posted by user: sadeghd || 5818 views || tracked by 8 users: [display]

ISeCure-IH 2012 : The ISeCure Special Issue on Information Hiding

FacebookTwitterLinkedInGoogle

Link: http://www.isecure-journal.org/
 
When N/A
Where N/A
Submission Deadline Dec 15, 2011
Notification Due Feb 29, 2012
Final Version Due Apr 30, 2012
Categories    steganography   information hiding   security   watermarking
 

Call For Papers

***********************************************************
Call for Papers
***********************************************************

The ISC International Journal of Information Security
Special Issue on Information Hiding

(Extended submission deadline: December 15, 2011)
http://www.isecure-journal.org/

***********************************************************

Scope and Aim
==============
Information hiding techniques are receiving much attention today. Digital
audio, video, and pictures are increasingly furnished with distinguishing
but imperceptible marks, which may contain a hidden copyright notice or
serial number or even help to prevent unauthorised copying directly.
Digital watermarking and steganography protect information, conceal
secrets or are used as core primitives in digital rights management
schemes. Steganalysis and forensics pose important challenges to
investigators; and privacy techniques try to hide information such as the
actors' identities in anonymous communication systems.

ISeCure, The ISC International Journal of Information Security, in its
third year of publication is pleased to announce a special issue on
Information Hiding. This special issue aims to provide an international
forum for researchers and disseminate the latest cutting-edge research
results in the area of information hiding.

Topics
=======
The issue accepts manuscripts in various aspects of information hiding
including but not limited to:

- Applications of information hiding
- Combination of data hiding and cryptography
- Covert/subliminal channels analysis/modelling
- Data hiding based on cryptography concepts
- Digital rights management
- Emerging trends in information hiding
- Fingerprinting and embedding codes
- Fractal based information hiding
- Large-scale experimental tests and benchmarking
- Lossless/reversible data hiding
- Multimedia and document security
- Multimedia forensics and counter forensics
- Security metrics for information hiding
- Side-information transmission through data hiding
- Signal processing techniques for information hiding
- Signal restoration/enhancement by data hiding
- Software tools for information hiding
- Steganography and steganalysis
- Theoretical aspects of information hiding
- Watermarking (algorithms, security, and attacks)

Submission
===========
Scholars and researchers in any of the aforementioned topics are invited
to submit their original papers. Claims about information hiding
technology, such as robustness or steganographic security, must be backed
by strong evidence in the paper (such as mathematical proofs, statistical
modeling or extensive testing). All submissions will undergo a rigorous
peer review, coordinated by one of the Guest Editors. Accepted papers will
be published online and accessed freely on the journal website:
http://www.isecure-journal.org/

The instructions for preparing and submitting papers are available at:
http://isecure-journal.org/Form/GeneralInformation.aspx?CT=Guide#author-guide

Important Dates
================
Paper submission deadline: December 15, 2011 (extended)
Acceptance notification: February 29, 2012
Submission of revised final papers: April 30, 2012
Early online publication: March 15 - July 1, 2012
Publication date: July 1, 2012

Guest Editors
==============
Prof. Shahrokh Ghaemmaghami, Sharif University of Technology, Tehran, Iran
Prof. Mohammad Ali Akhaee, University of Tehran, Tehran, Iran

More Information
=================
This call for papers and additional information about the special issue
can be found at: http://www.isecure-journal.org/

Related Resources

FCSIT 2020   2020 2nd European Conference on Frontiers of Computer Science and Information Technology (FCSIT 2020)
SP 2020   IEEE Symposium on Security and Privacy
CISDM 2020   2020 2nd European Conference on Information System and Data Mining (CISDM 2020)
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
IEEE--ICICN--Ei Compendex, Scopus 2020   IEEE--2020 The 8th International Conference on Information, Communication and Networks (ICICN 2020)--Ei Compendex, Scopus
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications
EI-CISDM 2020   2020 2nd European Conference on Information System and Data Mining (CISDM 2020)
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
WTDSI-SBSI 2019   Workshop de Teses e Dissertações em Sistemas de Informação
IHIP--ACM, SCOPUS, Ei 2019   ACM--2019 2nd International Conference on Information Hiding and Image Processing (IHIP 2019)--SCOPUS, Ei Compendex