Technical University of Sofia
  • Piotr Szczuko, Gdansk University of Technology
  • Tomasz Szmuc, AGH University of Science and Technology
  • Andrzej Szwabe, Poznan University of Technology
  • Ryszard Tadeusiewicz, AGH University of Science and Technology
  • Manuel Urueña, Universidad Carlos III de Madrid
  • Vladimir Vasinek, VSB – Technical University of Ostrava
  • Joerg Velten, University of Wuppertal
  • Eva Vozarikova, Technical University of Kosice
  • Jakob Wassermann, FHTW Wien
  • Jan Weglarz, Pozan University of Technology
  • Zygmunt Wróbel, University of Silesia
  • Jaroslav Zdralek, VSB – Technical University of Ostrava
  • Tomasz Zieliński, AGH University of Science and Technology
  • Mariusz Ziółko, AGH University of Science and Technology

Organization Committee

  • Jacek Dańda, AGH University of Science and Technology, Poland
  • Jan Derkacz, AGH University of Science and Technology, Poland
  • Sabina Drzewicka, AGH University of Science and Technology, Poland
  • Andrzej Głowacz, AGH University of Science and Technology, Poland
  • Michał Grega, AGH University of Science and Technology, Poland
  • Piotr Guzik, AGH University of Science and Technology, Poland
  • Magdalena Hrynkiewicz-Sudnik, AGH University of Science and Technology, Poland
  • Paweł Korus, AGH University of Science and Technology, Poland
  • Mikołaj Leszczuk, AGH University of Science and Technology, Poland
  • Andrzej Matiolański, AGH University of Science and Technology, Poland
  • Piotr Romaniak, AGH University of Science and Technology, Poland
  • Krzysztof Rusek, AGH University of Science and Technology, Poland

Venue

The conference will take place in Krakow, one of the largest and oldest cities in Poland, the former the capital of Poland and a popular tourist destination. The venue will be at the Department of Telecommunications, AGH University of Science and Technology.

Address: ul. Czarnowiejska 78, 30-054 Krakow, Poland.

View Larger Map

Landmarks

Registration

The authors of accepted papers need to register by the camera ready submission deadline. A camera ready submission code will be provided upon successful registration.

Conference Fees

The conference fee is € 300. This includes the proceedings, coffee breaks, lunches, sightseeing and a conference dinner. Student registration (for undergraduate authors of accepted papers): 50% reduction of the regular fee (€ 150). IEEE member registration: 10% reduction of the regular fee (€ 270).

Sightseeing

We offer two sightseeing options for the registered participants:

Kraków Sightseeing

This sightseeing option includes a guided tour in the Kraków old city center. This event is included in the conference fee. Please indicate your interest in the guided tour during conference registration.

Organization Information

Please kindly wait for the guide on Saturday, 2nd June 2012, at 10:00, in front of the AGH University of Science and Technology (pol. Akademia Górniczo-Hutnicza), building A-0. This map might be helpful.
Source: Wikipedia

Additional Trips

In addition to the offered Kraków sightseeing event, there will be an option to book the following private trips: You can find the description of these trips here.

The prices vary, according to the number of participants.

Hotel Suggestions

Below you can find a short list of hotels, which have agreed to offer special rates for the MCSS 2012 participants. An initial reservation has been made for the period of the conference. Please note that each of the hotels has a different deadline for booking the room (see below). In order to receive the special rate, please use the password MCSS 2012.

Hotel Novotel Kraków Bronowice

11 Armii Krajowej Street
30-150 Kraków, Poland
Tel. +48 12 626 64 90
Fax +48 12 626 64 94

Available rooms and rates (breakfast included):

  • Single room, 339 PLN / room / night
  • Double room, 379 PLN / room / night
20 rooms in this price are available.

Guest Rooms Antica

76 Czarnowiejska Street
30-054 Kraków
Tel. +48 12 631 23 50
Fax +48 12 633 49 52
E-mail: antica [at] jordan.pl
Website: http://www.jordan.pl/
Distance to conference: 50m

Available rooms and rates:

  • 4 double rooms, 120 PLN / night / room (for one person), 210 PLN / night / room (two persons)

Hotel Etap

11 Armii Krajowej Street
30-150 Kraków
Tel. +48 12 626 11 45
Fax +48 12 626 20 60
Website: http://www.etaphotel.com/
Available rooms and rates:
  • 16 single rooms, 145 PLN / night / room, (165 PLN with breakfast)
  • double rooms, 185 PLN / night / room
  • triple rooms, 205 PLN / night / room

Hotel Kossak

Pl. Kossaka 1
31-106 Kraków
Tel. +48 12 379 59 00
Website: http://www.hotelkossak.pl/
Available rooms and rates:
  • 20 rooms, 450 PLN / night / room, (for one person), 490 PLN / night / room (for two persons)

Hostel Olimp

ul. Rostafińskiego 9
30-072 Kraków
Tel. +48 12 622 46 00, +48 12 617 37 01
Website: http://www.taniehostele.pl/

Hotel Floryan

ul. Florianska 38
31-021 Kraków
Tel. +48 12 431 14 18
Website: http://floryan.com.pl/
Available rooms and rates (reservation 28.05 - 02.06):
  • 5 single superior rooms - 430 PLN / night / room (including breakfast)

Hotel Chopin

ul. Przy Rondzie 2
31-547 Kraków
Tel. +48 12 299 00 0
Website: http://www.vi-hotels.com/pl/chopin-cracow/
Available rooms and rates (reservation 28.05 - 02.06):
  • 30 rooms - 288 PLN / night / room for a single room (including breakfast, Internet access and fitness)
  • 30 rooms - 328 PLN / night / room for a double room (including breakfast, Internet access and fitness)
The reservation expires on 30.04.2012. In order to make a booking, you need to email info [at] chopinhotel.com with a password "konferencja MCSS".

The following information will be necessary to book a room:

  • Given name and surname
  • Room type and reservation dates
  • Credit card information or contact information needed for a preeliminary invoice
  • Phone number
  • E-mail or fax number
The booking needs to be warranted either by credit card information or a pre-paid money transfer. Cancellation of the booking will be charged with full price for the whole booking.