| ²é¿´: 791 | »Ø¸´: 1 | |||||||
[½»Á÷]
¡¾2015-1-31¡¿MULTIMEDIA TOOLS AND APPLICATIONS£¨CCFÆÚ¿¯SCI£©×¨¿¯Õ÷¸å£¡
|
|||||||
Call for Papers Special Issue on Information Hiding and Forensic for Multimedia Security for Multimedia Tools and Applications Aims and Scope At present, information hiding techniques, including steganography, steganalysis and watermarking, have been efficient and important applications for covert communication. For a country or organization, the information hiding technique can be used to transfer confidential messages using steganography technique, protect copyright of a software or digital publication using watermarking technique, and etc. However, the above techniques may also be used by terrorists or illegal guys to endanger national security and destroy social stabilization. Therefore, steganalysis as the inverse technique is also needed for further research. Additionally, multimedia forensic has been widely studied in recent years, and many digital forensic techniques have been proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. Nevertheless, there are some notable shortcomings in research methodologies. Current multimedia forensic studies are commonly based on the strict conditions that are nearly impossible to meet up in real applications. Furthermore, the high computational complexity of the current methods makes it hard to handle the big data in the computer networks. All these drawbacks limit the applications of the forensic and secure techniques in practice. This special issue aims to bring together researchers in the fields of information hiding and digital forensic that can be used for multimedia security, and it will include a number of related topics, demonstrate pioneer works, investigate the novel solutions and discuss the future trends in this field. Possible topics for the manuscripts submitted to this special issue include, but are not limited to: Information hiding based on images, audio, video, VoIP, and etc Adaptive steganography and corresponding steganalysis Steganographic codes Reversible data hiding Security evaluation and benchmark for information hiding Novel applications and emerging trends of information hiding Quantitative and locating steganalysis Pattern classification ways used in steganalysis Secure communication architecture based on information hiding Multimedia watermarking, fingerprinting and identification Multimedia forensics and counter forensics Multimedia authentication and encryption Multimedia network protection, privacy and security Multimedia hashing and biometrics encryption Security of large multimedia system Signal processing in the encrypted domain Secure multimedia system design and protocol security Secure covert communications associated with big data Privacy and security issues in multimedia cloud