Security and Communication Networks

Application-Aware Multimedia Security Techniques


Publishing date
01 Aug 2021
Status
Closed
Submission deadline
09 Apr 2021

Lead Editor

1Bennett University, Greater Noida, India

2Menoufia University, Shebin El-Koom, Egypt

3Heilongjiang University, Harbin, China

4Nanyang Technological University, Singapore

5Silesian University of Technology, Silesia, Poland

6National Institute of Technology, Hamirpur, India

This issue is now closed for submissions.

Application-Aware Multimedia Security Techniques

This issue is now closed for submissions.

Description

With the advancements in modern technology, the use of multimedia data grows exponentially all over the globe. It has touched every aspect of life, including medical imaging, intelligent transportation, military communication, remote sensing, Internet of Things, personal communication, data storage, digital currency, etc. Multimedia data mainly contains text, audio, video, and images. The communication of multimedia data over public networks can be forged and modified by hackers. Therefore, the secure communication of multimedia data has become a prominent issue.

A number of techniques have been devised to provide security to multimedia data. Information hiding techniques have been widely adopted by researchers to provide the same. Currently, digital information is generated through different devices, for example, surveillance cameras, sensor nodes, mobiles, notebooks, satellite sensors, graphic cards, etc. Depending upon the requirements, information security techniques can be classified into two main categories: lossy and lossless. Devices such as mobiles, IoT, etc., need lightweight information security techniques that provide results at good computational speed with smaller data size. Thus, compressive sensing techniques can be used to reduce the size of data. Conversely, computationally extensive devices such as satellite sensors, medical imaging systems, etc. require information security techniques which do not lose significant information during secure communication, because detailed information is required to make accurate decisions by experts. Therefore, the development of both lossy and lossless information security techniques is necessary to provide security to multimedia data depending upon the application systems.

The aim of this Special Issue is to collate articles in this field related to multimedia security. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Multimedia security using cryptography techniques
  • Multimedia security using watermarking and steganography techniques
  • Security evaluation of information hiding techniques
  • Security techniques for medical images
  • Security techniques for remote sensing images
  • Security techniques for mobile applications
  • Security requirements for IOT frameworks
  • Secret image sharing system for secure communication
  • Security and privacy issues in data hiding system for secure communication
  • Security of multimedia data in cloud computing
  • Meta-heuristic based multimedia security
  • Security issues due to emerging technologies

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6664426
  • - Research Article

Next-Generation Digital Forensic Readiness BYOD Framework

Md Iman Ali | Sukhkirandeep Kaur
  • Special Issue
  • - Volume 2021
  • - Article ID 5536170
  • - Research Article

A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption

Chirag Sharma | Bagga Amandeep | ... | Mohammad Shabaz
  • Special Issue
  • - Volume 2021
  • - Article ID 6617944
  • - Research Article

Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm

Hira Nazir | Imran Sarwar Bajwa | ... | Muhammad Moosa
  • Special Issue
  • - Volume 2021
  • - Article ID 6659371
  • - Research Article

Exposing Speech Transsplicing Forgery with Noise Level Inconsistency

Diqun Yan | Mingyu Dong | Jinxing Gao
  • Special Issue
  • - Volume 2020
  • - Article ID 8889317
  • - Research Article

High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model

Qiao Ke | Sun Zeng-guo | ... | Rafał Scherer
  • Special Issue
  • - Volume 2020
  • - Article ID 6627178
  • - Research Article

On the Value of Order Number and Power in Secret Image Sharing

Yongqiang Yu | Longlong Li | ... | Xuehu Yan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.