Forthcoming articles


International Journal of Multimedia Intelligence and Security


These articles have been peer-reviewed and accepted for publication in IJMIS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJMIS are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Multimedia Intelligence and Security (2 papers in press)


Regular Issues


  • TIDE: Tampered Image Detection using Mutual Information   Order a copy of this article
    by Dhwani Patel, Manik Lal Das 
    Abstract: In this paper, we study the problem of detecting tampering in images without having any prior knowledge of image and its content. The features are designed to classify the given image as raw image (cover image) or image containing hidden data (stego image) embedded into original image. Two set of features are designed - one based on histogram of image and other based on information theoretic measure such as mutual information. Histogram of image is analyzed using Short-Time Fourier Transform (STFT) and features based on Centre of Mass (COM) in frequency domain is designed. Statistical dependency between adjacent pixels in natural images is quantified using Mutual Information. The observations made in our analysis provide some interesting observations on image tampering detection using features based on STFT and Mutual Information and Short-Time Fourier Transform. We have performed the experimental result using the coral database containing 10000 images, and observed 85.71\% classification accuracy which is a significant improvement over the previously reported techniques.
    Keywords: Steganography; Image tampering; Image forgery; Mutual information; Histogram.

  • Cyber Defence Triage for Multimedia Data Intelligence: Hellsing, Desert Falcons and Lotus Blossom APT Campaigns as Case Studies   Order a copy of this article
    by Raúl Vera, Shehu Amina, Tooska Dargahi, Ali Dehghantanha 
    Abstract: Advanced Persistent Threats (APTs) refer to sophisticated attacks to businesses and individuals in which adversaries use multiple attack vectors to achieve their objectives. The main challenge regarding APT analysis and defence is that all research body about APTs is fragmented, and there are just a few scientific papers in the literature that discuss different features of APTs. However, in order to defend against APTs, it is important to have a complete overview of their tactics, techniques, and procedures (TTPs). In this paper we analyse TTPs of three APT groups, namely Hellsing, Desert Falcons and Lotus Blossom, that are actively targeting multimedia data storage and multimedia systems. Adopting three well-known attack attribution models (i.e., Lockheed Martin Cyber Kill-Chain, Diamond Model and Course of Action Matrix) we provide a comprehensive cyber defence triage process (CDTP) about the considered three APTs. The provided CDTP in this paper highlights the steps undertaken by these APT groups, uncovers factors that have influenced achieving their objectives and suggests possible mitigations against these APTs. The provided courses of actions are APT specific, and different APTs based on their attack features might need different mitigation methods (while some general methods could be used in all cases). For example, in case of Dessert Falcon whitelisting could help in denying the delivery of malware, while in the case of Helsing, other methods such as DKIM and SPF could help in denying and detecting attack during the delivery phase.
    Keywords: Multimedia Intelligence; Security; APT; Advanced Persistent Threats; Cyber Kill Chain; Diamond Model; Intrusion Analysis; Cyber Defence Triage; IoC; Indicators of Compromise.