Security and Communication Networks

Multimedia Security: Novel Steganography and Privacy Preserving


Publishing date
16 Feb 2018
Status
Published
Submission deadline
29 Sep 2017

Lead Editor

1Shanghai University, Shanghai, China

2University of Texas, San Antonio, USA

3Troyes University of Technology, Troyes, France

4Fudan University, Shanghai, China


Multimedia Security: Novel Steganography and Privacy Preserving

Description

With the quick evolution of information technologies, computer networks, and digital imaging technology over the past decades, the modification of media has been greatly leveraged with tools easily available. Meanwhile, the use of media also made sensitive information available to potential eavesdroppers. The credibility of digital media has thus decreased and the demand for new technologies has emerged. Many techniques have been introduced to study their intrinsic principles.

Nowadays, many challenges emerge. First, the traditional steganography is now seriously threatened by machine learning based steganalysis. Therefore, new types of steganography, for example, constructive steganography, are urgently needed to combat state-of-the-art steganalysis. Second, when transmitting stego media over social networks, the servers always modify the covers, for example, changing the resolution or recompressing the multimedia. Since the traditional steganography techniques are always fragile, robust steganography is now required. Third, the lack of efficient techniques of privacy preserving is now preventing the development of cloud computing. For example, how to encrypt a JPEG image for cloud storage users and how to reliably solve a complicated computation by outsourcing are still open questions.

This special issue focuses on active research areas on multimedia security, such as novel types of steganography, privacy preserving on cloud computing, multimedia tampering detection, and source device identification. We invite the authors to submit original research articles covering theoretical aspects models and solutions to stimulate the development of multimedia security.

Potential topics include but are not limited to the following:

  • Latest techniques of steganography and steganalysis
  • Recent developments in multimedia forensics
  • Advances in reversible data hiding in plaintext or ciphertext multimedia
  • Reliable computing and outsourcing of multimedia
  • Novel techniques of multimedia watermarking
  • Privacy preserving of multimedia

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 6390945
  • - Editorial

Multimedia Security: Novel Steganography and Privacy Preserving

Zhenxing Qian | Kim-Kwang Raymond Choo | ... | Xinpeng Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 1505896
  • - Research Article

High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis

Gandharba Swain
  • Special Issue
  • - Volume 2018
  • - Article ID 7915393
  • - Research Article

Secure and Efficient Image Retrieval over Encrypted Cloud Data

Haihua Liang | Xinpeng Zhang | ... | Qiuhan Wei
  • Special Issue
  • - Volume 2018
  • - Article ID 5841967
  • - Research Article

Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing

Hongliang Zhu | Meiqi Chen | ... | Lei Hu
  • Special Issue
  • - Volume 2018
  • - Article ID 6256872
  • - Research Article

A Modification-Free Steganography Method Based on Image Information Entropy

Xia ShuangKui | Jianbin Wu
  • Special Issue
  • - Volume 2018
  • - Article ID 1326235
  • - Research Article

Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

Xianyi Chen | Haidong Zhong | ... | Zhihua Xia
  • Special Issue
  • - Volume 2018
  • - Article ID 7080673
  • - Research Article

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

Junhui He | Junxi Chen | ... | Shaohua Tang
  • Special Issue
  • - Volume 2018
  • - Article ID 2516324
  • - Research Article

Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction

Dongmei Niu | Hongxia Wang | ... | Canghong Shi
  • Special Issue
  • - Volume 2018
  • - Article ID 1734961
  • - Research Article

Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification

Dawen Xu | Kai Chen | ... | Shubing Su
  • Special Issue
  • - Volume 2018
  • - Article ID 1301290
  • - Research Article

Nonoverlapping Blocks Based Copy-Move Forgery Detection

Yu Sun | Rongrong Ni | Yao Zhao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.