Important Dates Deadline of manuscript submission: 31 January, 2015 Notification of review results: 31 March, 2015 Deadline of revised manuscript submission: 30 April, 2015 Notification of final decisions: 30 June, 2015 Instructions for Manuscripts All manuscripts should follow author instructions of the journal and be submitted online at the Editorial ManagerTM submission site: https://www.editorialmanager.com/mtap. 1. During the submission, please indicate the manuscripts are submitted to the special issue of Information Hiding and Forensic for Multimedia Security by choosing the corresponding article type. 2. The selected best papers from the 12th China Information Hiding and Multimedia Security Workshop (CIHW 2015) should undergone substantial extensions of at least 40% new contents with respect to the version of conference paper before submission. Guest Editors Prof. Dengpan Ye Wuhan University, Wuhan 430072, China E-mail: yedp2001@163.com Dr. Xiangyang Luo Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China Email: xiangyangluo@126.com Dr. Chuan Qin School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China E-mail: qin@usst.edu.cn |
» ²ÂÄãϲ»¶
085600 286·Ö ²ÄÁÏÇóµ÷¼Á
ÒѾÓÐ4È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
275Çóµ÷¼Á
ÒѾÓÐ10È˻ظ´
286Çóµ÷¼Á
ÒѾÓÐ6È˻ظ´
083000ѧ˶274Çóµ÷¼Á
ÒѾÓÐ5È˻ظ´
¡¾Çóµ÷¼Á¡¿085601²ÄÁϹ¤³Ìר˶ | ×Ü·Ö272 |
ÒѾÓÐ5È˻ظ´
275Çóµ÷¼Á
ÒѾÓÐ13È˻ظ´
0856£¬²ÄÁÏÓ뻯¹¤321·ÖÇóµ÷¼Á
ÒѾÓÐ8È˻ظ´
085701»·¾³¹¤³Ì£¬267Çóµ÷¼Á
ÒѾÓÐ12È˻ظ´
320·Ö£¬²ÄÁÏÓ뻯¹¤×¨Òµ£¬Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
» ÇÀ½ð±ÒÀ²£¡»ØÌû¾Í¿ÉÒԵõ½:
ÇóÖú×ÏÍâ¿É¼û·Ö¹â¹â¶È¼Æ
+1/99
̫ԿƼ¼´óѧ²ÄÁÏ¿ÆÑ§Ó빤³ÌѧԺÕÐÊÕ½ðÊô²ÄÁÏÀ಩ʿһÃû
+1/82
Ìì½ò¿Æ¼¼´óѧ-£¨ÔºÊ¿ÍŶӣ©ÏȽøÏËάÓëÖ½»ù¹¦ÄܲÄÁÏÍÅ¶Ó ÕÐÊÕ˶ʿÉú
+1/46
Ìì½òÀí¹¤´óѧ¹ú¼Ò½ÜÇàÍõÌúÍŶÓÕÐÆ¸
+1/29
¸£½¨Ê¦·¶´óѧ»·¾³Óë×ÊԴѧԺ»·¾³µç»¯Ñ§¿ÎÌâ×éÕÐÊÕ2026˶ʿ£¨º¬µ÷¼Á£©
+1/29
±±¾©Àí¹¤´óѧ-»¯Ñ§Ó뻯¹¤Ñ§Ôº-ÕÐÊÕ2026¼¶²©Ê¿Éú [ÉêÇë-¿¼ºËÖÆ]
+1/26
˫һÁ÷´óÑ§ÏæÌ¶´óѧ¡°»¯¹¤¹ý³ÌÄ£ÄâÓëÇ¿»¯¡±¹ú¼ÒµØ·½ÁªºÏ¹¤³ÌÑо¿ÖÐÐÄÕÐÊÕ²©Ê¿Éú
+1/17
Alicat ²ãÁ÷ѹ²îÖÊÁ¿Á÷Á¿¿ØÖÆÆ÷ÔÚÐÂÐ͹è̼¸º¼«Á÷»¯´²µÄÓ¦ÓÃ- °¬Àï¿¨ÌØ£¨Alicat£©
+3/10
shuÏæÌ¶´óѧ»¯¹¤Ñ§ÔºÕÐÊÕ»¯¹¤¡¢ÄÜÔ´¶¯Á¦¡¢¹¤³ÌÈÈÎïÀíÏà¹ØÑо¿Éúµ÷¼Á
+1/8
¡¾²©Ê¿ÕÐÉú¡¿Î人¿Æ¼¼´óѧÕÐÊÕ²ÄÁÏ¡¢»¯¹¤¡¢»·¾³¡¢Ò±½ðÀà2026Äê¡°ÉêÇë-¿¼ºË¡±ÖƲ©Ê¿Éú
+1/8
Öйú¿ÆÑ§ÔºÉϺ£¹èËáÑÎÑо¿ËùÕÐÆ¸¿ÆÑÐÖúÀí£¨ÄÉÃײÄÁÏÓëÉúÎïÓ¦Ó÷½Ïò£©
+1/7
¹þ¹¤´óºÕÏþ¶«ÔºÊ¿ÍŶÓË峬½ÌÊÚÕÐÊÕ²ÄÁÏѧ²©Ê¿1Ãû
+1/7
Öйú¿ÆÑ§ÔºÉϺ£¹èËáÑÎÑо¿ËùÕÐÆ¸¿ÆÑÐÖúÀí£¨ÄÉÃײÄÁÏÓëÉúÎïÓ¦Ó÷½Ïò£©
+1/5
Öйú¿ÆÑ§Ôº´óѧÄÉÃ׿ÆÑ§Óë¼¼ÊõѧԺ-ÂÞñõ¿ÎÌâ×é³ÏÕÐ˶ʿÑо¿Éú
+1/5
ÉϺ£½»´óÕÐÊÕ26Äê¼¶Çï¼¾Èëѧ²©Ê¿Éú£¬CET-6¹ý£¬ÉúÎïÒ½ÓòÄÁÏ·½Ïò£¨Óи߷Ö×Ӻϳɻù´¡£©
+1/4
Ìì½ò¹¤Òµ´óѧ˫һÁ÷¸ßУÕв©Ê¿¡¢Ë¶Ê¿¡¢²©Ê¿ºó
+1/3
ɽ¶«¼ÃÄÏÊ¡ÊôÖØµã¸ßУÉú̬»·¾³Àà˶ʿµ÷¼ÁÐÅÏ¢
+1/2
26ÄêÕÐÊÕ07 08ѧÊõÐÍ/רҵÐÍ˶ʿÑо¿Éú
+1/1
ÉϺ£½»Í¨´óѧ»·¾³ÖÇÄܸÐ֪ʵÑéÊÒÕÐÆ¸²©Ê¿ºó
+1/1
2026Äê Î人·ÄÖ¯´óѧ ¼¼ÊõÑо¿Ôº ·ÄÖ¯ÏËά¼°ÖÆÆ·½ÌÓý²¿ÖصãʵÑéÊÒ ½ÓÊÕµ÷¼ÁÑо¿Éú£¡
+1/1
¼òµ¥»Ø¸´
pzx10042Â¥
2014-07-18 20:38
yedp(½ð±Ò+1): лл²ÎÓë
×£¸£ [ ·¢×ÔСľ³æ¿Í»§¶Ë ]














»Ø¸´´ËÂ¥