Security and Communication Networks

Image Security and Image Privacy Protection


Publishing date
01 May 2021
Status
Closed
Submission deadline
01 Jan 2021

Lead Editor

1Guangdong Ocean University, Zhanjiang, China

2Nanchang University, Nanchang, China

3Chongqing Institute of Engineering, Chongqing, China

4Tunku Abdul Rahman University, Petaling Jaya, Malaysia

This issue is now closed for submissions.

Image Security and Image Privacy Protection

This issue is now closed for submissions.

Description

Images are widely used in communication all over the world. Images are used in many applications, including medical images, remote sensing, education images, electronic commerce, etc. Through the convenience of the Internet, we can share images and information at any time and any place.

However, some images may refer to private personal or other commercial information. Image security should be paid much attention in order to combat illegal access, revision, and other attacks. In recent years, many image encryption algorithms have been proposed and published, for example, chaos-based methods, compressive sensing-based schemes, quantum map-based algorithms, etc. Under the information era and the arrival of big data, we need a higher level of security protection for our images. Our images are transferred and opened over public networks, so applying cryptography to the image is a direct way to hiding image information and implementing data protection. There are two cipher structures: symmetric cipher and asymmetric cipher. Symmetric ciphers use the same keys to encrypt and decrypt the image, while in asymmetric ciphers the sender and receiver have different keys. However, quantum computers within the environment of 5G networks will present a challenge to the current image encryption algorithms. The design of new encryption algorithms needs further investigation.

This Special Issue welcomes all experts and scholars to submit their new methods or algorithms written in research papers, aiming to offer image security and image privacy protection. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Image encryption
  • Image watermarking
  • Visual image encryption
  • Image information hiding
  • Quantum image encryption
  • Blockchain with its applications in image encryption
  • Compressive sensing with its applications in image encryption
  • Chaos with its applications in image encryption
  • Optical image security
  • Other encryption methods for images

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6624890
  • - Research Article

Image Encryption with Fusion of Two Maps

Yannick Abanda | Alain Tiedeu | Guillaume Kom
  • Special Issue
  • - Volume 2021
  • - Article ID 6650515
  • - Research Article

Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences

Liang-Jia Tong | Nan-Run Zhou | ... | Ya-Ru Liang
  • Special Issue
  • - Volume 2021
  • - Article ID 6625579
  • - Research Article

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

Zhuo Liu | Yong Wang | ... | Jun Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 6662700
  • - Research Article

A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform

Shanshan Shi | Ting Luo | ... | Meng Du
  • Special Issue
  • - Volume 2021
  • - Article ID 6663486
  • - Research Article

Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network

Hao Zou | Pengpeng Yang | ... | Yao Zhao
  • Special Issue
  • - Volume 2021
  • - Article ID 6697295
  • - Research Article

A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology

Yuanju Gan
  • Special Issue
  • - Volume 2021
  • - Article ID 6693343
  • - Research Article

An Adaptive Visible Watermark Embedding Method based on Region Selection

Wenfa Qi | Yuxin Liu | ... | Zongming Guo
  • Special Issue
  • - Volume 2021
  • - Article ID 6615512
  • - Research Article

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment

Ahmad Alanezi | Bassem Abd-El-Atty | ... | Hany S. Khalifa
  • Special Issue
  • - Volume 2021
  • - Article ID 6627005
  • - Research Article

Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation

Li-Hua Gong | Jin Du | ... | Nan-Run Zhou
  • Special Issue
  • - Volume 2021
  • - Article ID 6677325
  • - Research Article

Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition

Youxia Dong | Xiaoling Huang | Guodong Ye
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate22%
Submission to final decision72 days
Acceptance to publication28 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.