| 查看: 2820 | 回复: 57 | |||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||
[交流]
【2015-1-31】MULTIMEDIA TOOLS AND APPLICATIONS(CCF期刊SCI)专刊征稿!
|
|||||||
Call for Papers Special Issue on Information Hiding and Forensic for Multimedia Security for Multimedia Tools and Applications Aims and Scope At present, information hiding techniques, including steganography, steganalysis and watermarking, have been efficient and important applications for covert communication. For a country or organization, the information hiding technique can be used to transfer confidential messages using steganography technique, protect copyright of a software or digital publication using watermarking technique, and etc. However, the above techniques may also be used by terrorists or illegal guys to endanger national security and destroy social stabilization. Therefore, steganalysis as the inverse technique is also needed for further research. Additionally, multimedia forensic has been widely studied in recent years, and many digital forensic techniques have been proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. Nevertheless, there are some notable shortcomings in research methodologies. Current multimedia forensic studies are commonly based on the strict conditions that are nearly impossible to meet up in real applications. Furthermore, the high computational complexity of the current methods makes it hard to handle the big data in the computer networks. All these drawbacks limit the applications of the forensic and secure techniques in practice. This special issue aims to bring together researchers in the fields of information hiding and digital forensic that can be used for multimedia security, and it will include a number of related topics, demonstrate pioneer works, investigate the novel solutions and discuss the future trends in this field. Possible topics for the manuscripts submitted to this special issue include, but are not limited to: Information hiding based on images, audio, video, VoIP, and etc Adaptive steganography and corresponding steganalysis Steganographic codes Reversible data hiding Security evaluation and benchmark for information hiding Novel applications and emerging trends of information hiding Quantitative and locating steganalysis Pattern classification ways used in steganalysis Secure communication architecture based on information hiding Multimedia watermarking, fingerprinting and identification Multimedia forensics and counter forensics Multimedia authentication and encryption Multimedia network protection, privacy and security Multimedia hashing and biometrics encryption Security of large multimedia system Signal processing in the encrypted domain Secure multimedia system design and protocol security Secure covert communications associated with big data Privacy and security issues in multimedia cloud Important Dates Deadline of manuscript submission: 31 January, 2015 Notification of review results: 31 March, 2015 Deadline of revised manuscript submission: 30 April, 2015 Notification of final decisions: 30 June, 2015 Instructions for Manuscripts All manuscripts should follow author instructions of the journal and be submitted online at the Editorial ManagerTM submission site: https://www.editorialmanager.com/mtap 1. During the submission, please indicate the manuscripts are submitted to the special issue of Information Hiding and Forensic for Multimedia Security by choosing the corresponding article type. 2. The selected best papers from the 12th China Information Hiding and Multimedia Security Workshop (CIHW 2015) should undergone substantial extensions of at least 40% new contents with respect to the version of conference paper before submission. Guest Editors Prof. Dengpan Ye Wuhan University, Wuhan 430072, China E-mail: yedp2001@163.com Dr. Xiangyang Luo Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China Email: xiangyangluo@126.com Dr. Chuan Qin School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China E-mail: qin@usst.edu.cn [ Last edited by yedp on 2014-7-18 at 22:10 ] |
» 猜你喜欢
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有13人回复
AI 太可怕了,写基金时,提出想法,直接生成的文字比自己想得深远,还有科学性
已经有11人回复
表哥与省会女结婚,父母去帮带孩子被省会女气回家生重病了
已经有9人回复
同年申请2项不同项目,第1个项目里不写第2个项目的信息,可以吗
已经有10人回复
依托企业入选了国家启明计划青年人才。有无高校可以引进的。
已经有11人回复
» 抢金币啦!回帖就可以得到:
西湖大学2026年秋季入学物理学、光学、电子信息方向博士生有名额速来!!!
+2/256
西湖大学拓扑光学、非厄米光学、太赫兹方向博士后招聘
+2/252
西湖大学2026年秋季入学物理学、光学、电子信息方向博士生有名额速来!!!
+2/250
-大龄未婚男找女朋友结婚
+1/240
中国石油大学(华东)吴传德教授团队(国家杰青)2026硕、博招生
+2/208
哈工大医康学院材料模拟计算方向人才招聘
+1/78
北京-89175-事业单位-诚征女友
+1/75
山东征女友,坐标济南
+1/69
上海交通大学大气环境科学课题组招收2026年入学博士生
+1/67
感谢小木虫的缘分
+1/38
中国农业大学安杰课题组招聘科研助理(表现优异者可提供读博机会)
+1/31
澳大利亚麦考瑞大学(Macquarie University)国际博士硕士全额奖学金-计算机-26年中开学
+1/16
都放假了嘛?
+1/7
澳门理工大学 2026 Fall 奖学金博士招生 (AI药物与蛋白质设计,干湿结合)
+1/7
【科研助理招聘-北京理工大学-集成电路与电子学院-国家杰青团队】
+1/3
【经验分享】CRISPR基因敲除细胞系构建全流程踩坑指南——从递送方式选择到克隆筛选
+1/2
26储能博士申请自荐
+1/2
斯德哥尔摩 DigitalFuture 博士后奖学金机会!
+1/2
美国密苏里大学“柔性电子”课题组诚招博士研究生
+1/1
北京信息科技大学仪器科学与光电工程学院【周哲海】教授团队招收博士研究生
+1/1
58楼2015-01-02 16:15:49
6楼2014-07-18 21:16:20
简单回复
pzx10042楼
2014-07-18 21:01
yedp(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]
吴大磊5楼
2014-07-18 21:12
yedp(金币+1): 谢谢参与
祝福 [ 发自小木虫客户端 ]
2014-07-18 21:25
yedp(金币+1): 谢谢参与

支持




回复此楼
谢谢楼主!