Security and Communication Networks

Application-Aware Multimedia Security Techniques


Publishing date
01 Aug 2021
Status
Closed
Submission deadline
09 Apr 2021

Lead Editor

1Bennett University, Greater Noida, India

2Menoufia University, Shebin El-Koom, Egypt

3Heilongjiang University, Harbin, China

4Nanyang Technological University, Singapore

5Silesian University of Technology, Silesia, Poland

6National Institute of Technology, Hamirpur, India

This issue is now closed for submissions.

Application-Aware Multimedia Security Techniques

This issue is now closed for submissions.

Description

With the advancements in modern technology, the use of multimedia data grows exponentially all over the globe. It has touched every aspect of life, including medical imaging, intelligent transportation, military communication, remote sensing, Internet of Things, personal communication, data storage, digital currency, etc. Multimedia data mainly contains text, audio, video, and images. The communication of multimedia data over public networks can be forged and modified by hackers. Therefore, the secure communication of multimedia data has become a prominent issue.

A number of techniques have been devised to provide security to multimedia data. Information hiding techniques have been widely adopted by researchers to provide the same. Currently, digital information is generated through different devices, for example, surveillance cameras, sensor nodes, mobiles, notebooks, satellite sensors, graphic cards, etc. Depending upon the requirements, information security techniques can be classified into two main categories: lossy and lossless. Devices such as mobiles, IoT, etc., need lightweight information security techniques that provide results at good computational speed with smaller data size. Thus, compressive sensing techniques can be used to reduce the size of data. Conversely, computationally extensive devices such as satellite sensors, medical imaging systems, etc. require information security techniques which do not lose significant information during secure communication, because detailed information is required to make accurate decisions by experts. Therefore, the development of both lossy and lossless information security techniques is necessary to provide security to multimedia data depending upon the application systems.

The aim of this Special Issue is to collate articles in this field related to multimedia security. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Multimedia security using cryptography techniques
  • Multimedia security using watermarking and steganography techniques
  • Security evaluation of information hiding techniques
  • Security techniques for medical images
  • Security techniques for remote sensing images
  • Security techniques for mobile applications
  • Security requirements for IOT frameworks
  • Secret image sharing system for secure communication
  • Security and privacy issues in data hiding system for secure communication
  • Security of multimedia data in cloud computing
  • Meta-heuristic based multimedia security
  • Security issues due to emerging technologies

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 9968275
  • - Review Article

A New Speech Enhancement Technique Based on Stationary Bionic Wavelet Transform and MMSE Estimate of Spectral Amplitude

Mourad Talbi | Med Salim Bouhlel
  • Special Issue
  • - Volume 2021
  • - Article ID 9984453
  • - Research Article

A Cost-Efficient Autonomous Air Defense System for National Security

Fazle Rabby Khan | Md. Muhabullah | ... | Parminder Singh
  • Special Issue
  • - Volume 2021
  • - Article ID 6653430
  • - Research Article

Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution

Xiujuan Wang | Yi Sui | ... | Jianhua Wei
  • Special Issue
  • - Volume 2021
  • - Article ID 5531505
  • - Research Article

Generalized Proxy Oblivious Signature and Its Mobile Application

Shin-Yan Chiou | Yi-Xuan He
  • Special Issue
  • - Volume 2021
  • - Article ID 5597592
  • - Research Article

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery

Yongjie Wang | Jia Chen | ... | Yuyuan Sun
  • Special Issue
  • - Volume 2021
  • - Article ID 8340925
  • - Research Article

Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework

Shyam Deshmukh | Komati Thirupathi Rao | Mohammad Shabaz
  • Special Issue
  • - Volume 2021
  • - Article ID 9940183
  • - Research Article

Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems

Darpan Anand | Vineeta Khemchandani | ... | Ouissem Ben Fredj
  • Special Issue
  • - Volume 2021
  • - Article ID 9971705
  • - Research Article

Software-Defined Networking: An Evolving Network Architecture—Programmability and Security Perspective

Nitheesh Murugan Kaliyamurthy | Swapnesh Taterh | ... | Hadda Ben Elhadj
  • Special Issue
  • - Volume 2021
  • - Article ID 9924478
  • - Research Article

An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model

Sachin Lalar | Shashi Bhushan | ... | Jehad F. Al-Amri
  • Special Issue
  • - Volume 2021
  • - Article ID 9923389
  • - Research Article

Artificial Intelligence-Based Digital Image Steganalysis

Ahmed I. Iskanderani | Ibrahim M. Mehedi | ... | Abdul Latif
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.