Special Issue Information Special Issue Call for Paper Other Special Issues on this journal Closed Special Issues
Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security

Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security

Journal
Impact Score 4.62

OFFICIAL WEBSITE

Special Issue Information

Submission Deadline: 17-08-2021
Journal Impact Score: 4.62
Journal Name: Journal of Visual Communication and Image Representation
Publisher: Journal of Visual Communication and Image Representation

Special Issue Call for Papers


Special Issue: Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security

Special Issue Managing Guest Editor: Prof. James C.N. Yang

Visual cryptography (VC) encrypts visual information (pictures, text, etc.) to shared images. For reconstruction, participants in the qualified set could decrypt visually decode the secret data without the help of computer, while participants in the non-qualified set have no information about the secret. Although VC has beautiful properties of "threshold" and "stacking-to-see" to realize wide applications, the most criticism is its contrast. This restricts its applications. At present time, the practical applications and researches of VC are still not enough. In recent years, many information secure algorithms have been proposed, such as data hiding, watermarking, secret image sharing, and deep learning. VC can be combined with these new technologies to enhance the security of new media. In this Special issue, we want to make VC no longer limited to theoretical research and have more practical application scenarios. The aim of this special issue is to collect papers that combine VC with new security technologies to realize novel and practical applications. Except the reseaches about visual cryptography combining with data hiding, watermarking and secret image sharinging, we solicit original researches papers addressing the topics listed below (but not limited to)




Special Issue Managing Guest Editor:



Title: Professor (IET Fellow)
Name: James C.N. Yang
Affiliation: Department of Computer Science and Information Engineering,
National Dong Hwa University, Hualien, Taiwan
E-Mail: [email protected]
Webpage: http://cis.csie.ndhu.edu.tw 



Special Issue Guest Editor:
Name: Prof. Stelvio Cimato
Affiliation: Department of Computer Science, Università degli studi di Milano, Milan, Italy
E-Mail: [email protected]
Webpage: https://homes.di.unimi.it/cimato/



Special Issue Guest Editor:



Name: Xuehu Yan
Affiliation: National University of Defense Technology, Hefei 230037, China
E-Mail: [email protected]
Webpage: https://orcid.org/0000-0001-6388-1720

Special Issue Guest Editor:
Name: William Puech
Affiliation: Université de Montpellier, Montpellier, France
E-Mail: [email protected]
Webpage: www.lirmm.fr/~wpuech



Submission portal will be open on:16th ,March 2021
Submission Deadline: 16th August,2021



When submitting your manuscript through the submission portal, https://www.editorialmanager.com/jvci/default.aspx please select the article type “VSI:VC Application”.



According to JVCI Special Issue Proposal Guideline, we describe that why this SI proposal achieves the guidelines of JVCI SI.



Guideline #1: SI topic must be trending or emerging. This may be evidenced by the recently organized workshops, special sessions, or large number of papers on the same topic published in conferences.
Description: There are many international IEEE conferences (for example, ICIP, ICCV, CVPR, ACM-MM) about data hiding and watermarking. Some conferences (e.g., IWDW and SICBS have the submission topics about VC and secret image sharing. There are abundant published papers about VC every year. One can easily check that from Google Scholar or ResearchGate. The detail information is briefly shown as follows.
Until now, 60800 papers on visual cryptography have been published, including 51500 papers from IEEE and 22200 papers in IEEE transaction; 72700 papers on secret image sharing have been published, including 37600 papers from IEEE and 26900 papers in IEEE transaction; 970000 papers on data hiding have been published, including 28700 papers from IEEE and 54300 papers in IEEE transaction; 17800 papers on watermarking have been published, including 2290 papers from IEEE and 968 papers in IEEE transaction.



