posted by user: kmhosny || 1689 views || tracked by 1 users: [display]

MSCM 2019 : Multimedia Security using Chaotic Maps: Principles & Methodologies

FacebookTwitterLinkedInGoogle

Link: https://easychair.org/conferences/?conf=mscm2019
 
When Feb 1, 2019 - Nov 1, 2019
Where N/A
Submission Deadline Jul 31, 2019
Notification Due Aug 31, 2019
Final Version Due Oct 1, 2019
 

Call For Papers

Call for Book Chapters

Multimedia Security using Chaotic Maps: Principles & Methodologies

Introduction

Multimedia could be defined as a combination of different data types such as text, audio, image, and video. Every day, huge amount of data is transmitted through the internet and other open networks. Securing the transmitted data and preventing any misuse of it is a big challenge. Various security methodologies such as digital watermarking, data encryption, steganography, and data hiding are developed for securing multimedia data.
Digital watermarking used in copyright protection and securing multimedia data during their transmission through networked environment. Technically, digital watermarking aims to hide a small piece of digital data called a “digital watermark” into the actual digital media such as digital images, digital videos and digital audios without significance change of its normal usage. Data encryption or cryptographic methods encrypt the data at the sender side, transmit this data from the sender to receiver and then decrypt it at the receiver side. The primary objective of information hiding is successfully hiding a secrete data in a multimedia data without distorting the quality of the resultant multimedia. In image Steganography, the message image is hidden in a cover image and changes its properties where image Steganography provides a secret communication method which prevents hacker/attacker from detecting the presence of this message.
During the last decade, several remarkable methodologies were developed to improve the levels of multimedia security. Recently, Chaotic Maps are promising tool and successfully utilized in digital watermarking, data encryption, steganography, and data hiding techniques. The interest in using different kinds of Chaotic Maps and systems in multimedia security is steadily increase through the last few years where the number of published papers in archival journals and conference’ proceedings are monotonically increased. Although, according to the best knowledge of the author, no previously published book which covers the multimedia security using the Chaotic Maps. This motivates the idea of this call for book chapter under the title “Multimedia Security using Chaotic Maps: Principles & Methodologies”.
The book provides the readers a comprehensive overview of principles, methodologies and recent advances in Multimedia security using different Chaotic Maps through a collection of high-quality chapters. These chapters present original and previously unpublished works of famous researches from several countries dealing with different issues of multimedia security using Chaotic Maps.
This book is a valuable reference for researchers, engineers, IT specialists, developers, postgraduate students, and senior undergraduate students with majors in data security.


Recommended Topics
The topics covered by the book will present a collection of high-quality research works written by renowned leaders in the field. The recommended topics include, but are not limited to the following:

• Principles of Chaotic Maps
• Hybrid Chaotic systems
• Emerging Chaotic Maps
• Image and Video encryption using Chaotic Maps
• Image and Video watermarking using Chaotic Maps
• Image and video Steganography using Chaotic Maps
• Data hiding using Chaotic Maps
• Speech and Audio Cryptography using Chaotic Maps
• Multimedia security using Quantum Chaotic Maps
• FPGA-Based Implementation for multimedia security using Chaotic Maps
• Embedded hardware implementation for Multimedia Security using Chaotic Maps
• Applications of Multimedia security in Smart Cities.

Important Dates
Full Chapter Submission: March 31, 2019
First Decision: May 31, 2019
Submission of the Revised Chapter: June 30, 2019
Final Acceptance Notifications: July 31, 2019
Submission of Final Chapters (Camera Ready): August 31, 2019
Expected Publication Date: First quarter of 2020

Submission Procedure
Prospective authors are invited to submit original, high quality, unpublished results electronically using Easy Chair submission system (Link). Submitted manuscripts will be refereed by at least two expert reviewers. The accepted chapters will be published in an edited book by the prestigious Studies in Computational Intelligence Series by Springer. For preparing your chapter(s), please, consider the following points:

1. Chapter’s publication is free of charge.
2. Each book chapter should be 25-30 pages.
3. Each chapter is a complete topic and self-contained.
4. Each chapter should have an abstract of approximately 100-150 words.
5. Each chapter should have a list of 5-10 keywords.
5. Prepare your chapter using the MS-word according to the author’s guidelines.

Indexing: The edited book and the published chapters will be indexed in Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink.

Book Editor
Kahlid M. Hosny, PhD
Professor
Department of Information Technology,
Faculty of Computers and Informatics,
Zagazig University, Zagazig 44519, Egypt.
Email: k_hosny@yahoo.com ; hosnykm@gmail.com

Related Resources

ICSPCS 2024   17th International Conference on Signal Processing and Communication Systems
ECML-PKDD 2024   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
KR 2024   Principles of Knowledge Representation and Reasoning
CP 2024   Principles and Practice of Constraint Programming
SMC 2024   8th International Conference on Soft Computing, Mathematics and Control
ACM SIGSIM PADS 2024   38th ACM SIGSIM Conference on Principles of Advanced Discrete Simulation
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
GIFCon 2024   GIFCon 2024: Conjuring Creatures and Worlds