Advances in AI-related Information Forensics and Security
1Shanghai University, Shanghai, China
2National University of Computer and Emerging Sciences, Islamabad, Pakistan
3Waseda University, Tokyo, Japan
4Nanchang University, Nanchang, China
5Meta Reality Labs, Burlingame, USA
Advances in AI-related Information Forensics and Security
Description
In the past decade, there has been an increase in the application of artificial intelligence (AI) technologies for solving complex problems arising in information forensics and security. Due to the superiority of such AI techniques, these are applied by scientists and researchers in diverse subfields. However, the fast development of AI is also accompanied by new challenges in the field of information forensics and security. AI models can be applied to enhance the performance of conventional active and passive information forensic systems to protect against common types of attacks. However, novel AI models may be developed by adversaries with malicious intent such as AI models for generating forgeries and disinformation. Moreover, extensive research demonstrates that AI models are inherently vulnerable to malicious attacks such as adversarial perturbations, which will cause AI models to easily make incorrect decisions and thus seriously threaten the security and reliability of AI-based data processing systems. Therefore, it is necessary to seek more reliable and robust defensive solutions for AI-related models and information forensic systems.
Therefore, this Special Issue aims to attract the latest developments and trends in AI-related information forensics and security and encourages the submission of high-quality original research and review papers from academia and industry.
Potential topics include but are not limited to the following:
- Media forensics and anti-forensics
- Adversarial attack and defense
- Deepfakes and misinformation detection
- Steganography and steganalysis
- Media watermarking and DNN watermarking
- Reversible data hiding
- Multimedia content hash
- Novel data embedding techniques in various covers
- Interpretability and theoretical analysis of forensic techniques
- Game theory for security