| |||||||||||||
MSCM 2019 : Multimedia Security using Chaotic Maps: Principles & Methodologies | |||||||||||||
Link: https://easychair.org/conferences/?conf=mscm2019 | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
Call for Book Chapters
Multimedia Security using Chaotic Maps: Principles & Methodologies Introduction Multimedia could be defined as a combination of different data types such as text, audio, image, and video. Every day, huge amount of data is transmitted through the internet and other open networks. Securing the transmitted data and preventing any misuse of it is a big challenge. Various security methodologies such as digital watermarking, data encryption, steganography, and data hiding are developed for securing multimedia data. Digital watermarking used in copyright protection and securing multimedia data during their transmission through networked environment. Technically, digital watermarking aims to hide a small piece of digital data called a “digital watermark” into the actual digital media such as digital images, digital videos and digital audios without significance change of its normal usage. Data encryption or cryptographic methods encrypt the data at the sender side, transmit this data from the sender to receiver and then decrypt it at the receiver side. The primary objective of information hiding is successfully hiding a secrete data in a multimedia data without distorting the quality of the resultant multimedia. In image Steganography, the message image is hidden in a cover image and changes its properties where image Steganography provides a secret communication method which prevents hacker/attacker from detecting the presence of this message. During the last decade, several remarkable methodologies were developed to improve the levels of multimedia security. Recently, Chaotic Maps are promising tool and successfully utilized in digital watermarking, data encryption, steganography, and data hiding techniques. The interest in using different kinds of Chaotic Maps and systems in multimedia security is steadily increase through the last few years where the number of published papers in archival journals and conference’ proceedings are monotonically increased. Although, according to the best knowledge of the author, no previously published book which covers the multimedia security using the Chaotic Maps. This motivates the idea of this call for book chapter under the title “Multimedia Security using Chaotic Maps: Principles & Methodologies”. The book provides the readers a comprehensive overview of principles, methodologies and recent advances in Multimedia security using different Chaotic Maps through a collection of high-quality chapters. These chapters present original and previously unpublished works of famous researches from several countries dealing with different issues of multimedia security using Chaotic Maps. This book is a valuable reference for researchers, engineers, IT specialists, developers, postgraduate students, and senior undergraduate students with majors in data security. Recommended Topics The topics covered by the book will present a collection of high-quality research works written by renowned leaders in the field. The recommended topics include, but are not limited to the following: • Principles of Chaotic Maps • Hybrid Chaotic systems • Emerging Chaotic Maps • Image and Video encryption using Chaotic Maps • Image and Video watermarking using Chaotic Maps • Image and video Steganography using Chaotic Maps • Data hiding using Chaotic Maps • Speech and Audio Cryptography using Chaotic Maps • Multimedia security using Quantum Chaotic Maps • FPGA-Based Implementation for multimedia security using Chaotic Maps • Embedded hardware implementation for Multimedia Security using Chaotic Maps • Applications of Multimedia security in Smart Cities. Important Dates Full Chapter Submission: March 31, 2019 First Decision: May 31, 2019 Submission of the Revised Chapter: June 30, 2019 Final Acceptance Notifications: July 31, 2019 Submission of Final Chapters (Camera Ready): August 31, 2019 Expected Publication Date: First quarter of 2020 Submission Procedure Prospective authors are invited to submit original, high quality, unpublished results electronically using Easy Chair submission system (Link). Submitted manuscripts will be refereed by at least two expert reviewers. The accepted chapters will be published in an edited book by the prestigious Studies in Computational Intelligence Series by Springer. For preparing your chapter(s), please, consider the following points: 1. Chapter’s publication is free of charge. 2. Each book chapter should be 25-30 pages. 3. Each chapter is a complete topic and self-contained. 4. Each chapter should have an abstract of approximately 100-150 words. 5. Each chapter should have a list of 5-10 keywords. 5. Prepare your chapter using the MS-word according to the author’s guidelines. Indexing: The edited book and the published chapters will be indexed in Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink. Book Editor Kahlid M. Hosny, PhD Professor Department of Information Technology, Faculty of Computers and Informatics, Zagazig University, Zagazig 44519, Egypt. Email: k_hosny@yahoo.com ; hosnykm@gmail.com |
|