24小时热门版块排行榜    

会议专版广告。小木虫无法确保会议的真实性。如果发现有虚假欺诈会议,请立即举报给我们。 [刊登会议、举报虚假会议广告,均请联系微信:18510626021 ]

查看: 2738  |  回复: 57
当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖

yedp

金虫 (正式写手)


[交流] 【2015-1-31】MULTIMEDIA TOOLS AND APPLICATIONS(CCF期刊SCI)专刊征稿!

会议城市:
武汉
截稿日期:
2015年1月31日

Call for Papers
Special Issue on Information Hiding and Forensic for Multimedia Security for Multimedia Tools and Applications


Aims and Scope
At present, information hiding techniques, including steganography, steganalysis and watermarking, have been efficient and important applications for covert communication. For a country or organization, the information hiding technique can be used to transfer confidential messages using steganography technique, protect copyright of a software or digital publication using watermarking technique, and etc. However, the above techniques may also be used by terrorists or illegal guys to endanger national security and destroy social stabilization. Therefore, steganalysis as the inverse technique is also needed for further research.
Additionally, multimedia forensic has been widely studied in recent years, and many digital forensic techniques have been proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. Nevertheless, there are some notable shortcomings in research methodologies. Current multimedia forensic studies are commonly based on the strict conditions that are nearly impossible to meet up in real applications. Furthermore, the high computational complexity of the current methods makes it hard to handle the big data in the computer networks. All these drawbacks limit the applications of the forensic and secure techniques in practice.
This special issue aims to bring together researchers in the fields of information hiding and digital forensic that can be used for multimedia security, and it will include a number of related topics, demonstrate pioneer works, investigate the novel solutions and discuss the future trends in this field. Possible topics for the manuscripts submitted to this special issue include, but are not limited to:
Information hiding based on images, audio, video, VoIP, and etc
Adaptive steganography and corresponding steganalysis
Steganographic codes
Reversible data hiding
Security evaluation and benchmark for information hiding
Novel applications and emerging trends of information hiding
Quantitative and locating steganalysis
Pattern classification ways used in steganalysis
Secure communication architecture based on information hiding
Multimedia watermarking, fingerprinting and identification
Multimedia forensics and counter forensics
Multimedia authentication and encryption
Multimedia network protection, privacy and security
Multimedia hashing and biometrics encryption
Security of large multimedia system
Signal processing in the encrypted domain
Secure multimedia system design and protocol security
Secure covert communications associated with big data
Privacy and security issues in multimedia cloud


Important Dates
Deadline of manuscript submission:                           31 January, 2015
Notification of review results:                        31 March, 2015
Deadline of revised manuscript submission:                30 April, 2015
Notification of final decisions:                                30 June, 2015


Instructions for Manuscripts
All manuscripts should follow author instructions of the journal and be submitted online at the Editorial ManagerTM submission site: https://www.editorialmanager.com/mtap
1. During the submission, please indicate the manuscripts are submitted to the special issue of Information Hiding and Forensic for Multimedia Security by choosing the corresponding article type.
2. The selected best papers from the 12th China Information Hiding and Multimedia Security Workshop (CIHW 2015) should undergone substantial extensions of at least 40% new contents with respect to the version of conference paper before submission.


Guest Editors
Prof. Dengpan Ye
Wuhan University, Wuhan 430072, China
E-mail: yedp2001@163.com

Dr. Xiangyang Luo
Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China
Email: xiangyangluo@126.com

Dr. Chuan Qin
School of Optical-Electrical and Computer Engineering,
University of Shanghai for Science and Technology, Shanghai 200093, China
E-mail: qin@usst.edu.cn

[ Last edited by yedp on 2014-7-18 at 22:10 ]

» 猜你喜欢

» 抢金币啦!回帖就可以得到:

查看全部散金贴

已阅   关注TA 给TA发消息 送TA红花 TA的回帖

brave小蚂蚁

禁虫 (著名写手)

本帖内容被屏蔽

57楼2014-12-16 10:28:13
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
查看全部 58 个回答

yuanyeguhong

至尊木虫 (文坛精英)



yedp(金币+1): 谢谢参与
谢谢楼主!
6楼2014-07-18 21:16:20
已阅   关注TA 给TA发消息 送TA红花 TA的回帖
简单回复
pzx10042楼
2014-07-18 21:01  
yedp(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]
吴大磊5楼
2014-07-18 21:12  
yedp(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]
wentao4908楼
2014-07-18 21:25  
yedp(金币+1): 谢谢参与
支持
信息提示
请填处理意见