posted by user: kmhosny || 1869 views || tracked by 1 users: [display]

MSCM 2019 : Multimedia Security using Chaotic Maps: Principles & Methodologies

FacebookTwitterLinkedInGoogle

Link: https://easychair.org/conferences/?conf=mscm2019
 
When Feb 1, 2019 - Nov 1, 2019
Where N/A
Submission Deadline Jul 31, 2019
Notification Due Aug 31, 2019
Final Version Due Oct 1, 2019
 

Call For Papers

Call for Book Chapters

Multimedia Security using Chaotic Maps: Principles & Methodologies

Introduction

Multimedia could be defined as a combination of different data types such as text, audio, image, and video. Every day, huge amount of data is transmitted through the internet and other open networks. Securing the transmitted data and preventing any misuse of it is a big challenge. Various security methodologies such as digital watermarking, data encryption, steganography, and data hiding are developed for securing multimedia data.
Digital watermarking used in copyright protection and securing multimedia data during their transmission through networked environment. Technically, digital watermarking aims to hide a small piece of digital data called a “digital watermark” into the actual digital media such as digital images, digital videos and digital audios without significance change of its normal usage. Data encryption or cryptographic methods encrypt the data at the sender side, transmit this data from the sender to receiver and then decrypt it at the receiver side. The primary objective of information hiding is successfully hiding a secrete data in a multimedia data without distorting the quality of the resultant multimedia. In image Steganography, the message image is hidden in a cover image and changes its properties where image Steganography provides a secret communication method which prevents hacker/attacker from detecting the presence of this message.
During the last decade, several remarkable methodologies were developed to improve the levels of multimedia security. Recently, Chaotic Maps are promising tool and successfully utilized in digital watermarking, data encryption, steganography, and data hiding techniques. The interest in using different kinds of Chaotic Maps and systems in multimedia security is steadily increase through the last few years where the number of published papers in archival journals and conference’ proceedings are monotonically increased. Although, according to the best knowledge of the author, no previously published book which covers the multimedia security using the Chaotic Maps. This motivates the idea of this call for book chapter under the title “Multimedia Security using Chaotic Maps: Principles & Methodologies”.
The book provides the readers a comprehensive overview of principles, methodologies and recent advances in Multimedia security using different Chaotic Maps through a collection of high-quality chapters. These chapters present original and previously unpublished works of famous researches from several countries dealing with different issues of multimedia security using Chaotic Maps.
This book is a valuable reference for researchers, engineers, IT specialists, developers, postgraduate students, and senior undergraduate students with majors in data security.


Recommended Topics
The topics covered by the book will present a collection of high-quality research works written by renowned leaders in the field. The recommended topics include, but are not limited to the following:

• Principles of Chaotic Maps
• Hybrid Chaotic systems
• Emerging Chaotic Maps
• Image and Video encryption using Chaotic Maps
• Image and Video watermarking using Chaotic Maps
• Image and video Steganography using Chaotic Maps
• Data hiding using Chaotic Maps
• Speech and Audio Cryptography using Chaotic Maps
• Multimedia security using Quantum Chaotic Maps
• FPGA-Based Implementation for multimedia security using Chaotic Maps
• Embedded hardware implementation for Multimedia Security using Chaotic Maps
• Applications of Multimedia security in Smart Cities.

Important Dates
Full Chapter Submission: March 31, 2019
First Decision: May 31, 2019
Submission of the Revised Chapter: June 30, 2019
Final Acceptance Notifications: July 31, 2019
Submission of Final Chapters (Camera Ready): August 31, 2019
Expected Publication Date: First quarter of 2020

Submission Procedure
Prospective authors are invited to submit original, high quality, unpublished results electronically using Easy Chair submission system (Link). Submitted manuscripts will be refereed by at least two expert reviewers. The accepted chapters will be published in an edited book by the prestigious Studies in Computational Intelligence Series by Springer. For preparing your chapter(s), please, consider the following points:

1. Chapter’s publication is free of charge.
2. Each book chapter should be 25-30 pages.
3. Each chapter is a complete topic and self-contained.
4. Each chapter should have an abstract of approximately 100-150 words.
5. Each chapter should have a list of 5-10 keywords.
5. Prepare your chapter using the MS-word according to the author’s guidelines.

Indexing: The edited book and the published chapters will be indexed in Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink.

Book Editor
Kahlid M. Hosny, PhD
Professor
Department of Information Technology,
Faculty of Computers and Informatics,
Zagazig University, Zagazig 44519, Egypt.
Email: k_hosny@yahoo.com ; hosnykm@gmail.com

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ECML-PKDD 2024   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
SEAS 2025   14th International Conference on Software Engineering and Applications
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICSM 2025   International Conference on SMART MULTIMEDIA
IMPROVE 2025   5th International Conference on Image Processing and Vision Engineering
ESORICS 2025   European Symposium on Research in Computer Security (round 2)