郝永生
88

个人信息Personal Information

高级工程师

教师拼音名称:haoyongsheng

所在单位:信息化建设与管理处、网络信息中心

性别:男

联系方式:Email:yshao@nuist.edu.cn

职称:高级工程师

教师博客

当前位置: 中文主页 >> 教师博客

欢迎投稿Journal of Electronic Imaging (SCI special issue)

发布时间:2022-11-17   点击次数:

投稿地址: https://jei.msubmit.net/cgi-bin/main.plex

Guest Editors

Shi Dong

Zhoukou Normal University
Zhoukou, China
dongshi@zknu.edu.cn

Stelvio Cimato

Università degli studi di Milano
Italy
stelvio.cimato@unimi.it

Joarder Kamruzzaman

Federation University Australia
Ballarat, Australia
joarder.kamruzzaman@federation.edu.au

Yongsheng Hao

Nanjing University of Information Science & Technology
Nanjing, China
002004@nuist.edu.cn


Scope

As an important branch of network security, image steganography has set off a research upsurge since it was proposed and plays an important role in all kinds of copyright protection. With social changes, the traditional way of hiding important information in the carrier at the cost of permanent distortion of the carrier can no longer meet more practical needs. For example, in medicine it is necessary to ensure not only the security of information in the transmission process but also the lossless recovery of the carrier after the receiver extracts the hidden information. In the military, the security of carrier information is much more important than the amount of information that can be embedded. With the introduction of a large amount of data, the way of storing information in the cloud is also facing the challenges of data security and reversible information extraction. In addition, massive spreading of harmful information will increase the difficulty of security management. Image steganalysis techniques can address such concerns. Of particular interest here is real-time image steganalysis when information timeline is of importance. How to use new technologies such as deep learning and pattern recognition to improve the embedding rate and real-time steganalysis and how to reduce time complexity are ongoing research problems.

This special section is intended to serve as a forum to provide recent advances in real-time image steganography and steganalysis technology as related to the following: (1) state-of-the-art real-time steganalysis models based on deep learning; (2) novel real-time image hiding frameworks; (3) real-time reversible image hiding technology in encrypted domain; (4) real-time steganography and steganalysis using computational intelligence; (5) real-time multi-media security and watermarking; and (6) survey articles reporting the recent progress in real-time image hiding and steganalysis. 

Topics of interest include but are not limited to:

  • Real-time image steganalysis model based on deep learning

  • Real-time reversible image steganography technology

  • Real-time reversible image steganography technology in encrypted domain

  • Real-time reversible image steganography in shared domain

  • Securing social media real-time image steganography

  • Blockchain based real-time image steganography

  • Deep learning based real-time image steganography

  • Real-time or online image steganography

  • Real-time combination of encryption, watermarking for privacy protection and authentication

  • Improved real-time methods for traditional image steganography technology

  • Real-time semi learning steganalysis model

  • Adversarial examples of real-time detection based on image steganalysis

  • Comprehensive survey articles on recent real-time image steganography and steganalysis techniques highlighting future challenges

Manuscripts should conform to the author guidelines of the Journal of Electronic Imaging. Prospective authors should submit their manuscript through the online submission system at https://jei.msubmit.net. The special section should be mentioned in the cover letter. Each manuscript will be reviewed by at least two independent reviewers. Peer review will commence immediately upon manuscript submission, with a goal of making a first decision within six weeks. Each paper is published as soon as the copyedited and typeset proofs are approved by the author.



As an important branch of network security, image steganography has set off a research upsurge since it was proposed and plays an important role in all kinds of copyright protection. With social changes, the traditional way of hiding important information in the carrier at the cost of permanent distortion of the carrier can no longer meet more practical needs. For example, in medicine it is necessary to ensure not only the security of information in the transmission process but also the lossless recovery of the carrier after the receiver extracts the hidden information. In the military, the security of carrier information is much more important than the amount of information that can be embedded. With the introduction of a large amount of data, the way of storing information in the cloud is also facing the challenges of data security and reversible information extraction. In addition, massive spreading of harmful information will increase the difficulty of security management. Image steganalysis techniques can address such concerns. Of particular interest here is real-time image steganalysis when information timeline is of importance. How to use new technologies such as deep learning and pattern recognition to improve the embedding rate and real-time steganalysis and how to reduce time complexity are ongoing research problems.

This special section is intended to serve as a forum to provide recent advances in real-time image steganography and steganalysis technology as related to the following: (1) state-of-the-art real-time steganalysis models based on deep learning; (2) novel real-time image hiding frameworks; (3) real-time reversible image hiding technology in encrypted domain; (4) real-time steganography and steganalysis using computational intelligence; (5) real-time multi-media security and watermarking; and (6) survey articles reporting the recent progress in real-time image hiding and steganalysis. 

Topics of interest include but are not limited to:

  • Real-time image steganalysis model based on deep learning

  • Real-time reversible image steganography technology

  • Real-time reversible image steganography technology in encrypted domain

  • Real-time reversible image steganography in shared domain

  • Securing social media real-time image steganography

  • Blockchain based real-time image steganography

  • Deep learning based real-time image steganography

  • Real-time or online image steganography

  • Real-time combination of encryption, watermarking for privacy protection and authentication

  • Improved real-time methods for traditional image steganography technology

  • Real-time semi learning steganalysis model

  • Adversarial examples of real-time detection based on image steganalysis

  • Comprehensive survey articles on recent real-time image steganography and steganalysis techniques highlighting future challenges

Manuscripts should conform to the author guidelines of the Journal of Electronic Imaging. Prospective authors should submit their manuscript through the online submission system at https://jei.msubmit.net. The special section should be mentioned in the cover letter. Each manuscript will be reviewed by at least two independent reviewers. Peer review will commence immediately upon manuscript submission, with a goal of making a first decision within six weeks. Each paper is published as soon as the copyedited and typeset proofs are approved by the author.