Loading [Contrib]/a11y/accessibility-menu.js

Special Issue: Security and Privacy Protection for Multimedia Information Processing and communication

Guest Editors

Prof. Chuan Qin (corresponding guest editor)
University of Shanghai for Science and Technology, China
Email: qin@usst.edu.cn


Prof. Xiaolong Li
Beijing Jiaotong University, China
Email: lixl@bjtu.edu.cn


Prof. Zhenxing Qian
Fudan University, China
Email: zxqian@fudan.edu.cn


Prof. Jinwei Wang
Nanjing University of Information Science & Technology, China
Email: wjwei@nuist.edu.cn


Manuscript Topics

Multimedia information processing and communication are popular in our daily lives, however, a lot of security issues have arisen as well, such as covert communication using multimedia files, copy-move forgery in digital images and videos, biometric spoofing. To address these issues, many multimedia information security techniques were proposed by the methods, such as secure deep learning, signal processing in encrypted domain, and privacy protection. Nevertheless, there are still some deficiencies in research methodologies. Current studies for multimedia security are usually based on strict conditions that are nearly impossible to meet up in real applications. Furthermore, high computational complexity of current methods makes it hard to handle big data in cloud computing environment. All these drawbacks limit the applications of secure techniques in practice. This special issue will focus on the latest research on the topics of security and privacy protection for multimedia information processing, with a particular emphasis on novel methodologies that have the potential to be used for communication. Possible topics for the manuscripts submitted to this special issue include, but are not limited to:


• Multimedia Encryption and Forensic
• Robust, Fragile and Semi-Fragile Watermarking
• Steganography and Steganalysis for Multimedia Data
• Multimedia Fingerprinting and Traitor Tracing
• Privacy Protection for Multimedia Data
• Biometrics Encryption and Hashing in cloud storages
• Signal Processing in the Encrypted Domain
• Reversible and Coverless Data Hiding
• Multimedia Processing with Secure Deep Learning
• New Methods of Patten Recognition for Multimedia Processing
• Source Device Identification and Linking
• Covert Communications and Surveillance


Instructions for authors
http://awstest-alb.aimspress.com/mbe/news/solo-detail/instructionsforauthors
Please submit your manuscript to online submission system
http://oeps.aimspress.com/mbe/ch/author/login.aspx

Paper Submission

All manuscripts will be peer-reviewed before their acceptance for publication. The deadline for manuscript submission is 15 May 2019

Published Papers(28)