Guideline #2: Every guest editor must be experts on the SI topic. The proposal needs to include a list of publications from each guest editor on the SI topic.
Description: The lead guest editor, James C.N. Yang, published about 130 SCI journal papers on the research fields (VC, data hiding, watermarking, secret image sharing, and image security). Some IEEE Trans. Papers for this topic are listed below. Detail publications can be found via the link: http://cis.csie.ndhu.edu.tw/~cnyang/PDF/james_resume.pdf.
[1] C.N. Yang and Y.Y. Yang, "On the Analysis and Design of Visual Cryptography with Error Correcting Capability", accepted and to be published at IEEE Transactions on Circuits and Systems for Video Technology (doi: 10.1109/TCSVT.2020.3017126), 2020.
[2] X. Yan, C.N. Yang, X. Zhang, and S. Wang, "A Common Method of Share Authentication in Image Secret Sharing", accepted and to be published at IEEE Transactions on Circuits and Systems for Video Technology (doi: 10.1109/TCSVT.2020.3025527), 2020.
[3] Y.X. Liu, C.N. Yang, and Q. Sun, "Thresholds Based Image Extraction Schemes in Big Data Environment in Intelligent Traffic Management", accepted and to be published at IEEE Transactions on Intelligent Transportation Systems (doi: 10.1109/TITS.2020.2994386), 2020.
[4] C.N. Yang, C.C. Wu, and Y.C. Lin "k out of n Region-Based Progressive Visual Cryptography," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 29, pp. 252-262, Jan., 2019.
[5] Z. Zhou, Y. Wang, Q.M. Wu, C.N. Yang, and X. Sun, "Effective and Efficient Global Context Verification for Image Copy Detection," IEEE Transactions on Information Forensics and Security, Vol. 12, No. 1, pp. 48-63, Jan., 2017
[6] C.N. Yang and D. Wang, "Property Analysis of XOR Based Visual Cryptography," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 24, No. 2, pp. 189-197, Feb., 2014.
[7] D. Wang, T. Song, L. Dong, and C.N. Yang, "Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing," IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, pp. 2059-2072, Dec., 2013.
[8] C.N. Yang, H.W. Shih, C.C. Wu, and L. Harn, "k out of n Region Incrementing Scheme in Visual Cryptography," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 22, No. 6, pp. 799-810, May, 2012.
The guest editor, Stelvio Cimato, served as the first author and cooperated with James C.N. Yang wrote a VC text book “Visual Cryptography and Secret Image Sharing” published by CRC Press. Some of his publications about VC are listed below:
[1] S. Cimato, J. C. N. Yang and C. Wu, "Visual Cryptography Based Watermarking", Transactions on Data Hiding and Multimedia Security, vol. 9, 2014, pp. 91–109.
[2] S. Cimato, R. D. Prisco and A. D. Santis, "Colored visual cryptography without color darkening", Theoretical Computer Science, vol. 374, no. 1-3, 2007, pp. 261 - 276
[3] S. Cimato, R. De Prisco and A. De Santis, "Probabilistic Visual Cryptography Schemes", The Computer Journal, vol. 49, no. 1, 2006, pp. 97-107.
[4] C. Blundo, S. Cimato and A. De Santis, "Visual cryptography schemes with optimal pixel expansion", Theoretical Computer Science, vol. 369, no. 1-3, 2006, pp. 169 - 182.
[5] S. Cimato, R. Prisco and A. Santis, "Optimal Colored Threshold Visual Cryptography Schemes", Designs, Codes and Cryptography, vol. 35, no. 3, 2005, pp. 311-335.
[6] S. Cimato, A. DeSantis, A. L. Ferrara, B. Masucci, "Ideal contrast visual cryptography schemes with reversing", Information Processing Letters, vol. 93, no. 4, 2005, pp. 199 - 206.
The guest editor, Xuehu Yan, published about 90 papers on this research field (VC, data hiding, watermarking, secret image sharing). Two IEEE Trans. papers about VC are listed:
[1] X. Yan, C.N. Yang, X. Zhang, and S. Wang, "A Common Method of Share Authentication in Image Secret Sharing", accepted and to be published at IEEE Transactions on Circuits and Systems for Video Technology (doi: 10.1109/TCSVT.2020.3025527), 2020.
[2] X. Yan, Y. Lu, L. Liu and X. Song, "Reversible Image Secret Sharing," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3848-3858, 2020.

