Special Issue "Research and Application of Information Hiding and Cryptography"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 13 January 2023 | Viewed by 4655

Special Issue Editors

Prof. Dr. Ji- Hwei Horng
E-Mail Website
Guest Editor
Department of Electronic Engineering, National Quemoy University, Kinmen, Taiwan
Interests: image processing; video analysis; artificial intelligence; information security
Prof. Dr. Chia-Chen Lin
E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology Taiwan, Taichung, Taiwan
Interests: watermarking; cryptography; security; electronic commerce
Special Issues, Collections and Topics in MDPI journals
Dr. Ching-Chun Chang
E-Mail Website
Guest Editor
Department of Computer Science, University of Warwick, Coventry, UK
Interests: steganography; watermarking; secret sharing; computer vision; machine learning

Special Issue Information

Dear Colleagues,

Cybersecurity is a crucial issue in the future Internet due to the urgent demand for confidential or private digital data transmission. Information hiding and cryptography are the major means to implement secure communication via the Internet. Recent research works on information hiding include watermarking and steganography for various kinds of digital media, such as images, video, software, etc. The applied techniques include arithmetic encoding, transformation-based coding, deep learning networks, etc. Other novel approaches are emerging as well, with cryptography, symmetric-key cryptography, public-key cryptography, and lightweight cryptography representing some of the most attractive research topics. Additionally, steganalysis and cryptanalysis to detect information hiding and cryptography are important future technologies, and impressive studies have been proposed in recent years.

This Special Issue focuses on original research and novel technical solutions with relevance to information hiding and cryptography. The results of interdisciplinary research with tools from various knowledge domains are particularly welcome. Technical solutions for the implementation of modern information hiding and cryptographic schemes in software or hardware are also strongly encouraged.

Finally, we would like to thank Professor Chin-Chen Chang and his valuable help for this Special Issue.

Prof. Dr. Ji- Hwei Horng
Prof. Dr. Chia-Chen Lin
Dr. Ching-Chun Chang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information hiding
  • data hiding
  • steganography
  • watermarking
  • cryptography
  • steganalysis
  • cryptanalysis
  • deep learning

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Data Anonymization: An Experimental Evaluation Using Open-Source Tools
Future Internet 2022, 14(6), 167; https://doi.org/10.3390/fi14060167 - 30 May 2022
Cited by 1 | Viewed by 1339
Abstract
In recent years, the use of personal data in marketing, scientific and medical investigation, and forecasting future trends has really increased. This information is used by the government, companies, and individuals, and should not contain any sensitive information that allows the identification of [...] Read more.
In recent years, the use of personal data in marketing, scientific and medical investigation, and forecasting future trends has really increased. This information is used by the government, companies, and individuals, and should not contain any sensitive information that allows the identification of an individual. Therefore, data anonymization is essential nowadays. Data anonymization changes the original data to make it difficult to identify an individual. ARX Data Anonymization and Amnesia are two popular open-source tools that simplify this process. In this paper, we evaluate these tools in two ways: with the OSSpal methodology, and using a public dataset with the most recent tweets about the Pfizer and BioNTech vaccine. The assessment with the OSSpal methodology determines that ARX Data Anonymization has better results than Amnesia. In the experimental evaluation using the public dataset, it is possible to verify that Amnesia has some errors and limitations, but the anonymization process is simpler. Using ARX Data Anonymization, it is possible to upload big datasets and the tool does not show any error in the anonymization process. We concluded that ARX Data Anonymization is the one recommended to use in data anonymization. Full article
(This article belongs to the Special Issue Research and Application of Information Hiding and Cryptography)
Show Figures

Figure 1

Article
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
Future Internet 2022, 14(1), 24; https://doi.org/10.3390/fi14010024 - 08 Jan 2022
Viewed by 1214
Abstract
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which [...] Read more.
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on these addresses. This paper proposes CacheHawkeye, which uses the frequent memory access characteristic of the attacker to detect attacks. CacheHawkeye monitors memory events by CPU hardware performance counters. We proved the effectiveness of CacheHawkeye on Flush+Reload and Flush+Flush attacks. In addition, we evaluated the accuracy of CacheHawkeye under different system loads. Experiments demonstrate that CacheHawkeye not only has good accuracy but can also adapt to various system loads. Full article
(This article belongs to the Special Issue Research and Application of Information Hiding and Cryptography)
Show Figures

Figure 1

Article
Two-Layer Reversible Data Hiding for VQ-Compressed Images Based on De-Clustering and Indicator-Free Search-Order Coding
Future Internet 2021, 13(8), 215; https://doi.org/10.3390/fi13080215 - 20 Aug 2021
Viewed by 1101
Abstract
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression methods are widely applied. Hiding secret data in [...] Read more.
During transmission of digital images, secret messages can be embedded using data hiding techniques. Such techniques can transfer private secrets without drawing the attention of eavesdroppers. To reduce the amount of transmitted data, image compression methods are widely applied. Hiding secret data in compressed images is a hot issue recently. In this paper, we apply the de-clustering concept and the indicator-free search-order coding (IFSOC) technique to hide information into vector quantization (VQ) compressed images. Experimental results show that the proposed two-layer reversible data hiding scheme for IFSOC-encoded VQ index table can hide a large amount of secret data among state-of-the-art methods with a relatively lower bit rate and high security. Full article
(This article belongs to the Special Issue Research and Application of Information Hiding and Cryptography)
Show Figures

Figure 1

Back to TopTop