Security and Communication Networks

Application-Aware Multimedia Security Techniques


Publishing date
01 Aug 2021
Status
Closed
Submission deadline
09 Apr 2021

Lead Editor

1Bennett University, Greater Noida, India

2Menoufia University, Shebin El-Koom, Egypt

3Heilongjiang University, Harbin, China

4Nanyang Technological University, Singapore

5Silesian University of Technology, Silesia, Poland

6National Institute of Technology, Hamirpur, India

This issue is now closed for submissions.
More articles will be published in the near future.

Application-Aware Multimedia Security Techniques

This issue is now closed for submissions.
More articles will be published in the near future.

Description

With the advancements in modern technology, the use of multimedia data grows exponentially all over the globe. It has touched every aspect of life, including medical imaging, intelligent transportation, military communication, remote sensing, Internet of Things, personal communication, data storage, digital currency, etc. Multimedia data mainly contains text, audio, video, and images. The communication of multimedia data over public networks can be forged and modified by hackers. Therefore, the secure communication of multimedia data has become a prominent issue.

A number of techniques have been devised to provide security to multimedia data. Information hiding techniques have been widely adopted by researchers to provide the same. Currently, digital information is generated through different devices, for example, surveillance cameras, sensor nodes, mobiles, notebooks, satellite sensors, graphic cards, etc. Depending upon the requirements, information security techniques can be classified into two main categories: lossy and lossless. Devices such as mobiles, IoT, etc., need lightweight information security techniques that provide results at good computational speed with smaller data size. Thus, compressive sensing techniques can be used to reduce the size of data. Conversely, computationally extensive devices such as satellite sensors, medical imaging systems, etc. require information security techniques which do not lose significant information during secure communication, because detailed information is required to make accurate decisions by experts. Therefore, the development of both lossy and lossless information security techniques is necessary to provide security to multimedia data depending upon the application systems.

The aim of this Special Issue is to collate articles in this field related to multimedia security. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Multimedia security using cryptography techniques
  • Multimedia security using watermarking and steganography techniques
  • Security evaluation of information hiding techniques
  • Security techniques for medical images
  • Security techniques for remote sensing images
  • Security techniques for mobile applications
  • Security requirements for IOT frameworks
  • Secret image sharing system for secure communication
  • Security and privacy issues in data hiding system for secure communication
  • Security of multimedia data in cloud computing
  • Meta-heuristic based multimedia security
  • Security issues due to emerging technologies

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 9984453
  • - Research Article

A Cost-Efficient Autonomous Air Defense System for National Security

Fazle Rabby Khan | Md. Muhabullah | ... | Parminder Singh
  • Special Issue
  • - Volume 2021
  • - Article ID 6653430
  • - Research Article

Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution

Xiujuan Wang | Yi Sui | ... | Jianhua Wei
  • Special Issue
  • - Volume 2021
  • - Article ID 5531505
  • - Research Article

Generalized Proxy Oblivious Signature and Its Mobile Application

Shin-Yan Chiou | Yi-Xuan He
  • Special Issue
  • - Volume 2021
  • - Article ID 5597592
  • - Research Article

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery

Yongjie Wang | Jia Chen | ... | Yuyuan Sun
  • Special Issue
  • - Volume 2021
  • - Article ID 8340925
  • - Research Article

Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework

Shyam Deshmukh | Komati Thirupathi Rao | Mohammad Shabaz
  • Special Issue
  • - Volume 2021
  • - Article ID 9940183
  • - Research Article

Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems

Darpan Anand | Vineeta Khemchandani | ... | Ouissem Ben Fredj
  • Special Issue
  • - Volume 2021
  • - Article ID 9971705
  • - Research Article

Software-Defined Networking: An Evolving Network Architecture—Programmability and Security Perspective

Nitheesh Murugan Kaliyamurthy | Swapnesh Taterh | ... | Hadda Ben Elhadj
  • Special Issue
  • - Volume 2021
  • - Article ID 9924478
  • - Research Article

An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model

Sachin Lalar | Shashi Bhushan | ... | Jehad F. Al-Amri
  • Special Issue
  • - Volume 2021
  • - Article ID 9923389
  • - Research Article

Artificial Intelligence-Based Digital Image Steganalysis

Ahmed I. Iskanderani | Ibrahim M. Mehedi | ... | Abdul Latif
  • Special Issue
  • - Volume 2021
  • - Article ID 6664426
  • - Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Md Iman Ali | Sukhkirandeep Kaur
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.791
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.