Research article
A stochastic location privacy protection scheme for edge computing
Yuan Tian Biao Song Mznah Al Rodhaan Chen Rong Huang Mohammed A. Al-Dhelaan Abdullah Al-Dhelaan Najla Al-Nabhan
2020, Volume 17, Issue 3: 2636-2649. doi: 10.3934/mbe.2020144
Abstract HTML PDF Cited (6) Viewed (4618)
Research article
Security protection using two different image shadows with authentication
Yanjun Liu Chin-Chen Chang Peng-Cheng Huang
2019, Volume 16, Issue 4: 1914-1932. doi: 10.3934/mbe.2019093
Abstract HTML PDF Cited (7) Viewed (4489)
Research article
Robust authentication for paper-based text documents based on text watermarking technology
Wenfa Qi Wei Guo Tong Zhang Yuxin Liu Zongming Guo Xifeng Fang
2019, Volume 16, Issue 4: 2233-2249. doi: 10.3934/mbe.2019110
Abstract HTML PDF Cited (18) Viewed (5332)
Research article
Steganography in beautified images
Liyun Liu Zichi Wang Zhenxing Qian Xinpeng Zhang Guorui Feng
2019, Volume 16, Issue 4: 2322-2333. doi: 10.3934/mbe.2019116
Abstract HTML PDF Viewed (5361)
Research article
High capacity reversible data hiding in MP3 based on Huffman table transformation
Dingwei Tan Yuliang Lu Xuehu Yan Lintao Liu Longlong Li
2019, Volume 16, Issue 4: 3183-3194. doi: 10.3934/mbe.2019158
Abstract HTML PDF Cited (2) Viewed (5016)
Research article
A full convolutional network based on DenseNet for remote sensing scene classification
Jianming Zhang Chaoquan Lu Xudong Li Hye-Jin Kim Jin Wang
2019, Volume 16, Issue 5: 3345-3367. doi: 10.3934/mbe.2019167
Abstract HTML PDF Cited (125) Viewed (11603)
Research article
Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems
Ching-Chun Chang Chang-Tsun Li
2019, Volume 16, Issue 5: 3367-3381. doi: 10.3934/mbe.2019168
Abstract HTML PDF Cited (28) Viewed (5442)
Research article
Enhance embedding capacity for switch map based multi-group EMD data hiding
Yan-Xiao Liu Ching-Nung Yang Qin-Dong Sun
2019, Volume 16, Issue 5: 3382-3392. doi: 10.3934/mbe.2019169
Abstract HTML PDF Viewed (4511)
Research article
A video watermark algorithm based on tensor decomposition
Shanqing Zhang Xiaoyun Guo Xianghua Xu Li Li Chin-Chen Chang
2019, Volume 16, Issue 5: 3435-3449. doi: 10.3934/mbe.2019172
Abstract HTML PDF Cited (7) Viewed (5731)
Research article
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting
Kaimeng Chen Chin-Chen Chang
2019, Volume 16, Issue 5: 3947-3964. doi: 10.3934/mbe.2019195
Abstract HTML PDF Cited (4) Viewed (4610)
Research article
A new JPEG image steganalysis technique combining rich model features and convolutional neural networks
Tao Zhang Hao Zhang Ran Wang Yunda Wu
2019, Volume 16, Issue 5: 4069-4081. doi: 10.3934/mbe.2019201
Abstract HTML PDF Cited (9) Viewed (6195)
Research article
Continuous variable quantum steganography protocol based on quantum identity
Zhiguo Qu Leiming Jiang Le Sun Mingming Wang Xiaojun Wang
2019, Volume 16, Issue 5: 4182-4195. doi: 10.3934/mbe.2019208
Abstract HTML PDF Cited (1) Viewed (4446)
Research article
Data-Loss resilience video steganography using frame reference and data ensemble reconstruction
Fengyong Li Jiang Yu Yanli Ren
2019, Volume 16, Issue 5: 4559-4580. doi: 10.3934/mbe.2019228
Abstract HTML PDF Cited (1) Viewed (4828)
Research article
A high-capacity coverless image steganography method based on double-level index and block matching
Xianyi Chen Anqi Qiu Xingming Sun Shuai Wang Guo Wei
2019, Volume 16, Issue 5: 4708-4722. doi: 10.3934/mbe.2019236
Abstract HTML PDF Viewed (5725)
Research article
Information hiding based on Augmented Reality
Chuanlong Li Xingming Sun Yuqian Li
2019, Volume 16, Issue 5: 4777-4787. doi: 10.3934/mbe.2019240
Abstract HTML PDF Cited (9) Viewed (5618)
Research article
Robust digital watermarking for color images in combined DFT and DT-CWT domains
Qichao Ying Jingzhi Lin Zhenxing Qian Haisheng Xu Xinpeng Zhang
2019, Volume 16, Issue 5: 4788-4801. doi: 10.3934/mbe.2019241
Abstract HTML PDF Cited (19) Viewed (6150)
Research article
Reducing file size and time complexity in secret sharing based document protection
Yan-Xiao Liu Ya-Ze Zhang Ching-Nung Yang
2019, Volume 16, Issue 5: 4802-4817. doi: 10.3934/mbe.2019242
Abstract HTML PDF Cited (2) Viewed (4387)
Research article
Text steganography on RNN-Generated lyrics
Yongju Tong YuLing Liu Jie Wang Guojiang Xin
2019, Volume 16, Issue 5: 5451-5463. doi: 10.3934/mbe.2019271
Abstract HTML PDF Cited (15) Viewed (8499)
Research article
CAPTCHA recognition based on deep convolutional neural network
Jing Wang Jiaohua Qin Xuyu Xiang Yun Tan Nan Pan
2019, Volume 16, Issue 5: 5851-5861. doi: 10.3934/mbe.2019292
Abstract HTML PDF Cited (69) Viewed (10372)
Research article
Robust image hashing via visual attention model and ring partition
Zhenjun Tang Yongzheng Yu Hanyun Zhang Mengzhu Yu Chunqiang Yu Xianquan Zhang
2019, Volume 16, Issue 5: 6103-6120. doi: 10.3934/mbe.2019305
Abstract HTML PDF Cited (17) Viewed (4915)
Research article
A batch copyright scheme for digital image based on deep neural network
Haoyu Lu Daofu Gong Fenlin Liu Hui Liu Jinghua Qu
2019, Volume 16, Issue 5: 6121-6133. doi: 10.3934/mbe.2019306
Abstract HTML PDF Cited (1) Viewed (4734)
Research article
A novel secret sharing scheme using multiple share images
Xiaoping Li Yanjun Liu Hefeng Chen Chin-Chen Chang
2019, Volume 16, Issue 6: 6350-6366. doi: 10.3934/mbe.2019317
Abstract HTML PDF Viewed (4872)
Research article
Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code
Song Wan Guozheng Yang Lanlan Qi Longlong Li Xuehu Yan Yuliang Lu
2019, Volume 16, Issue 6: 6367-6385. doi: 10.3934/mbe.2019318
Abstract HTML PDF Cited (11) Viewed (8248)
Research article
Color image splicing localization algorithm by quaternion fully convolutional networks and superpixel-enhanced pairwise conditional random field
Beijing Chen Ye Gao Lingzheng Xu Xiaopeng Hong Yuhui Zheng Yun-Qing Shi
2019, Volume 16, Issue 6: 6907-6922. doi: 10.3934/mbe.2019346
Abstract HTML PDF Cited (8) Viewed (5193)
Research article
Exfiltrating data from an air-gapped system through a screen-camera covert channel
Longlong Li Yuliang Lu Xuehu Yan Dingwei Tan
2019, Volume 16, Issue 6: 7458-7476. doi: 10.3934/mbe.2019374
Abstract HTML PDF Cited (1) Viewed (4945)
Research article
AMBTC based high payload data hiding with modulo-2 operation and Hamming code
Li Li Min He Shanqing Zhang Ting Luo Chin-Chen Chang
2019, Volume 16, Issue 6: 7934-7949. doi: 10.3934/mbe.2019399
Abstract HTML PDF Cited (5) Viewed (4578)
Research article
High capacity data hiding with absolute moment block truncation coding image based on interpolation
Cheonshik Kim Dongkyoo Shin Ching-Nung Yang
2020, Volume 17, Issue 1: 160-178. doi: 10.3934/mbe.2020009
Abstract HTML PDF Cited (2) Viewed (4499)
Research article
Image steganalysis feature selection based on the improved Fisher criterion
Yuanyuan Ma Jinwei Wang Xiangyang Luo Zhenyu Li Chunfang Yang Jun Chen
2020, Volume 17, Issue 2: 1355-1371. doi: 10.3934/mbe.2020068
Abstract HTML PDF Cited (5) Viewed (4800)