Security and Communication Networks

Advances in AI-related Information Forensics and Security


Publishing date
01 Mar 2023
Status
Published
Submission deadline
11 Nov 2022

Lead Editor

1Shanghai University, Shanghai, China

2National University of Computer and Emerging Sciences, Islamabad, Pakistan

3Waseda University, Tokyo, Japan

4Nanchang University, Nanchang, China

5Meta Reality Labs, Burlingame, USA


Advances in AI-related Information Forensics and Security

Description

In the past decade, there has been an increase in the application of artificial intelligence (AI) technologies for solving complex problems arising in information forensics and security. Due to the superiority of such AI techniques, these are applied by scientists and researchers in diverse subfields. However, the fast development of AI is also accompanied by new challenges in the field of information forensics and security. AI models can be applied to enhance the performance of conventional active and passive information forensic systems to protect against common types of attacks. However, novel AI models may be developed by adversaries with malicious intent such as AI models for generating forgeries and disinformation. Moreover, extensive research demonstrates that AI models are inherently vulnerable to malicious attacks such as adversarial perturbations, which will cause AI models to easily make incorrect decisions and thus seriously threaten the security and reliability of AI-based data processing systems. Therefore, it is necessary to seek more reliable and robust defensive solutions for AI-related models and information forensic systems.

Therefore, this Special Issue aims to attract the latest developments and trends in AI-related information forensics and security and encourages the submission of high-quality original research and review papers from academia and industry.

Potential topics include but are not limited to the following:

  • Media forensics and anti-forensics
  • Adversarial attack and defense
  • Deepfakes and misinformation detection
  • Steganography and steganalysis
  • Media watermarking and DNN watermarking
  • Reversible data hiding
  • Multimedia content hash
  • Novel data embedding techniques in various covers
  • Interpretability and theoretical analysis of forensic techniques
  • Game theory for security

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 8723991
  • - Research Article

Reversible Data Hiding in Encrypted Image via Joint Encoding of Multiple MSB and Pixel Difference

Ping Kong | Di Fu | ... | Chuan Qin
  • Special Issue
  • - Volume 2023
  • - Article ID 2093407
  • - Research Article

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm

Gauri Shankar | Liwa H. Ai-Farhani | ... | Issah Abubakari Samori
  • Special Issue
  • - Volume 2023
  • - Article ID 3813977
  • - Research Article

Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training

Jianhua Yang | Fei Shang | ... | Yifang Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 7189130
  • - Research Article

Generative Text Secret Sharing with Topic-Controlled Shadows

Long Yu | Yuliang Lu | ... | Jiayu Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 8465543
  • - Research Article

Synthetic Aperture Radar Target Recognition Based on Multimodule Image Enhancement Network

Xuan Wang | Yuliang Lu | ... | Chunqian He
  • Special Issue
  • - Volume 2022
  • - Article ID 9226401
  • - Research Article

Improving Cloud/Snow Detection in Remote Sensing Image with Spatiotemporal Information Fusion

Jianfeng Wen | Hao Zhang | ... | Gang Xu
  • Special Issue
  • - Volume 2022
  • - Article ID 1090307
  • - Research Article

Image Forgery Detection Using Tamper-Guided Dual Self-Attention Network with Multiresolution Hybrid Feature

Fengyong Li | Zhenjia Pei | ... | Chuan Qin
  • Special Issue
  • - Volume 2022
  • - Article ID 6200121
  • - Research Article

Cyber Security of Smart Metering Infrastructure Using Median Absolute Deviation Methodology

Priti Prabhakar | Sujata Arora | ... | Franklin Ore Areche
  • Special Issue
  • - Volume 2022
  • - Article ID 9496748
  • - Research Article

GRACED: A Novel Fragile Watermarking for Speech Based on Endpoint Detection

Shuyun Zhou | Meixin Song | ... | Xiaofeng Gong
  • Special Issue
  • - Volume 2022
  • - Article ID 9278715
  • - Research Article

FD2Foremer: Thinking Face Forgery Detection in Midfrequency Geometry Details

Wentao Li | Zhidong Shen
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.