Forthcoming articles


International Journal of Multimedia Intelligence and Security


These articles have been peer-reviewed and accepted for publication in IJMIS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJMIS are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Multimedia Intelligence and Security (5 papers in press)


Regular Issues


  • A Novel Approach for Enhancing the Security of Information Content of an Image   Order a copy of this article
    by Jalesh Kumar, Nirmala Shivananda 
    Abstract: In this paper, a novel approach is proposed for securing the contents of an image. This approach is a combination of edge detection and encryption process. The proposed approach comprises four stages. In first stage, the input image is divided into blocks of equal size and shuffled. In second stage, the input image is divided into two sub images, image with edges and image without edge information. Canny edge detection algorithm is used for detecting edges in the input image. In third stage, image without edge information obtained from previous stage are encrypted using crossover and mutation operations. The encrypted image and image with edge information are fused in the final stage. The performance of the proposed method is measured in terms of correlation coefficient, histogram and entropy. Different types of attacks are carried out to prove the robustness of the approach. The results obtained are compared with method [Jalesh and Nirmala, 2013]. The comparative study reveals that the proposed approach is more efficient to enhance the security of information content of an image.
    Keywords: Edge detection; Selection; Crossover; Mutation; Pseudorandom; Linear congruential generator.

  • Region based Color Image Spatial Fusion Steganographic System   Order a copy of this article
    by Viswanathan P, VenkataKrishna P 
    Abstract: The Steganographic schemes embed secret data in the location of cover image generated by pseudo random number generator. These kinds of algorithms do not evaluate the content and size of the secret message during embedding. It creates distortion in smooth region of cover image and results in secret data loss.In order to solve the above issues, high-capacity novel region based spatial fusion steganographic scheme is proposed in this paper. This spatial fusion decomposes the image into various regions based on the level of intensity. It is extensively used to evaluate the capacity of region for high payload. Size and type of secret data is initialized as a key for the extraction to improve the confidentiality and privacy. Then the secret message with key is embedded by differentiating the pixel by 1 with constraints not equal to 0 and even or odd option which leads to less rate of modification. The proposed scheme is applied in the region of blue channel which is less sensitive to human visual system gives high imperceptibility to secret data. It is experimented with standard IST natural images by steganalysis algorithms results in better enhancement of security and quality in terms of imperceptibility and embedding capacity when compare to other LSB approaches.
    Keywords: composition; decomposition; extraction; hiding; spatial fusion.

  • A Reversible High Capacity Data Hiding Scheme using Combinatorial Strategy   Order a copy of this article
    by Rajeev Kumar, Satish Chand, Samayveer Singh 
    Abstract: In this paper, we propose a new reversible high capacity data hiding scheme using combinatorial strategy which has very less distortion while hiding the secret data. It first builds a location map for the pixels of the cover image and then identifies the embeddable pixels. It divides the image into pairs of embeddable pixels and hides the secret data bits in each pair. The values of the embeddable pixels are updated according to prespecified rules. The pixel values get changed at most by one and some of them may remain unchanged. Thus, there are minor changes in pixel values, which helps our scheme to achieve very good quality and with good hiding capacity. Furthermore, it is very simple as it just increases or decreases the pixel values rather than performing complex computations. The experimental results show that our scheme is superior to the state of the art schemes.
    Keywords: Reversible data hiding; distortion; embeddable pixels; combinatorial strategy; PSNR; capacity; location map; pixel mapping table; extraction.

  • QoE in Multimedia Domain: A User-centric Quality Assessment   Order a copy of this article
    by Yun Gao, Xin Wei, Liang Zhou, Mohsen Guizani 
    Abstract: The rapid development of multimedia service has attracted increasing attention on the interests in the study of quality of experience (QoE) in multimedia domain. QoE, as a promising user-centric quality evaluation metric, has gradually been the hot research topic in recent years. Compared with conventional multimedia service quality metrics (e.g. quality of service (QoS), peak-signalnoise- ratio (PSNR)), QoE is more concerned about users subjective experience. Accordingly, a user-centric quality strategy brings the increasing popularity of QoE-driven applications in multimedia domain. Therefore, in this paper, we present readers the latest development of QoE in multimedia domain. Specifically, we firstly introduce the background of QoE, including the definitions of QoE and relationship between QoS and QoE. Then, we explain the influence factors of QoE in detail, which are the basis of QoE modelling and prediction. Subsequently, we mainly present typical latest works about QoE measurement and modelling in recent years. Moreover, we also exhibit our research works about QoE-driven applications. Finally, open challenges and research directions are concluded for future study.
    Keywords: Quality of experience (QoE); Quality of service (QoS); user-centric experience; multimedia domain.

  • Improvement on OTP Authentication and a Possession-based Authentication Framework   Order a copy of this article
    by SHUSHAN ZHAO, Wenhui Hu 
    Abstract: Authentication plays a paramount role in online services. Today many online services are still using password as single authentication method, but this is not considered secure any more. There have been many attempts to introduce multifactor authentication mechanism, for example, counter-based one-time password, and time-based one- time password. In this paper, we first list some limitations and weaknesses of the existing multifactor authentication methods, then propose an improvement to one-time password algorithms, and finally apply it in a general-purpose possession-based authentication framework. The framework can be implemented in popularly used smartphones but does not rely on cellular network or wifi network. The purpose of the framework is for current password-authenticated online services to adopt multifactor authentication easily.
    Keywords: authentication; OTP.