| 查看: 773 | 回复: 1 | |||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||
[交流]
【2015-1-31】MULTIMEDIA TOOLS AND APPLICATIONS(CCF期刊SCI)专刊征稿!
|
|||||||
Call for Papers Special Issue on Information Hiding and Forensic for Multimedia Security for Multimedia Tools and Applications Aims and Scope At present, information hiding techniques, including steganography, steganalysis and watermarking, have been efficient and important applications for covert communication. For a country or organization, the information hiding technique can be used to transfer confidential messages using steganography technique, protect copyright of a software or digital publication using watermarking technique, and etc. However, the above techniques may also be used by terrorists or illegal guys to endanger national security and destroy social stabilization. Therefore, steganalysis as the inverse technique is also needed for further research. Additionally, multimedia forensic has been widely studied in recent years, and many digital forensic techniques have been proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. Nevertheless, there are some notable shortcomings in research methodologies. Current multimedia forensic studies are commonly based on the strict conditions that are nearly impossible to meet up in real applications. Furthermore, the high computational complexity of the current methods makes it hard to handle the big data in the computer networks. All these drawbacks limit the applications of the forensic and secure techniques in practice. This special issue aims to bring together researchers in the fields of information hiding and digital forensic that can be used for multimedia security, and it will include a number of related topics, demonstrate pioneer works, investigate the novel solutions and discuss the future trends in this field. Possible topics for the manuscripts submitted to this special issue include, but are not limited to: Information hiding based on images, audio, video, VoIP, and etc Adaptive steganography and corresponding steganalysis Steganographic codes Reversible data hiding Security evaluation and benchmark for information hiding Novel applications and emerging trends of information hiding Quantitative and locating steganalysis Pattern classification ways used in steganalysis Secure communication architecture based on information hiding Multimedia watermarking, fingerprinting and identification Multimedia forensics and counter forensics Multimedia authentication and encryption Multimedia network protection, privacy and security Multimedia hashing and biometrics encryption Security of large multimedia system Signal processing in the encrypted domain Secure multimedia system design and protocol security Secure covert communications associated with big data Privacy and security issues in multimedia cloud Important Dates Deadline of manuscript submission: 31 January, 2015 Notification of review results: 31 March, 2015 Deadline of revised manuscript submission: 30 April, 2015 Notification of final decisions: 30 June, 2015 Instructions for Manuscripts All manuscripts should follow author instructions of the journal and be submitted online at the Editorial ManagerTM submission site: https://www.editorialmanager.com/mtap. 1. During the submission, please indicate the manuscripts are submitted to the special issue of Information Hiding and Forensic for Multimedia Security by choosing the corresponding article type. 2. The selected best papers from the 12th China Information Hiding and Multimedia Security Workshop (CIHW 2015) should undergone substantial extensions of at least 40% new contents with respect to the version of conference paper before submission. Guest Editors Prof. Dengpan Ye Wuhan University, Wuhan 430072, China E-mail: yedp2001@163.com Dr. Xiangyang Luo Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China Email: xiangyangluo@126.com Dr. Chuan Qin School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China E-mail: qin@usst.edu.cn |
» 猜你喜欢
不自信的我
已经有11人回复
北核录用
已经有3人回复
要不要辞职读博?
已经有6人回复
实验室接单子
已经有3人回复
磺酰氟产物,毕不了业了!
已经有8人回复
求助:我三月中下旬出站,青基依托单位怎么办?
已经有10人回复
26申博(荧光探针方向,有机合成)
已经有4人回复
论文终于录用啦!满足毕业条件了
已经有26人回复
2026年机械制造与材料应用国际会议 (ICMMMA 2026)
已经有4人回复
Cas 72-43-5需要30g,定制合成,能接单的留言
已经有8人回复
» 抢金币啦!回帖就可以得到:
求一个访问学者邀请函,非常非常感谢
+1/679
中国科学院大学功能多孔组装材料实验室招聘启事
+2/336
博士去军队文职怎么样
+5/225
16年了,来看看大家
+1/198
双一流南京医科大学招计算机、AI、统计、生物信息等方向26年9月入学博士
+1/177
上海大学昝鹏教授、军事医学研究院伯晓晨研究员/倪铭副研究员 课题组招聘博士生
+1/80
深圳大学材料学院黄妍斐教授课题组诚招2026年秋季入学博士生
+1/78
昆明理工大学冶能院离子液体冶金课题组招收博士
+1/57
南京工业大学城市建设学院招收建筑节能方向2026年入学全日制博士
+2/50
SCI,计算机相关可以写
+1/21
华中科技大学袁书珊教授团队招2026年申请审核制博士生1-2名
+1/17
SCI,计算机相关可以写
+1/17
杨老师招收联合培养硕士、博士生或客座学生
+1/16
SCI计算机相关论文
+1/11
【博士后/科研助理招聘-北京理工大学-集成电路与电子学院-国家杰青团队】
+1/8
信息工程大学教授团队网络空间安全专业博士招生【2026年1月31日报名截止】
+1/8
中科院深圳理工大学网络课题组招聘博后/RA/实习生
+1/7
【博士后/科研助理招聘-北京理工大学-集成电路与电子学院-国家杰青团队】
+1/7
双一流天津工业大学电信学院李鸿强教授招收2026年申请审核制博士3人
+1/3
美国麻省大学电子工程系招收全奖博士生和博士后
+1/2












回复此楼