posted by organizer: mohamedeltaweel || 678 views || tracked by 4 users: [display]

FoSec 2016 : Call for Book Chapters in Innovation in Multimedia Forensics and Security: Theory and Practice


When Jan 15, 2016 - Mar 1, 2016
Where Egypt
Submission Deadline TBD
Categories    crime investigation   digital forensics   cloud security   cryptology

Call For Papers

Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. However, digital forensics compared with traditional forensic science poses major challenges. Information on a computer system can be altered or hidden without a trace. Moreover the variety formats and the exponential growth data added another challenge that related to the need to analyse and take decisions in vast times. The objective of
this edited book is to provide the researchers of computer science and information technology the recent advances in the fields of digital forensics, which are required to achieve necessary knowledge about that field of computer science. In order to achieve these objectives, the book chapters will emphasize on theoretical advances and its applications to real life problems.

Description and Scope of the Book

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early '80s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged. Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil (as part of the electronic discovery process) courts.

Forensics may also feature in the private sector; such as during internal corporate
investigations or intrusion investigation (a specialist probes into the nature and extent of an unauthorized network intrusion). The ultimate objectives of this volume are to provide challenges and opportunities to the research communities with an updated, in-depth material on the Multimedia Forensics and Security: Foundations, Innovations, and Applications in order to finding solutions to the challenges and problems facing forensics and information security applications. We invite all
researchers and practitioners who are developing algorithms, systems, and applications, to share their results, ideas, and experiences. Besides the main topic covering all related multimedia Forensics and security problems in the area of information security are also welcomed. Topics include, but are not limited to:

 Technology Crime Investigation: Mobile forensics
 Forensics Multimedia analysis
 An examination of digital forensic models
 Basic Digital Forensic Investigation Concepts
 Computer and intrusion forensics
 Forensic analysis in the digital world
 Legal Aspects of Digital Forensics
 Watermarking technology
 Cloud security
 Cryptology
 Multimedia authentication
 Digital Fingerprinting for Multimedia Security and Forensics
 Detection of forgeries
 Digital evidences

Submission Deadlines

Submitted manuscripts should conform to the standard guidelines of the Springer's book chapter format. Manuscripts must be prepared using Latex, or Words , and according to the Springer's svmlt template that can be downloaded from the (link) Manuscripts that do not follow the formatting rules will be ignored. Prospective authors should submit their manuscripts electronically through the email to Dr. Mohamed Mostafa via email Submitted manuscripts will be refereed by at least two independent and expert reviewers for quality, correctness, originality, and relevance.

FULL CHAPTER SUBMISSION: Chapters have to be no more than 25 pages length and will be reviewed by two expert reviewers to ensure the quality of the volume. The deadline of submission is January 15, 2016.

NOTIFICATION: Authors of submitted chapters will be notified by 15th February 2016,
about their acceptance. Camera-ready version of accepted chapters is expected to be
submitted by March 1st , 2016.

Volume Editors

Mohamed Mostafa Fouad
Arab Academy for Science, Technology, and Maritime Transport.
Scientific Research Group in Egypt (SRGE)

Azizah Abdul Manaf,
Advanced Informatics School, Universiti Teknologi Malaysia,
Jalan Semarak, 54100 Kuala Lumpur, Malaysia

Abou Ella Hassanien
Scientific Research Group in Egypt (SRGE)
Faculty of Computers & Information
Cairo University, Egypt
Mazdak Zamani

Advanced Informatics School, Universiti Teknologi Malaysia,
Jalan Semarak, 54100 Kuala Lumpur, Malaysia
Rabiah Ahmad
Universiti Teknikal Melaka (UTem), Malaysia
Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences, Poland

Related Resources

SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
AKM 2017   Call for Book Chapters: Analytics and Knowledge Management (Taylor & Francis Group)
MobiSec 2017   IEEE INFOCOM - The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Systems and Networks
CLOUDFORSE 2017   Call for Papers for Thematic Series on 'Cloud Forensics and Security' (Journal of Cloud Computing)
Call for book chapters ASCMLIP 2017   Advances in Soft Computing and Machine Learning in Image Processing (Springer)
DFRWS USA 2017   2017 Digital Forensics Research Workshop
Networks of the Future 2017   Call for book chapters- Networks of the Future (Internet of Things, Cloud Computing, SDN, Big Data, 5G) CRC Press (extended)
CTI 2017   Cyber Threat Intelligence - Springer Book Chapter
Computational Intelligence in RDF 2017   Call for Book Chapters: Computational Intelligence in RDF Data Management (being published by Springer-Verlag)
IoT-SECFOR 2017   International Workshop on Security and Forensics of IoT