Special Issue: Security and Privacy Protection for Multimedia Information Processing and communication
Guest Editors
Prof. Chuan Qin (corresponding guest editor)
University of Shanghai for Science and Technology, China
Email: qin@usst.edu.cn
Prof. Xiaolong Li
Beijing Jiaotong University, China
Email: lixl@bjtu.edu.cn
Prof. Zhenxing Qian
Fudan University, China
Email: zxqian@fudan.edu.cn
Prof. Jinwei Wang
Nanjing University of Information Science & Technology, China
Email: wjwei@nuist.edu.cn
Manuscript Topics
Multimedia information processing and communication are popular in our daily lives, however, a lot of security issues have arisen as well, such as covert communication using multimedia files, copy-move forgery in digital images and videos, biometric spoofing. To address these issues, many multimedia information security techniques were proposed by the methods, such as secure deep learning, signal processing in encrypted domain, and privacy protection. Nevertheless, there are still some deficiencies in research methodologies. Current studies for multimedia security are usually based on strict conditions that are nearly impossible to meet up in real applications. Furthermore, high computational complexity of current methods makes it hard to handle big data in cloud computing environment. All these drawbacks limit the applications of secure techniques in practice. This special issue will focus on the latest research on the topics of security and privacy protection for multimedia information processing, with a particular emphasis on novel methodologies that have the potential to be used for communication. Possible topics for the manuscripts submitted to this special issue include, but are not limited to:
• Multimedia Encryption and Forensic
• Robust, Fragile and Semi-Fragile Watermarking
• Steganography and Steganalysis for Multimedia Data
• Multimedia Fingerprinting and Traitor Tracing
• Privacy Protection for Multimedia Data
• Biometrics Encryption and Hashing in cloud storages
• Signal Processing in the Encrypted Domain
• Reversible and Coverless Data Hiding
• Multimedia Processing with Secure Deep Learning
• New Methods of Patten Recognition for Multimedia Processing
• Source Device Identification and Linking
• Covert Communications and Surveillance
Instructions for authors
http://awstest-alb.aimspress.com/mbe/news/solo-detail/instructionsforauthors
Please submit your manuscript to online submission system
http://oeps.aimspress.com/mbe/ch/author/login.aspx