Security and Communication Networks

Privacy Protection and Security in Multimedia Processing and Artificial Intelligence


Publishing date
01 Jan 2021
Status
Published
Submission deadline
21 Aug 2020

Lead Editor

1Nanjing University of Information Science and Technology, Nanjing, China

2Luleå University of Technology, Luleå, Sweden

3Northeastern State University, Tahlequah, USA

4Fudan University, Shanghai, China

5New Jersey Institute of Technology, Newark, USA


Privacy Protection and Security in Multimedia Processing and Artificial Intelligence

Description

In the information era, a huge amount of digital media – such as texts, images, audios, videos, etc. – is being generated and transmitted every second. Multimedia has been applied in many fields of human society: music, films, and video games constitute the majority of our daily entertainments; medical images help doctors to make a more accurate diagnosis, and fingerprints and facial images are used to identify people for all kinds of applications. Artificial intelligence (AI) technologies greatly enhance our ability to analyse, process, and utilize multimedia. Both multimedia processing and AI technologies are quite computation-intensive and storage-intensive. Fortunately, rapidly developing cloud computing can provide us a promising way to deal with these kinds of demanding tasks; the users can simply outsource the storage, computation, and any other tasks to the powerful cloud server to enjoy efficient and ubiquitous services.

However, privacy and security need more attention. Firstly, the cloud server could not be fully secure or trustworthy to users. Secondly, AI technologies can also be attacked. For example, some recent research showed that Deep Neural Networks could be fooled by modifying only one pixel in the sample image. Finally, AI technologies can also be misused, which leads to potential risks. Many technologies have been utilized to deal with security and privacy protection problems. Despite the advances made in the last decade, the application of such techniques in real life is still hindered by many factors, including lack of efficiency, lack of security under challenging security models (such as in the presence of malicious users), and the necessity of adapting the available tools to the diverse requirements encountered in different applications.

This Special Issue intends to collect high-quality research and review articles concerning privacy protection and security in multimedia processing and artificial intelligence fields.

Potential topics include but are not limited to the following:

  • AI security
  • Privacy-preserving classification
  • Processing of encrypted multimedia
  • Privacy-preserving data mining
  • Feature extraction with privacy protection
  • Optimization algorithm with privacy protection
  • Secure multimedia distribution in cloud computing
  • Secure multi-party computation in cloud computing
  • Multimedia forensics in the encrypted domain
  • Privacy-preserving processing of biomedical signals
  • Privacy protection in smart metering applications
  • Secure access of multimedia
  • Security and privacy in online social networks
  • Searchable encryption

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 8847741
  • - Research Article

DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis

Yang Xu | Zixi Fu | ... | Xiaoyao Xie
  • Special Issue
  • - Volume 2020
  • - Article ID 8889122
  • - Research Article

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence

Xinyu Huang | Yunzhe Tian | ... | Liang Chang
  • Special Issue
  • - Volume 2020
  • - Article ID 8847487
  • - Research Article

An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications

Shengnan Zhao | Xiangfu Song | ... | Qiuliang Xu
  • Special Issue
  • - Volume 2020
  • - Article ID 8819958
  • - Research Article

Modelling the Mimic Defence Technology for Multimedia Cloud Servers

Feng Feng | Xiabing Zhou | ... | Qinglei Zhou
  • Special Issue
  • - Volume 2020
  • - Article ID 8882494
  • - Research Article

Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes

Bowen Zhang | Benedetta Tondi | ... | Mauro Barni
  • Special Issue
  • - Volume 2020
  • - Article ID 8857815
  • - Research Article

Lattice-Based Linearly Homomorphic Signature Scheme over

Jie Cai | Han Jiang | ... | Qiuliang Xu
  • Special Issue
  • - Volume 2020
  • - Article ID 8868672
  • - Research Article

Mimic Encryption Box for Network Multimedia Data Security

Xiabing Zhou | Bin Li | ... | Wanying Dong
  • Special Issue
  • - Volume 2020
  • - Article ID 8849902
  • - Research Article

An Antiforensic Method against AMR Compression Detection

Diqun Yan | Xiaowen Li | ... | Rangding Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.