Security and Communication Networks

Image Security and Image Privacy Protection


Publishing date
01 May 2021
Status
Published
Submission deadline
01 Jan 2021

Lead Editor

1Guangdong Ocean University, Zhanjiang, China

2Nanchang University, Nanchang, China

3Chongqing Institute of Engineering, Chongqing, China

4Tunku Abdul Rahman University, Petaling Jaya, Malaysia


Image Security and Image Privacy Protection

Description

Images are widely used in communication all over the world. Images are used in many applications, including medical images, remote sensing, education images, electronic commerce, etc. Through the convenience of the Internet, we can share images and information at any time and any place.

However, some images may refer to private personal or other commercial information. Image security should be paid much attention in order to combat illegal access, revision, and other attacks. In recent years, many image encryption algorithms have been proposed and published, for example, chaos-based methods, compressive sensing-based schemes, quantum map-based algorithms, etc. Under the information era and the arrival of big data, we need a higher level of security protection for our images. Our images are transferred and opened over public networks, so applying cryptography to the image is a direct way to hiding image information and implementing data protection. There are two cipher structures: symmetric cipher and asymmetric cipher. Symmetric ciphers use the same keys to encrypt and decrypt the image, while in asymmetric ciphers the sender and receiver have different keys. However, quantum computers within the environment of 5G networks will present a challenge to the current image encryption algorithms. The design of new encryption algorithms needs further investigation.

This Special Issue welcomes all experts and scholars to submit their new methods or algorithms written in research papers, aiming to offer image security and image privacy protection. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • Image encryption
  • Image watermarking
  • Visual image encryption
  • Image information hiding
  • Quantum image encryption
  • Blockchain with its applications in image encryption
  • Compressive sensing with its applications in image encryption
  • Chaos with its applications in image encryption
  • Optical image security
  • Other encryption methods for images

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6612614
  • - Research Article

An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation

Shuaijianni Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 6661852
  • - Research Article

Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy

Zhonghua Wang | Siwei Duan | Chengli Sun
  • Special Issue
  • - Volume 2021
  • - Article ID 6675565
  • - Research Article

A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata

Jie Zeng | Chunhua Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 6674948
  • - Research Article

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map

Youxia Dong | Xiaoling Huang | ... | Yuanju Gan
  • Special Issue
  • - Volume 2020
  • - Article ID 8840779
  • - Research Article

A Novel Comprehensive Watermarking Scheme for Color Images

Shaohua Duan | Hanwen Wang | ... | Xiaoyi Zhou
  • Special Issue
  • - Volume 2020
  • - Article ID 8842376
  • - Research Article

An Unequal Image Privacy Protection Method Based on Saliency Detection

Rongxin Tu | Wenying Wen | Changsheng Hua
  • Special Issue
  • - Volume 2020
  • - Article ID 8841302
  • - Research Article

3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System

Huiqing Huang | Dongsheng Cheng
  • Special Issue
  • - Volume 2020
  • - Article ID 6626471
  • - Research Article

Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving

Yaojie Wang | Xiaolong Cui | ... | Bo Gan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.