Springer

LNCS Transactions on Data Hiding and Multimedia Security

 

As tremendous and swift progress is constantly being made in information technology, especially in VLSI semi-conductor design, digital signal processing (in particular, compression) and Internet, the most recent decade has witnessed an explosive advancement of multimedia applications that have dramatically changed every aspect of our modern life ranging from business, manufacturing, transportation, medicine and finance to education, research, entertainment and government. This trend is continuing at the present and will be continuing in the future. While an enormous amount of text, data, speech, music, image and video is easily  exchanged through Internet and other communication channels, some serious security issues have arisen: in particular information assurance (authentication, integrity and access control), which has caught the attention of people, societies and governments worldwide. 

 

Since the middle of 1990s, digital watermarking has been proposed as enabling technologies for solving security problems in multimedia applications. Digital watermarks have now been used in applications including broadcast monitoring, movie fingerprinting, digital rights management, secure data system, secure data exchange, video indexing and retrieval, and image authentication, to name a few. In some of these applications, data hiding and cryptographic techniques are combined to complement each other to achieve the goal. It is expected that this approach will become more and more mature and will play a significant role in future multimedia applications.

 

As a reflection of this trend, several international workshops, and special sessions in conventional conferences and workshops have been devoted to the field of digital watermarking and data hiding. More and more papers have been published in this field. This new journal, LNCS Transactions on Data Hiding and Multimedia Security, aims at publication of original and archival research in this field.

 

I. LNCS Transactions on Data Hiding and Multimedia Security (DHMMS) by Springer Notice

 

LNCS Transaction on Data Hiding and Multimedia Security (DHMMS) by Springer now has its own website: http://senldogo0039.springer-sbm.com/dhmms/servlet/Conference. Prospective authors are invited to submit their papers through this website. And all submitted papers will be handled and reviewed on-line electronically. Prior to submission, new authors need to register to the DHMMS first. For registration, please go to http://senldogo0039.springer-sbm.com/dhmms/servlet/Conference/LoginEntry/register. Your login identifier will be your email address and it will be authenticated via a password of your choice. Although authors are strongly recommended that they should submit their paper to the official website, the temporary web site will still have been available at http://web.njit.edu/~shi/TDHM.html for some period of time. Papers submitted to the Transactions should follow Springer's LNCS format. More details can be found at the end of the above-mentioned web sites or at the previous paper submission website: https://sekur.njit.edu/dhms/.

 

II. Editorial Board

 

Editor-in-chief

Yun Q. Shi (New Jersey Inst. of Tech., USA) shi@njit.edu

 

Vice Editor-in-Chief

Hyoung-Joong Kim (Kangwon N. U., Korea) khj@kangwon.ac.kr

Stefan Katzenbeiser (Technical Univ. Munich, Germany) katzenbe@in.tum.de

 

Associate Editors

Mauro Barni (U. of Siena, Italy) barni@dii.unisi.it

Jeffrey Bloom (Sarnoff, USA) bloom@ieee.org

Jana Dittmann (U. Magdeburg, Germany) jana.dittmann@iti.cs.uni-magdeburg.de

Jiwu Huang (Zhongshan U., China) isshjw@zsu.edu.cn

Mohan Kankanhalli (NUS, Singapore) mohan@comp.nus.edu.sg

Darko Kirovski, (Microsoft, USA), darkok@microsoft.com

C. C. Jay Kuo (USC, USA) cckuo@sipi.usc.edu

Heung-Kyu Lee (KAIST, Korea) hklee@mmc.kaist.ac.kr

Benoit Macq (UCL, Belgium) macq@tele.ucl.ac.be

Nasir Memon (Polytechnic U., USA) memon@poly.edu

Kivanc Mihcak (Microsoft, USA) kivancm@microsoft.com

Hideki Noda (Kyushu Institute of Technology, Japan) noda@know.comp.kyutech.ac.jp

Jeng-Shyang Pan (KUAS, Taiwan) jspan@cc.kuas.edu.tw

Fernando Perez-Gonzalez (U. of Vigo, Spain) fperez@gts.tsc.uvigo.es

Andreas Pfitzmann (Dresden University of Technology, Germany) pfitza@inf.tu-dresden.de

Yong-Man Ro (ICU, Korea) yro@icu.ac.kr

Alessandro Piva (University of Florence, Italy) piva@lci.det.unifi.it

Ahmad-Reza Sadeghi (University of Bochum, Germany) sadeghi@crypto.rub.de

Kouichi Sakurai (Kyushu University, Japan) sakurai@csce.kyushu-u.ac.jp

Qibin Sun (Institue of Information Research, Singapore) qibin@i2r.a-satr.edu.sg

Ed Wong (Polytechnic U., USA) wong@poly.edu

 

