Security and Communication Networks

Machine Learning for Wireless Multimedia Data Security


Publishing date
01 Jan 2019
Status
Published
Submission deadline
31 Aug 2018

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2National Dong Hwa University, Hualien, Taiwan

3University of Central Arkansas, Conway, USA

4Tianjin University, Tianjin, China

5Technical University of Denmark (DTU), Kongens Lyngby, Denmark


Machine Learning for Wireless Multimedia Data Security

Description

With the rapid development of multimedia technologies, the collection and modification of wireless multimedia data have become greatly convenient and easy. Meanwhile, the wireless multimedia data also made sensitive information available to potential attackers. The credibility of digital wireless multimedia data has thus decreased if the wireless multimedia data cannot be well protected. In addition, the copyright and privacy of wireless multimedia data also are easy to be infringed. The data storage and computation, especially, have to be delegated to the powerful but always untrusted cloud, which has led to a series of challenging security and privacy threats.

Nowadays, artificial intelligence (AI) technology has been widely used in academia and industry. Machine learning can be regarded as one of the most important AI technologies, and it has been successfully used in image processing, pattern recognition, computer vision, natural language processing, and so on. Currently, the traditional steganography and security of encrypted wireless multimedia data face a lot of challenges; thus, new types of steganography and encryption of wireless multimedia data, including audio, image, and video, need to be explored urgently. Moreover, in a new environment like cloud computing, the distribution and processing of wireless multimedia data also face more new challenges. For example, how to securely process wireless multimedia data in cloud computing to preserve the privacy of wireless multimedia data, and how to reliably solve a multiparty computation by outsourcing are still open questions.

This special issue is intended for researchers and practitioners from academia as well as industry who are interested in issues that arise from using machine learning for wireless multimedia data security.

Potential topics include but are not limited to the following:

  • Machine learning for wireless multimedia data security
  • Machine learning for wireless multimedia data transmission security
  • Machine learning for reversible data hiding in plaintext or ciphertext multimedia
  • Machine learning for reliable computing and outsourcing of wireless multimedia data
  • Machine learning for threat detection of wireless multimedia data system
  • Machine learning for privacy protection of wireless multimedia data
  • Machine learning for wireless multimedia information hiding and fingerprinting
  • Machine learning for wireless multimedia authentication and encryption
  • Machine learning for wireless multimedia data copyright protection
  • Machine learning for wireless multimedia data watermarking

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 7682306
  • - Editorial

Machine Learning for Wireless Multimedia Data Security

Zhaoqing Pan | Ching-Nung Yang | ... | Weizhi Meng
  • Special Issue
  • - Volume 2019
  • - Article ID 4732632
  • - Research Article

Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image

Bin Ma | Bing Li | ... | Yun-Qing Shi
  • Special Issue
  • - Volume 2018
  • - Article ID 6362010
  • - Research Article

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping

Xiufeng Zhao | Hefeng Mao | ... | Bo Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 4036815
  • - Research Article

Robust Visual Secret Sharing Scheme Applying to QR Code

Longdan Tan | Kesheng Liu | ... | Yuliang Lu
  • Special Issue
  • - Volume 2018
  • - Article ID 7350324
  • - Research Article

DR-Net: A Novel Generative Adversarial Network for Single Image Deraining

Chen Li | Yecai Guo | ... | Xiaodong Liu
  • Special Issue
  • - Volume 2018
  • - Article ID 5783976
  • - Research Article

Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method

Zhendong Wu | Jiajia Yang | ... | Hengli Yue
  • Special Issue
  • - Volume 2018
  • - Article ID 6868506
  • - Research Article

Research on Plaintext Restoration of AES Based on Neural Network

Xinyi Hu | Yaqun Zhao
  • Special Issue
  • - Volume 2018
  • - Article ID 5037892
  • - Research Article

A Secure Multimedia Data Sharing Scheme for Wireless Network

Liming Fang | Liang Liu | ... | Maosheng Sun
  • Special Issue
  • - Volume 2018
  • - Article ID 2329891
  • - Research Article

An Improved Permission Management Scheme of Android Application Based on Machine Learning

Shaozhang Niu | Ruqiang Huang | ... | Yiming Xue
  • Special Issue
  • - Volume 2018
  • - Article ID 6395362
  • - Research Article

A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network

Chunpeng Ge | Jinyue Xia | ... | Yao Wang
Security and Communication Networks
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.