Security and Communication Networks

Machine Learning for Wireless Multimedia Data Security


Publishing date
01 Jan 2019
Status
Published
Submission deadline
31 Aug 2018

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2National Dong Hwa University, Hualien, Taiwan

3University of Central Arkansas, Conway, USA

4Tianjin University, Tianjin, China

5Technical University of Denmark (DTU), Kongens Lyngby, Denmark


Machine Learning for Wireless Multimedia Data Security

Description

With the rapid development of multimedia technologies, the collection and modification of wireless multimedia data have become greatly convenient and easy. Meanwhile, the wireless multimedia data also made sensitive information available to potential attackers. The credibility of digital wireless multimedia data has thus decreased if the wireless multimedia data cannot be well protected. In addition, the copyright and privacy of wireless multimedia data also are easy to be infringed. The data storage and computation, especially, have to be delegated to the powerful but always untrusted cloud, which has led to a series of challenging security and privacy threats.

Nowadays, artificial intelligence (AI) technology has been widely used in academia and industry. Machine learning can be regarded as one of the most important AI technologies, and it has been successfully used in image processing, pattern recognition, computer vision, natural language processing, and so on. Currently, the traditional steganography and security of encrypted wireless multimedia data face a lot of challenges; thus, new types of steganography and encryption of wireless multimedia data, including audio, image, and video, need to be explored urgently. Moreover, in a new environment like cloud computing, the distribution and processing of wireless multimedia data also face more new challenges. For example, how to securely process wireless multimedia data in cloud computing to preserve the privacy of wireless multimedia data, and how to reliably solve a multiparty computation by outsourcing are still open questions.

This special issue is intended for researchers and practitioners from academia as well as industry who are interested in issues that arise from using machine learning for wireless multimedia data security.

Potential topics include but are not limited to the following:

  • Machine learning for wireless multimedia data security
  • Machine learning for wireless multimedia data transmission security
  • Machine learning for reversible data hiding in plaintext or ciphertext multimedia
  • Machine learning for reliable computing and outsourcing of wireless multimedia data
  • Machine learning for threat detection of wireless multimedia data system
  • Machine learning for privacy protection of wireless multimedia data
  • Machine learning for wireless multimedia information hiding and fingerprinting
  • Machine learning for wireless multimedia authentication and encryption
  • Machine learning for wireless multimedia data copyright protection
  • Machine learning for wireless multimedia data watermarking

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 5264526
  • - Research Article

An Ensemble Learning Method for Wireless Multimedia Device Identification

Zhen Zhang | Yibing Li | ... | Jin Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 2492956
  • - Research Article

An Evolutionary Computation Based Feature Selection Method for Intrusion Detection

Yu Xue | Weiwei Jia | ... | Wei Pang
  • Special Issue
  • - Volume 2018
  • - Article ID 3780407
  • - Research Article

Differential Cryptanalysis on Block Cipher Skinny with MILP Program

Pei Zhang | Wenying Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 8172725
  • - Research Article

Deep Learning Hash for Wireless Multimedia Image Content Security

Yu Zheng | Jiezhong Zhu | ... | Lian-Hua Chi
  • Special Issue
  • - Volume 2018
  • - Article ID 2373545
  • - Research Article

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds

Hua Dai | Hui Ren | ... | Xun Yi
  • Special Issue
  • - Volume 2018
  • - Article ID 7096271
  • - Research Article

An Adaptive Audio Steganography for Covert Wireless Communication

Guojiang Xin | Yuling Liu | ... | Yu Cao
  • Special Issue
  • - Volume 2018
  • - Article ID 5680264
  • - Research Article

A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection

Zhaohui Zhang | Xinxin Zhou | ... | Pengwei Wang
  • Special Issue
  • - Volume 2018
  • - Article ID 4943509
  • - Research Article

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest

Erxue Min | Jun Long | ... | Wei Chen
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.