Forthcoming articles

 


International Journal of Multimedia Intelligence and Security

 

These articles have been peer-reviewed and accepted for publication in IJMIS, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

 

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

 

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

 

Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

 

Register for our alerting service, which notifies you by email when new issues of IJMIS are published online.

 

We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.

 

International Journal of Multimedia Intelligence and Security (3 papers in press)

 

Regular Issues

 

  • A Novel Approach for Enhancing the Security of Information Content of an Image   Order a copy of this article
    by Jalesh Kumar, Nirmala Shivananda 
    Abstract: In this paper, a novel approach is proposed for securing the contents of an image. This approach is a combination of edge detection and encryption process. The proposed approach comprises four stages. In first stage, the input image is divided into blocks of equal size and shuffled. In second stage, the input image is divided into two sub images, image with edges and image without edge information. Canny edge detection algorithm is used for detecting edges in the input image. In third stage, image without edge information obtained from previous stage are encrypted using crossover and mutation operations. The encrypted image and image with edge information are fused in the final stage. The performance of the proposed method is measured in terms of correlation coefficient, histogram and entropy. Different types of attacks are carried out to prove the robustness of the approach. The results obtained are compared with method [Jalesh and Nirmala, 2013]. The comparative study reveals that the proposed approach is more efficient to enhance the security of information content of an image.
    Keywords: Edge detection; Selection; Crossover; Mutation; Pseudorandom; Linear congruential generator.

  • Region based Color Image Spatial Fusion Steganographic System   Order a copy of this article
    by Viswanathan P, VenkataKrishna P 
    Abstract: The Steganographic schemes embed secret data in the location of cover image generated by pseudo random number generator. These kinds of algorithms do not evaluate the content and size of the secret message during embedding. It creates distortion in smooth region of cover image and results in secret data loss.In order to solve the above issues, high-capacity novel region based spatial fusion steganographic scheme is proposed in this paper. This spatial fusion decomposes the image into various regions based on the level of intensity. It is extensively used to evaluate the capacity of region for high payload. Size and type of secret data is initialized as a key for the extraction to improve the confidentiality and privacy. Then the secret message with key is embedded by differentiating the pixel by 1 with constraints not equal to 0 and even or odd option which leads to less rate of modification. The proposed scheme is applied in the region of blue channel which is less sensitive to human visual system gives high imperceptibility to secret data. It is experimented with standard IST natural images by steganalysis algorithms results in better enhancement of security and quality in terms of imperceptibility and embedding capacity when compare to other LSB approaches.
    Keywords: composition, decomposition, extraction, hiding, spatial fusion

  • A Reversible High Capacity Data Hiding Scheme using Combinatorial Strategy   Order a copy of this article
    by Rajeev Kumar, Satish Chand, Samayveer Singh 
    Abstract: In this paper, we propose a new reversible high capacity data hiding scheme using combinatorial strategy which has very less distortion while hiding the secret data. It first builds a location map for the pixels of the cover image and then identifies the embeddable pixels. It divides the image into pairs of embeddable pixels and hides the secret data bits in each pair. The values of the embeddable pixels are updated according to prespecified rules. The pixel values get changed at most by one and some of them may remain unchanged. Thus, there are minor changes in pixel values, which helps our scheme to achieve very good quality and with good hiding capacity. Furthermore, it is very simple as it just increases or decreases the pixel values rather than performing complex computations. The experimental results show that our scheme is superior to the state of the art schemes.
    Keywords: Reversible data hiding; distortion; embeddable pixels; combinatorial strategy; PSNR; capacity; location map; pixel mapping table; extraction.