The guest editor, William Puech, published about 190 papers on this research field (VC, data hiding, watermarking, secret image sharing). Two IEEE Trans. papers about VC are listed:
[1] Sébastien Beugnon, William Puech, Jean-Pierre Pedeboy, Format-Compliant Selective Secret 3-D Object Sharing Scheme. IEEE Trans. Multim. 21(9): 2171-2183 (2019)
[2] Iuliia Tkachenko, William Puech, Christophe Destruel, Olivier Strauss, Jean-Marc Gaudin, Christian Guichard, Two-Level QR Code for Private Message Sharing and Document Authentication. IEEE Trans. Inf. Forensics Secur. 11(3): 571-583 (2016)



Guideline #3: At least one of the GEs must be hold a senior role and have visibility in the international research community.
Description: The lead guest editor, James C.N. Yang, is Professor in Department of Computer Science and Information Engineering. He had been Visiting Professor to University of Missouri Kansas City, University of Milan, and University of Tokyo. He is currently a Fellow of IET (IEE) and an IEEE senior member. Professor Yang has done extensive researches on visual cryptography and secret image sharing, and is the chief scientist in both areas. In fact, a very important innovation of visual cryptography, the probabilistic visual cryptography, was firstly proposed by Professor Yang. His areas of interest include error correcting code, multimedia security, cryptography, and information security. He has authored two books and has published over 270 professional research papers (including more than 150 SCI-indexed journal papers) in the areas of information security and coding theory. In the meantime, he has served/is serving in international academic organizations. He serves as technical reviewers for over 40 major scientific journals in the areas of his expertise, and serves as editorial boards and editors of special issues for some journals. Also, he was invited as chairs, keynote speakers, and members of program committees for various international conferences. He is the recipient of the 2000, 2006, 2010, 2012, and 2014 Fine Advising Award in the Thesis of Master/PhD of Science awarded by Institute of Information & Computer Machinery. The detail information of James C.N. Yang can be found in the homepage: http://cis.csie.ndhu.edu.tw.



Guideline #4: The GE team must have diversity including geographic, gender and ethnic diversity.
Description: The lead guest editor, James C.N. Yang, is from Taiwan. Two guest editors, Stelvio Cimato and Xuehu Yan, are from Italy and China, respectively.



Guideline #5: The proposal needs to list recently published or ongoing special issues from other journals on the similar topic, and explain the difference/similarity between the new proposal and the existing special issues. Note that it is okay to have another SI even though there are already special issues out there, but the proposal needs to explain why it makes sense to have another special issue.



Description: Two recent special issues from other journals on the similar topic are listed below:
Image Security and Image Privacy Protection, https://www.hindawi.com/journals/scn/si/924740/
Application-Aware Multimedia Security Techniques, https://www.hindawi.com/journals/scn/si/ 643486/. The similarity and difference of our SI and them are (i) similarity: on the information security including the topic of visual cryptography and secret image sharing (2) difference: the new proposal mainly focuses on the application of VC, the existing special issues on the theoretical algorithm of secret image sharing.

Closed Special Issues

Publisher
Journal Details
Closing date
G2R Score
Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security

Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security

Journal of Visual Communication and Image Representation
Closing date: 17-08-2021 G2R Score: 4.62
Visual communication cues for remote collaboration

Visual communication cues for remote collaboration

Journal of Visual Communication and Image Representation
Closing date: 01-07-2021 G2R Score: 4.62
Deep Sparse and Low-Rank Analytics for Robust Visual Representation

Deep Sparse and Low-Rank Analytics for Robust Visual Representation

Journal of Visual Communication and Image Representation
Closing date: 20-10-2020 G2R Score: 4.62
Special Issue: Integrating Vision and Language for Semantic Knowledge Reasoning and Transfer

Special Issue: Integrating Vision and Language for Semantic Knowledge Reasoning and Transfer

Journal of Visual Communication and Image Representation
Closing date: 01-08-2019 G2R Score: 4.62
Emerging 3D and Immersive Data Processing and Evaluation Technologies

Emerging 3D and Immersive Data Processing and Evaluation Technologies

Journal of Visual Communication and Image Representation
Closing date: 01-03-2018 G2R Score: 4.62
Visual Information Processing for Virtual Reality

Visual Information Processing for Virtual Reality

Journal of Visual Communication and Image Representation
Closing date: 30-11-2017 G2R Score: 4.62
Intermediate Representation for Vision and Multimedia Applications

Intermediate Representation for Vision and Multimedia Applications

Journal of Visual Communication and Image Representation
Closing date: 01-02-2016 G2R Score: 4.62