Application-Aware Multimedia Security Techniques
1Bennett University, Greater Noida, India
2Menoufia University, Shebin El-Koom, Egypt
3Heilongjiang University, Harbin, China
4Nanyang Technological University, Singapore
5Silesian University of Technology, Silesia, Poland
6National Institute of Technology, Hamirpur, India
Application-Aware Multimedia Security Techniques
Description
With the advancements in modern technology, the use of multimedia data grows exponentially all over the globe. It has touched every aspect of life, including medical imaging, intelligent transportation, military communication, remote sensing, Internet of Things, personal communication, data storage, digital currency, etc. Multimedia data mainly contains text, audio, video, and images. The communication of multimedia data over public networks can be forged and modified by hackers. Therefore, the secure communication of multimedia data has become a prominent issue.
A number of techniques have been devised to provide security to multimedia data. Information hiding techniques have been widely adopted by researchers to provide the same. Currently, digital information is generated through different devices, for example, surveillance cameras, sensor nodes, mobiles, notebooks, satellite sensors, graphic cards, etc. Depending upon the requirements, information security techniques can be classified into two main categories: lossy and lossless. Devices such as mobiles, IoT, etc., need lightweight information security techniques that provide results at good computational speed with smaller data size. Thus, compressive sensing techniques can be used to reduce the size of data. Conversely, computationally extensive devices such as satellite sensors, medical imaging systems, etc. require information security techniques which do not lose significant information during secure communication, because detailed information is required to make accurate decisions by experts. Therefore, the development of both lossy and lossless information security techniques is necessary to provide security to multimedia data depending upon the application systems.
The aim of this Special Issue is to collate articles in this field related to multimedia security. Original research and review articles are welcome.
Potential topics include but are not limited to the following:
- Multimedia security using cryptography techniques
- Multimedia security using watermarking and steganography techniques
- Security evaluation of information hiding techniques
- Security techniques for medical images
- Security techniques for remote sensing images
- Security techniques for mobile applications
- Security requirements for IOT frameworks
- Secret image sharing system for secure communication
- Security and privacy issues in data hiding system for secure communication
- Security of multimedia data in cloud computing
- Meta-heuristic based multimedia security
- Security issues due to emerging technologies