| |||||||||||||||
ISeCure-IH 2012 : The ISeCure Special Issue on Information Hiding | |||||||||||||||
Link: http://www.isecure-journal.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
***********************************************************
Call for Papers *********************************************************** The ISC International Journal of Information Security Special Issue on Information Hiding (Extended submission deadline: December 15, 2011) http://www.isecure-journal.org/ *********************************************************** Scope and Aim ============== Information hiding techniques are receiving much attention today. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Digital watermarking and steganography protect information, conceal secrets or are used as core primitives in digital rights management schemes. Steganalysis and forensics pose important challenges to investigators; and privacy techniques try to hide information such as the actors' identities in anonymous communication systems. ISeCure, The ISC International Journal of Information Security, in its third year of publication is pleased to announce a special issue on Information Hiding. This special issue aims to provide an international forum for researchers and disseminate the latest cutting-edge research results in the area of information hiding. Topics ======= The issue accepts manuscripts in various aspects of information hiding including but not limited to: - Applications of information hiding - Combination of data hiding and cryptography - Covert/subliminal channels analysis/modelling - Data hiding based on cryptography concepts - Digital rights management - Emerging trends in information hiding - Fingerprinting and embedding codes - Fractal based information hiding - Large-scale experimental tests and benchmarking - Lossless/reversible data hiding - Multimedia and document security - Multimedia forensics and counter forensics - Security metrics for information hiding - Side-information transmission through data hiding - Signal processing techniques for information hiding - Signal restoration/enhancement by data hiding - Software tools for information hiding - Steganography and steganalysis - Theoretical aspects of information hiding - Watermarking (algorithms, security, and attacks) Submission =========== Scholars and researchers in any of the aforementioned topics are invited to submit their original papers. Claims about information hiding technology, such as robustness or steganographic security, must be backed by strong evidence in the paper (such as mathematical proofs, statistical modeling or extensive testing). All submissions will undergo a rigorous peer review, coordinated by one of the Guest Editors. Accepted papers will be published online and accessed freely on the journal website: http://www.isecure-journal.org/ The instructions for preparing and submitting papers are available at: http://isecure-journal.org/Form/GeneralInformation.aspx?CT=Guide#author-guide Important Dates ================ Paper submission deadline: December 15, 2011 (extended) Acceptance notification: February 29, 2012 Submission of revised final papers: April 30, 2012 Early online publication: March 15 - July 1, 2012 Publication date: July 1, 2012 Guest Editors ============== Prof. Shahrokh Ghaemmaghami, Sharif University of Technology, Tehran, Iran Prof. Mohammad Ali Akhaee, University of Tehran, Tehran, Iran More Information ================= This call for papers and additional information about the special issue can be found at: http://www.isecure-journal.org/ |
|