Security and Communication Networks

Multimedia Security: Novel Steganography and Privacy Preserving


Publishing date
16 Feb 2018
Status
Published
Submission deadline
29 Sep 2017

Lead Editor

1Shanghai University, Shanghai, China

2University of Texas, San Antonio, USA

3Troyes University of Technology, Troyes, France

4Fudan University, Shanghai, China


Multimedia Security: Novel Steganography and Privacy Preserving

Description

With the quick evolution of information technologies, computer networks, and digital imaging technology over the past decades, the modification of media has been greatly leveraged with tools easily available. Meanwhile, the use of media also made sensitive information available to potential eavesdroppers. The credibility of digital media has thus decreased and the demand for new technologies has emerged. Many techniques have been introduced to study their intrinsic principles.

Nowadays, many challenges emerge. First, the traditional steganography is now seriously threatened by machine learning based steganalysis. Therefore, new types of steganography, for example, constructive steganography, are urgently needed to combat state-of-the-art steganalysis. Second, when transmitting stego media over social networks, the servers always modify the covers, for example, changing the resolution or recompressing the multimedia. Since the traditional steganography techniques are always fragile, robust steganography is now required. Third, the lack of efficient techniques of privacy preserving is now preventing the development of cloud computing. For example, how to encrypt a JPEG image for cloud storage users and how to reliably solve a complicated computation by outsourcing are still open questions.

This special issue focuses on active research areas on multimedia security, such as novel types of steganography, privacy preserving on cloud computing, multimedia tampering detection, and source device identification. We invite the authors to submit original research articles covering theoretical aspects models and solutions to stimulate the development of multimedia security.

Potential topics include but are not limited to the following:

  • Latest techniques of steganography and steganalysis
  • Recent developments in multimedia forensics
  • Advances in reversible data hiding in plaintext or ciphertext multimedia
  • Reliable computing and outsourcing of multimedia
  • Novel techniques of multimedia watermarking
  • Privacy preserving of multimedia

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 1301290
  • - Research Article

Nonoverlapping Blocks Based Copy-Move Forgery Detection

Yu Sun | Rongrong Ni | Yao Zhao
  • Special Issue
  • - Volume 2018
  • - Article ID 1214681
  • - Research Article

A Wireless Covert Channel Based on Constellation Shaping Modulation

Pengcheng Cao | Weiwei Liu | ... | Yuewei Dai
  • Special Issue
  • - Volume 2017
  • - Article ID 7536381
  • - Research Article

Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

Ru Zhang | Yanyu Huo | ... | Fangyu Weng
  • Special Issue
  • - Volume 2017
  • - Article ID 6898617
  • - Review Article

A Survey on Breaking Technique of Text-Based CAPTCHA

Jun Chen | Xiangyang Luo | ... | Daofu Gong
  • Special Issue
  • - Volume 2017
  • - Article ID 4376282
  • - Research Article

A Cloud-User Protocol Based on Ciphertext Watermarking Technology

Keyang Liu | Weiming Zhang | Xiaojuan Dong
  • Special Issue
  • - Volume 2017
  • - Article ID 2314860
  • - Research Article

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

Donghui Hu | Qiang Shen | ... | Lina Wang
  • Special Issue
  • - Volume 2017
  • - Article ID 4892814
  • - Research Article

Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability

Yanli Ren | Min Dong | ... | Xiaoni Du
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.