Forthcoming articles

International Journal of Multimedia Intelligence and Security

International Journal of Multimedia Intelligence and Security (IJMIS)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Multimedia Intelligence and Security (3 papers in press)

Regular Issues

  • TIDE: Tampered Image Detection using Mutual Information   Order a copy of this article
    by Dhwani Patel, Manik Lal Das 
    Abstract: In this paper, we study the problem of detecting tampering in images without having any prior knowledge of image and its content. The features are designed to classify the given image as raw image (cover image) or image containing hidden data (stego image) embedded into original image. Two set of features are designed - one based on histogram of image and other based on information theoretic measure such as mutual information. Histogram of image is analyzed using Short-Time Fourier Transform (STFT) and features based on Centre of Mass (COM) in frequency domain is designed. Statistical dependency between adjacent pixels in natural images is quantified using Mutual Information. The observations made in our analysis provide some interesting observations on image tampering detection using features based on STFT and Mutual Information and Short-Time Fourier Transform. We have performed the experimental result using the coral database containing 10000 images, and observed 85.71\% classification accuracy which is a significant improvement over the previously reported techniques.
    Keywords: Steganography; Image tampering; Image forgery; Mutual information; Histogram.

  • Cyber Defence Triage for Multimedia Data Intelligence: Hellsing, Desert Falcons and Lotus Blossom APT Campaigns as Case Studies   Order a copy of this article
    by Raúl Vera, Shehu Amina, Tooska Dargahi, Ali Dehghantanha 
    Abstract: Advanced Persistent Threats (APTs) refer to sophisticated attacks to businesses and individuals in which adversaries use multiple attack vectors to achieve their objectives. The main challenge regarding APT analysis and defence is that all research body about APTs is fragmented, and there are just a few scientific papers in the literature that discuss different features of APTs. However, in order to defend against APTs, it is important to have a complete overview of their tactics, techniques, and procedures (TTPs). In this paper we analyse TTPs of three APT groups, namely Hellsing, Desert Falcons and Lotus Blossom, that are actively targeting multimedia data storage and multimedia systems. Adopting three well-known attack attribution models (i.e., Lockheed Martin Cyber Kill-Chain, Diamond Model and Course of Action Matrix) we provide a comprehensive cyber defence triage process (CDTP) about the considered three APTs. The provided CDTP in this paper highlights the steps undertaken by these APT groups, uncovers factors that have influenced achieving their objectives and suggests possible mitigations against these APTs. The provided courses of actions are APT specific, and different APTs based on their attack features might need different mitigation methods (while some general methods could be used in all cases). For example, in case of Dessert Falcon whitelisting could help in denying the delivery of malware, while in the case of Helsing, other methods such as DKIM and SPF could help in denying and detecting attack during the delivery phase.
    Keywords: Multimedia Intelligence; Security; APT; Advanced Persistent Threats; Cyber Kill Chain; Diamond Model; Intrusion Analysis; Cyber Defence Triage; IoC; Indicators of Compromise.

  • On Constructing Contention Aware Connected Dominating Sets (CDS) for inter connectivity among Internet of Things (IoT) devices.   Order a copy of this article
    by Md. Sadiqur Rahman Sohel, Chowdhury Nawrin Ferdous, Ashikur Rahman, Akib Jawad Nafis, Salsabil Arabi, Raqeebir Rab 
    Abstract: The heterogeneous IoT devices (such as smartphones, or sensors) are often equipped with wireless interfaces which can be used to create self-organising multi-hop networks. Any device/node in such networks often requires to broadcast packets for data dissemination and route discovery. The straightforward way to accomplish broadcasting is through flooding, where each node transmits the broadcast message only once. Drawback of such a naive mechanism is its serious bottleneck on network throughput caused by redundant traffic, serious contention, and collision. In the literature, several methods for creating a connected dominant set (CDS) were proposed to overcome performance bottleneck. CDS can be used as a virtual backbone for broadcasting where only the member nodes of the CDS would forward the message. CDS construction could be either centralised or distributed. The algorithms proposed in the literature aim at minimizing the number of forwarding. Neither centralised nor distributed approaches minimise contention that we address in this paper. The contention occurs when certain nodes located in close vicinity of each other want to access a shared channel. Notably, at the time of contention one exclusive node obtains opportunity to transmit on the medium and others need to postpone their sending on the shared medium. In this paper, we also provide a novel mathematical analysis of contention and show that contention is heavily dependent on node density in the network and transmission radius of each node. Then a new centralised algorithm called Contention Aware Connected Dominating Set (CACDS) is devised which intellectually selects member nodes while creating a CDS. This helps to reduce contention. Since collecting global network topology is very difficult to achieve entirely, a distributed algorithm and a hybrid distributed algorithm has also been devised. Finally, the proposed algorithms have been implemented in the state-of- the-art simulator NS-2. The proposed heuristics performance has been captured using simulation experiments under practical settings which shows a significant reduction in contention. Moreover, their performance outperforms some other state-of-the-art algorithms performance with regards to contention and delay minimisation, although the number of forwarding has been increased marginally.
    Keywords: Wireless Ad-hoc Network; Broadcasting in IoT-devices; Connected Dominating Set (CDS); Network Contention; Mathematical analysis of Contention; Contention Aware Connected Dominating Set (CACDS);.