Security and Communication Networks

Multimedia Communication Security in 5G/6G


Publishing date
01 Jun 2021
Status
Closed
Submission deadline
22 Jan 2021

Lead Editor

1Nanjing University of Information Science, Nanjing, China

2New Jersey Institute of Technology, Newark, USA

3Sungkyunkwan University, Seoul, Republic of Korea

4Edinburgh Napier University, Edinburgh, UK

This issue is now closed for submissions.

Multimedia Communication Security in 5G/6G

This issue is now closed for submissions.

Description

The rapid development of new technologies has brought important changes to our lives. In 5G/6G networks, the amount of multimedia data generated and transmitted has become unprecedentedly large. In this case, serious challenges have emerged in areas such as data security detection and transmission protection. Security needs to consider and accommodate the unique features of the new 5G platform and build security in as a standard. The techniques for detection of malfeasance and identification of lawbreakers in 5G/6G communication are required more and more on a daily basis. The research on multimedia communication security in 5G/6G networks is of great significance for fighting against illegal and criminal activity on the internet, maintaining social stability.

The main aim of this Special Issue is to solicit submissions to give a state-of-the-art overview of problems and solution guidelines emerging in 5G/6G. In particular, we seek submissions that address related problems, with a focus on current and future developments. A wide variety of topics will be addressed, such as secure multimedia communication in 5G/6G, privacy protection in 5G/6G networks, multimedia forensics for 5G/6G, etc. Papers on practical as well as on theoretical topics and problems are welcome. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Security of multimedia information
  • Multimedia secure communications in 5G/6G networks
  • Media forensics for 5G/6G networks
  • Cross-media security in 5G/6G networks
  • Protocol security of communication in 5G/6G networks
  • Live content security detection in 5G/6G
  • Developing secure communication systems for multimedia
  • Security risk management and evaluation of multimedia data in 5G/6G networks
  • Availability and human factors of multimedia in 5G/6G networks
  • Emerging multimedia security issues in 5G/6G networks
  • Blockchain for multimedia security in 5G/6G

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 5511806
  • - Research Article

Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding

Zelin Zhang | Jian Xu | ... | Yuli Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 5599996
  • - Research Article

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication

Won-Bin Kim | Daehee Seo | ... | Im-Yeong Lee
  • Special Issue
  • - Volume 2021
  • - Article ID 6679284
  • - Research Article

A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization

Aya Jaradat | Eyad Taqieddin | Moad Mowafi
  • Special Issue
  • - Volume 2021
  • - Article ID 5567635
  • - Research Article

Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model

Luhui Yang | Guangjie Liu | ... | Yuewei Dai
  • Special Issue
  • - Volume 2021
  • - Article ID 6682293
  • - Research Article

Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models

Nianwen Si | Wenlin Zhang | ... | Tong Niu
  • Special Issue
  • - Volume 2021
  • - Article ID 6680528
  • - Research Article

Feature Selection of the Rich Model Based on the Correlation of Feature Components

Shunhao Jin | Fenlin Liu | ... | Yuan Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 5599556
  • - Research Article

N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection

Huiwen Bai | Guangjie Liu | ... | Shuhua Huang
  • Special Issue
  • - Volume 2021
  • - Article ID 5589352
  • - Research Article

Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks

Sa Math | Prohim Tam | Seokhoon Kim
  • Special Issue
  • - Volume 2021
  • - Article ID 5568351
  • - Research Article

A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency

Peisong He | Hongxia Wang | ... | Yue Li
  • Special Issue
  • - Volume 2021
  • - Article ID 8817569
  • - Research Article

Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems

Yinghua Tian | Nae Zheng | ... | Liuyang Gao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.