 

III. Advisory Board

      

Pil Joong Lee (POSTECH, Korea) pjl@postech.ac.kr

Bede Liu (Princeton U., USA) liu@ee.princeton.edu

 

 

IV. Topics:

 

The Transactions solicit original papers addressing novel ideas, issues, theoretical analysis, implementation, experimental results, systems and applications in the field of Watermarking, Data Hiding, Multimedia Security, and Information Assurance. Suggested topics include, but are not limited to:

 

*    Concepts and applications of data hiding methods (among them fragile, semi-fragile, robust, and reversible watermarking)

*         Multimedia data hiding (in images, videos, text, audio, speech, radio frequency signals and software)

*         Security aspect of watermarking and data hiding

*         Privacy aspect of watermarking and data hiding

*         Digital rights Management systems

*         Steganography and steganalysis

*         Multimedia security and information assurance (authentication, fingerprinting, forensic analysis, hashing, media encryption and signatures, visual cryptography, key management)

*         Attacks and benchmarks for data hiding systems

*         Applications of data hiding technology in medicine, law enforcement, remote sensing, and e-Commerce)

 

V. CFP Special Issue on Forensic Image Analysis for Crime Prevention

      

Criminals inevitably leave clues to their identity at the crime scene. This is known as the Locard Exchange Principle which states that every contact between person(s) and objects results in exchange of physical evidence of that contact. Forensic image analysis is an increasingly important part of most evidential examinations, e.g., documents, handwriting, firearms, shoe-marks, fingerprints, tyre-marks, ear-marks, and these types of evidence are now considered by investigation agencies everywhere.

 

The last few years have witnessed the emergence of new tools and means for the scientific analysis of image based information for forensic science and crime prevention applications. For instance, images can now be captured, viewed and analysed at the scenes of crime or in laboratories within minutes whilst simultaneously making the images available to other experts via fast and secure communication links on the Internet thereby making it possible to share information for forensic and security intelligence and crime linking purposes. In addition, these tools have a strong link with other aspects of investigation, such as image capture, information interpretation and evidence gathering. They are helpful for both minimization of human error and analysis of data. While a good beginning has been made, there are still many challenges in this emerging area of research.

 

The objective of this special issue is to gather high quality research efforts that address the challenges of the emerging area of image-based evidence for forensic science and crime prevention applications with a view to provide the readers (researchers and forensic scientists) with an overview of the state of the art in this field. Possible topics for papers submitted to this special issue include, but are not limited to:

 

         Scene of crime evidence (shoe-marks, tyre-marks, ear-marks, palm prints, etc.)

         Recent advances in automatic analysis of scene of crime imagery and video

         Forensic image and video quality

         Statistical image security for forensic science

         Image forensics from CCTV (Closed Circuit Television) and surveillance video

         Data mining in forensic imaging

         Visualization tools

         Applications of forensic imaging and video

 

 

IMPORTANT DATES

Paper submission deadline                              10 January 2009

Completion of first round of reviews                        10 April 2009

Final review and selection of papers                        10 June 2009

Final manuscripts to Springer                            10 August 2009

Publication of the Special Issue                           10 November 2009

 

INSTRUCTIONS FOR MANUSCRIPTS

Manuscripts should be submitted electronically by following the information for authors at: http://web.njit.edu/~shi/TDHM.html

Both the manuscripts and cover letter should be clearly marked to indicate that they are being submitted for consideration for this Special Issue. They will be logged and sent to the Special Issue Editors for review. Papers must not have been published previously or submitted for publication elsewhere. All papers will be reviewed by following the guidelines of the transactions.

 

GUEST EDITORS

 

Wei-Qi Yan (w.yan@qub.ac.uk), Institute of Electronics, Communications and Information Technology (ECIT), Queen¨s University Belfast, UK. (either Wei-Qi, or Weiqi, take one)

Ahmed Bouridane (A.Bouridane@qub.ac.uk), Institute of Electronics, Communications and Information Technology (ECIT), Queen¨s University Belfast, UK.

Mohan S Kankanhalli (mohan@comp.nus.edu.sg), School of Computing, National University of Singapore, Singapore.

 

 

Paper submission web site(the new system)

Paper submission web site(the temporary system)