posted by user: graceup || 5126 views || tracked by 3 users: [display]

DHMS 2009 : Special Issue on Data Hiding for Multimedia Security Springer Verlag (ISI Indexed Journal)

FacebookTwitterLinkedInGoogle

Link: http://www.springer.com/cda/content/document/cda_downloaddocument/CFP_11042_20090317.pdf?SGWID=0-0-45-706798-p35538244
 
When N/A
Where N/A
Submission Deadline Aug 15, 2009
Notification Due Nov 15, 2009
Final Version Due Dec 31, 2009
Categories    data hiding, security   watermarking   steganography   digital rights management
 

Call For Papers

The digital information revolution has brought profound changes in our daily lives and the
advantages of digital information have also generated new challenges and opportunities for their protection. Due to the tremendous advances in signal processing and ransmission techniques, it is easy to acquire, tamper and duplicate multimedia data. For the last two decades, digital data hiding has received a great deal of attention from the scientific community to overcome the aforementioned problems. Remarkable research efforts have been invested in recent years, trying to export novel and applied real world engineering applications.

This special issue intents to bring together diversity of international researchers, experts and practitioners who are currently working in the area of digital data hiding systems. It is envisaged that this special issue will explore the advances of methods, techniques, and tools in solving the unsolved questions in digital data hiding. Prominent researchers both from academia and industry are invited to contribute their work for extending the existing knowledge in the field.

Research areas of relevance to this special issue would therefore include, but not only limited to:

• Digital watermarking
• Steganology (steganography and steganalysis)
• Information theoretic analysis of data hiding systems
• Data hiding in law enforcement, medicine, military, E-commerce, and M-commerce
• Fingerprinting in multimedia signals
• Data hiding for forensic applications
• Integrity verification and authentication
• Digital content protection
• Tampering and attacks on original information
• Data hiding system design and implementation
• Digital rights management
• Content identification and secure content delivery

Please contact Guest Editor:

Dr. Muhammad Khurram Khan
Center of Excellence in Information Assurance,
King Saud University,
Kingdom of Saudi Arabia
mkhurram@ksu.edu.sa

Related Resources

SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ICITS 2025   2025 The 13th International Conference on Information Technology and Science (ICITS 2025)
ICDPA 2025   2025 The 11th International Conference on Data Processing and Applications (ICDPA 2025)
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
Springer CCCN 2025   Springer--2025 The 3rd International Conference on Cloud Computing and Computer Network (CCCN 2025)
ICMSSP--EI 2025   2025 10th International Conference on Multimedia Systems and Signal Processing (ICMSSP 2025)
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)
IELR 2025   Springer--2025 2nd International Conference on Innovative Education and Learning Resources (IELR 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICoSR 2025   2025 4th International Conference on Service Robotics