| 查看: 772 | 回复: 1 | |||||||
[交流]
【2015-1-31】MULTIMEDIA TOOLS AND APPLICATIONS(CCF期刊SCI)专刊征稿!
|
|||||||
Call for Papers Special Issue on Information Hiding and Forensic for Multimedia Security for Multimedia Tools and Applications Aims and Scope At present, information hiding techniques, including steganography, steganalysis and watermarking, have been efficient and important applications for covert communication. For a country or organization, the information hiding technique can be used to transfer confidential messages using steganography technique, protect copyright of a software or digital publication using watermarking technique, and etc. However, the above techniques may also be used by terrorists or illegal guys to endanger national security and destroy social stabilization. Therefore, steganalysis as the inverse technique is also needed for further research. Additionally, multimedia forensic has been widely studied in recent years, and many digital forensic techniques have been proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. Nevertheless, there are some notable shortcomings in research methodologies. Current multimedia forensic studies are commonly based on the strict conditions that are nearly impossible to meet up in real applications. Furthermore, the high computational complexity of the current methods makes it hard to handle the big data in the computer networks. All these drawbacks limit the applications of the forensic and secure techniques in practice. This special issue aims to bring together researchers in the fields of information hiding and digital forensic that can be used for multimedia security, and it will include a number of related topics, demonstrate pioneer works, investigate the novel solutions and discuss the future trends in this field. Possible topics for the manuscripts submitted to this special issue include, but are not limited to: Information hiding based on images, audio, video, VoIP, and etc Adaptive steganography and corresponding steganalysis Steganographic codes Reversible data hiding Security evaluation and benchmark for information hiding Novel applications and emerging trends of information hiding Quantitative and locating steganalysis Pattern classification ways used in steganalysis Secure communication architecture based on information hiding Multimedia watermarking, fingerprinting and identification Multimedia forensics and counter forensics Multimedia authentication and encryption Multimedia network protection, privacy and security Multimedia hashing and biometrics encryption Security of large multimedia system Signal processing in the encrypted domain Secure multimedia system design and protocol security Secure covert communications associated with big data Privacy and security issues in multimedia cloud Important Dates Deadline of manuscript submission: 31 January, 2015 Notification of review results: 31 March, 2015 Deadline of revised manuscript submission: 30 April, 2015 Notification of final decisions: 30 June, 2015 Instructions for Manuscripts All manuscripts should follow author instructions of the journal and be submitted online at the Editorial ManagerTM submission site: https://www.editorialmanager.com/mtap. 1. During the submission, please indicate the manuscripts are submitted to the special issue of Information Hiding and Forensic for Multimedia Security by choosing the corresponding article type. 2. The selected best papers from the 12th China Information Hiding and Multimedia Security Workshop (CIHW 2015) should undergone substantial extensions of at least 40% new contents with respect to the version of conference paper before submission. Guest Editors Prof. Dengpan Ye Wuhan University, Wuhan 430072, China E-mail: yedp2001@163.com Dr. Xiangyang Luo Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China Email: xiangyangluo@126.com Dr. Chuan Qin School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China E-mail: qin@usst.edu.cn |
» 猜你喜欢
垃圾破二本职称评审标准
已经有19人回复
职称评审没过,求安慰
已经有53人回复
毕业后当辅导员了,天天各种学生超烦
已经有5人回复
26申博自荐
已经有3人回复
A期刊撤稿
已经有4人回复
» 抢金币啦!回帖就可以得到:
虚位以待,共探前沿:热烈欢迎报考北京工业大学纳米多孔材料课题组2026级博士研究生
+1/265
复旦大学化学系杰青/优青团队诚聘博士后
+3/150
山东第二医科大学和广州中医药大学药学硕士招生
+1/83
澳門大學 土木工程碩士和建造项目管理碩士招聘
+1/80
天津大学化学系吴立朋课题组申请考核制博士招生/博后招聘
+1/80
中国科学院山西煤炭化学研究所水污染防治与资源化利用方向招本科/硕士线上实习生
+1/78
中南民族大学超支化聚合物团队2026年博士研究生招生
+1/30
博士后招聘
+1/27
湖南师范大学杨亚辉/江浩团队招收电催化方向2026年博士生1名
+1/27
复旦大学彭慧胜院士团队 | 招聘有机合成方向博士后、博士生及科研助理
+1/22
求硫醇的合成资源
+1/19
玩个游戏吧
+2/18
上海大学昝鹏教授、军事医学研究院伯晓晨研究员/倪铭副研究员 课题组招聘博士生
+2/16
天津大学化学系吴立朋课题组申请考核制博士招生/博后招聘
+1/14
山东大学集成电路学院博士招生1名
+1/14
海南师范大学招收化学博士(光电功能材料课题组招收博士研究生)
+1/8
山东大学集成电路学院博士招生1名
+1/4
河南师范大学植物生殖生物学科研团队博士招聘
+1/3
英国兰卡斯特大学(Lancaster University)大模型、计算机视觉PhD招生
+1/2
南京大学FinTech大模型实验室招募斯坦福国际联培博士生(2026)
+1/1
简单回复
pzx10042楼
2014-07-18 20:38
yedp(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]













回复此楼