You are currently viewing a new version of our website. To view the old version click .

Trends and Prospects in Security, Encryption and Encoding

Topic Information

Dear Colleagues,

Multimedia data can be defined as a combination of different data types such as text, audio, images, and video. Every day, a huge quantity of data is transmitted through the internet and other open networks. Securing the transmitted data and preventing any misuse of it is a big challenge. Various security methodologies, such as digital watermarking, data encryption, steganography, data hiding, and blockchain, have been developed for securing multimedia data.

Digital watermarking is used in copyright protection and in securing multimedia data through a networked environment. Data encryption or cryptographic methods encrypt the data at the sender side, transmit this data from the sender to the receiver, and then decrypt it at the receiver side. In image steganography, the message image is hidden in a cover image and changes its properties, providing a secret communication method which prevents hackers/attackers from detecting the message’s presence.

During the last decade, several remarkable methodologies have been developed to improve the levels of multimedia security. Blockchain is an emerging technique to keep the data within an open decentralized network.

Eligible papers will cover theoretical and applied issues including, but not limited to, the following:

  • Principles of data security and emerging hybrid techniques.
  • Image and video encryption, watermarking, steganography, and data hiding.
  • Speech and audio encryption, watermarking, steganography, and data hiding.
  • Multimedia security using blockchain.
  • FPGA-based implementation for multimedia security.
  • Embedded hardware for multimedia security.
  • Applications of multimedia security in smart cities.
  • Deep learning techniques for modelling threats and vulnerabilities in software.
  • Automatic modelling of software and hardware attacks and defences using artificial intelligence algorithms.
  • Adversarial machine learning techniques applied to DevSecOps.
  • Automatic prediction of security flaws in software and hardware using deep learning algorithms.
  • Artificial intelligence for automatic error correction.
  • Artificial intelligence techniques for algorithmic verification.
  • Deep learning techniques for the generation and mutation of abnormal application traffic patterns.
  • Deep learning techniques for symbolic model checking.
  • Use of artificial intelligence techniques for vulnerability prediction.
  • Development of AI techniques to measure software resilience.
  • Deep learning techniques for the detection of programming errors in binary and modern programming languages.
  • Automatic abstraction techniques applicable to programming code.
  • Techniques to increase privacy when sharing information.

Prof. Dr. Ki-Hyun Jung
Prof. Dr. Luis Javier García Villalba
Topic Editors

Keywords

  • watermarking
  • steganography
  • data encryption
  • data decryption
  • data hiding
  • blockchain
Graphical abstract

Participating Journals

Applied Sciences
Open Access
81,991 Articles
Launched in 2011
2.5Impact Factor
5.5CiteScore
20 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Cryptography
Open Access
427 Articles
Launched in 2017
2.1Impact Factor
5.0CiteScore
23 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Journal of Cybersecurity and Privacy
Open Access
270 Articles
Launched in 2021
-Impact Factor
9.1CiteScore
24 DaysMedian Time to First Decision
-Highest JCR Category Ranking
Journal of Sensor and Actuator Networks
Open Access
737 Articles
Launched in 2012
4.2Impact Factor
9.4CiteScore
22 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Sci
Open Access
440 Articles
Launched in 2019
-Impact Factor
5.2CiteScore
37 DaysMedian Time to First Decision
-Highest JCR Category Ranking
Symmetry
Open Access
16,229 Articles
Launched in 2009
2.2Impact Factor
5.3CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking

Published Papers