Trends and Prospects in Security, Encryption and Encoding
Multimedia data can be defined as a combination of different data types such as text, audio, images, and video. Every day, a huge quantity of data is transmitted through the internet and other open networks. Securing the transmitted data and preventing any misuse of it is a big challenge. Various security methodologies, such as digital watermarking, data encryption, steganography, data hiding, and blockchain, have been developed for securing multimedia data.
Digital watermarking is used in copyright protection and in securing multimedia data through a networked environment. Data encryption or cryptographic methods encrypt the data at the sender side, transmit this data from the sender to the receiver, and then decrypt it at the receiver side. In image steganography, the message image is hidden in a cover image and changes its properties, providing a secret communication method which prevents hackers/attackers from detecting the message’s presence.
During the last decade, several remarkable methodologies have been developed to improve the levels of multimedia security. Blockchain is an emerging technique to keep the data within an open decentralized network.
Eligible papers will cover theoretical and applied issues including, but not limited to, the following:
- Principles of data security and emerging hybrid techniques.
- Image and video encryption, watermarking, steganography, and data hiding.
- Speech and audio encryption, watermarking, steganography, and data hiding.
- Multimedia security using blockchain.
- FPGA-based implementation for multimedia security.
- Embedded hardware for multimedia security.
- Applications of multimedia security in smart cities.
- Deep learning techniques for modelling threats and vulnerabilities in software.
- Automatic modelling of software and hardware attacks and defences using artificial intelligence algorithms.
- Adversarial machine learning techniques applied to DevSecOps.
- Automatic prediction of security flaws in software and hardware using deep learning algorithms.
- Artificial intelligence for automatic error correction.
- Artificial intelligence techniques for algorithmic verification.
- Deep learning techniques for the generation and mutation of abnormal application traffic patterns.
- Deep learning techniques for symbolic model checking.
- Use of artificial intelligence techniques for vulnerability prediction.
- Development of AI techniques to measure software resilience.
- Deep learning techniques for the detection of programming errors in binary and modern programming languages.
- Automatic abstraction techniques applicable to programming code.
- Techniques to increase privacy when sharing information.
Prof. Dr. Ki-Hyun Jung
Prof. Dr. Luis Javier García Villalba
- data encryption
- data decryption
- data hiding
|Journal Name||Impact Factor||CiteScore||Launched Year||First Decision (median)||APC|
|2.7||4.5||2011||15.8 Days||CHF 2300||Submit|
|1.6||3.6||2017||24.8 Days||CHF 1600||Submit|
Journal of Cybersecurity and Privacyjcp
|-||-||2021||20 Days||CHF 1000||Submit|
Journal of Sensor and Actuator Networksjsan
|3.5||7.6||2012||13.8 Days||CHF 1600||Submit|
|-||3.1||2019||38.1 Days||CHF 1200||Submit|
|2.7||4.9||2009||14.7 Days||CHF 2400||Submit|
Preprints is a platform dedicated to making early versions of research outputs permanently available and citable. MDPI journals allow posting on preprint servers such as Preprints.org prior to publication. For more details about reprints, please visit https://www.preprints.org.