Security and Communication Networks

Advanced Data Security and Its Applications in Multimedia for Secure Communication


Publishing date
01 Oct 2019
Status
Closed
Submission deadline
24 May 2019

Lead Editor

1Kyungil University, Gyeongsan, Republic of Korea

2National University of Science and Technology, Islamabad, Pakistan

3Vellore Institute of Technology, Vellore, India

4Tra Vinh University, Tra Vinh, Vietnam

This issue is now closed for submissions.

Advanced Data Security and Its Applications in Multimedia for Secure Communication

This issue is now closed for submissions.

Description

Data security and applications have been expanded rapidly with many important challenges arising over the topic of communication networks. Recently, multimedia information (text, image, and video) usage has been increasing due to reduced cost techniques for transmitting this information over the world via different unsecured networks. However, prevention of copyright violation and ownership identification have been challenging issues due to attempts of malicious attacks/hacking of information over communication networks. The motive of these attacks can be to modify or delete the document watermark to illegally claim ownership or to prevent the information transfer to the intended recipients. Therefore, addressing these challenges has been an interesting problem for secure communication over open networks.

This special issue focuses on secure multimedia data transmission over communication networks, specifically data hiding in multimedia and its application to all research fields over communication networks.

Potential topics include but are not limited to the following:

  • Data hiding and reversible data hiding techniques
  • Multimedia security related to watermarking and steganography
  • Security evaluation for information hiding
  • Multimedia data encryption and authentication over open networks
  • Data hiding detection techniques for secure networks
  • Security and privacy issues in data hiding system for secure communication
  • Forensics based data hiding system over communication networks
  • Secret image sharing system for secure communication
  • Protecting systems against theft over communication networks

Articles

  • Special Issue
  • - Volume 2020
  • - Article ID 4836109
  • - Research Article

Protecting Metadata of Access Indicator and Region of Interests for Image Files

JeongYeon Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 3031506
  • - Research Article

An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy

Lin Li | Chin-Chen Chang | Hefeng Chen
  • Special Issue
  • - Volume 2019
  • - Article ID 2182615
  • - Research Article

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic

Weina Niu | Ting Li | ... | Heng Wu
  • Special Issue
  • - Volume 2019
  • - Article ID 7924690
  • - Research Article

VPN Traffic Detection in SSL-Protected Channel

Muhammad Zain ul Abideen | Shahzad Saleem | Madiha Ejaz
  • Special Issue
  • - Volume 2019
  • - Article ID 6989383
  • - Research Article

Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation

En Zhang | Jun-Zhe Zhu | ... | Yu Li
  • Special Issue
  • - Volume 2019
  • - Article ID 4932782
  • - Research Article

Generative Reversible Data Hiding by Image-to-Image Translation via GANs

Zhuo Zhang | Guangyuan Fu | ... | Jia Liu
  • Special Issue
  • - Volume 2019
  • - Article ID 5134534
  • - Research Article

Linear Secret Sharing Scheme with Reduced Number of Polynomials

Kenan Kingsley Phiri | Hyunsung Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 6956072
  • - Research Article

Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant

Zhuoqun Xia | Zhenwei Fang | ... | Arun Kumar Sangaiah
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.