Loading [Contrib]/a11y/accessibility-menu.js

Special Issue: Information Multimedia Hiding & Forensics based on Intelligent Devices

Guest Editors

Prof. Xiangyang Luo (corresponding guest editor)
Zhengzhou Science and Technology Institute, China
Email: xiangyangluo@126.com


Prof. Yun-Qing Shi
New Jersey Institute of Technology, USA
Email: shi@njit.edu


Prof. Jinwei Wang
Nanjing University of Information Science & Technology, China
Email: wjwei@nuist.edu.cn


Prof. Qi Liu
Edinburgh Napier University, UK
Email: q.liu@napier.ac.uk


Prof. Le Sun
Sungkyunkwan University, Korea
Email: sunlecncom@skku.edu


Prof. Bo Wang
State University of New York at Buffalo, USA
Email: bwang34@buffalo.edu


Manuscript Topics

With the rapid growth and use of all the networks, the number of illegal activities increases exponentially. The endangering public safety events engineered by potential lawbreaker for information interaction and hook occur frequently in recent years. Meanwhile, artificial intelligent, especially deep learning has been focused on solving variety of difficult problems. Intelligent multimedia hiding and forensics aim at information hiding and forensics for multimedia by using artificial intelligent techniques, including digital watermarking, steganography, digital forensics, copyright protection, and privacy preserving, which has been a comparatively new field of forensic science with great value. The research on intelligent multimedia hiding and forensics is of great significance for fighting against illegal and criminal in Internet, maintaining social stability. Potential topics include, but are not limited to:


• Intelligent steganography and steganalysis
• Coverless information hiding
• Security of Large Multimedia System
• Multimedia watermarking and detection
• Multimedia forensics and counter-forensics
• Intelligent multimedia processing in encrypted domain
• Intelligent analysis for covert communications and surveillance
• Multimedia security on network protocol
• Multimedia Encryption and Forensic
• Steganography and Steganalysis for Multimedia Data
• Privacy Protection for Multimedia Data
• Signal Processing in the Encrypted Domain
• Multimedia Processing with Secure Deep Learning
• Covert Communications and Surveillance


Instructions for authors
https://www.aimspress.com/mbe/news/solo-detail/instructionsforauthors
Please submit your manuscript to online submission system
http://oeps.aimspress.com/mbe/ch/author/login.aspx

Paper Submission

All manuscripts will be peer-reviewed before their acceptance for publication. The deadline for manuscript submission is 25 January 2019

Published Papers(15)

Research article
A collaborative secret sharing scheme based on the Chinese Remainder Theorem
Xingxing Jia Yixuan Song Daoshun Wang Daxin Nie Jinzhao Wu
2019, Volume 16, Issue 3: 1280-1299. doi: 10.3934/mbe.2019062
Abstract HTML PDF Cited (7) Viewed (4994)
Research article
Subspace-based non-blind deconvolution
Peixian Zhuang Xinghao Ding Jinming Duan
2019, Volume 16, Issue 4: 2202-2218. doi: 10.3934/mbe.2019108
Abstract HTML PDF Cited (1) Viewed (4792)
Research article
A reversible database watermarking method with low distortion
Yan Li Junwei Wang Shuangkui Ge Xiangyang Luo Bo Wang
2019, Volume 16, Issue 5: 4053-4068. doi: 10.3934/mbe.2019200
Abstract HTML PDF Cited (24) Viewed (5047)
Research article
Ramp secret image sharing
Xuehu Yan Longlong Li Lintao Liu Yuliang Lu Xianhua Song
2019, Volume 16, Issue 5: 4433-4455. doi: 10.3934/mbe.2019221
Abstract HTML PDF Cited (1) Viewed (4590)
Research article
Detection and localization of image forgeries using improved mask regional convolutional neural network
Xinyi Wang He Wang Shaozhang Niu Jiwei Zhang
2019, Volume 16, Issue 5: 4581-4593. doi: 10.3934/mbe.2019229
Abstract HTML PDF Cited (51) Viewed (8165)
Research article
Locating secret messages based on quantitative steganalysis
Chunfang Yang Fenlin Liu Shuangkui Ge Jicang Lu Junwei Huang
2019, Volume 16, Issue 5: 4908-4922. doi: 10.3934/mbe.2019247
Abstract HTML PDF Cited (7) Viewed (4429)
Research article
An anti-forensic scheme on computer graphic images and natural images using generative adversarial networks
Qi Cui Ruohan Meng Zhili Zhou Xingming Sun Kaiwen Zhu
2019, Volume 16, Issue 5: 4923-4935. doi: 10.3934/mbe.2019248
Abstract HTML PDF Cited (4) Viewed (5231)
Research article
Effects of quantum noises on χ state-based quantum steganography protocol
Zhiguo Qu Shengyao Wu Le Sun Mingming Wang Xiaojun Wang
2019, Volume 16, Issue 5: 4999-5021. doi: 10.3934/mbe.2019252
Abstract HTML PDF Cited (3) Viewed (4983)
Research article
Resampling detection of recompressed images via dual-stream convolutional neural network
Gang Cao Antao Zhou Xianglin Huang Gege Song Lifang Yang Yonggui Zhu
2019, Volume 16, Issue 5: 5022-5040. doi: 10.3934/mbe.2019253
Abstract HTML PDF Cited (8) Viewed (5781)
Research article
Joint statistics matching for camera model identification of recompressed images
Bo Wang Yabin Li Xue Sui Ming Li Yanqing Guo
2019, Volume 16, Issue 5: 5041-5061. doi: 10.3934/mbe.2019254
Abstract HTML PDF Cited (3) Viewed (4561)
Research article
An IPVO-based reversible data hiding scheme using floating predictors
Rong Li Xiangyang Li Yan Xiong An Jiang David Lee
2019, Volume 16, Issue 5: 5324-5345. doi: 10.3934/mbe.2019266
Abstract HTML PDF Cited (2) Viewed (4909)
Research article
JPEG compression history detection based on detail deviation
Bo Wang Yabin Li Jianxiang Zhao Xue Sui Xiangwei Kong
2019, Volume 16, Issue 5: 5584-5594. doi: 10.3934/mbe.2019277
Abstract HTML PDF Cited (1) Viewed (5046)
Research article
Steganographic coding scheme based on dither convolutional trellis under resampling mechanism
Pengcheng Cao Weiwei Liu Guangjie Liu Jiangtao Zhai Xiaopeng Ji Yuewei Dai
2019, Volume 16, Issue 5: 6015-6033. doi: 10.3934/mbe.2019301
Abstract HTML PDF Viewed (5025)
Research article
ONS resolution prediction based on Rasch model
Huqing Wang Feng Xiang Wenbing Zhao Zhixin Sun
2019, Volume 16, Issue 6: 6683-6695. doi: 10.3934/mbe.2019333
Abstract HTML PDF Viewed (4054)
Research article
A convolutional neural network-based linguistic steganalysis for synonym substitution steganography
Lingyun Xiang Guoqing Guo Jingming Yu Victor S. Sheng Peng Yang
2020, Volume 17, Issue 2: 1041-1058. doi: 10.3934/mbe.2020055
Abstract HTML PDF Cited (59) Viewed (6828)