Calls for papers


International Journal of Information and Computer Security
International Journal of Information and Computer Security


Special Issue on: "Multimedia Information Security Solutions on Social Networks"

Guest Editors:
Dr. Amit Kumar Singh, Jaypee University of Information Technology, India
Prof. Harry (Haoxiang) Wang, GoPerception Laboratory, USA
Dr. Mohamed Elhoseny, Mansoura University, Egypt
Dr. S. Ramakrishnan, Dr. Mahalingam College of Engineering and Technology, India

Social networks have become places where, on a daily basis, many people exchange and share personal information in the form of multimedia over unsecured channels. Information and communication technology (ICT) has proved to be an indispensable and cost-effective technique for the dissemination of such multimedia documents.

However, prevention of copyright violation, authenticity, confidentiality and ownership identity theft have all become potential issues due to malicious attacks and the hacking of information transmitted via these networks. Everyday risks include criminal offences ranging from ownership identity theft to copyright violation, and also personal information or medical history exposure. To tackle these threats, researchers are developing advanced techniques to analyse, prevent and detect these potential issues.

The objective of this special issue is present high-quality research and survey articles that promote research and reflect the most recent advances in addressing the security and privacy issues of multimedia information on networks as well as other emerging environments and applications.

Subject Coverage
Suitable topics include, but are not limited, to the following:

  • Information security
  • Multimedia information propagation via social networks
  • Access control and identity management
  • Security and privacy of multimedia information
  • Forensics in social networks
  • Phishing problems in social networks
  • Secure social-network application development and methodologies
  • Cryptographic protocols against attacks
  • Security architectures/protocols for cloud computing
  • Recognition, identification and classification
  • Mobile social network security
  • Multimedia information retrieval and feature extraction
  • Big data forensics
  • Computational multimedia processing
  • Multimedia big data
  • Multimedia indexing and annotation
  • Multimedia retrieval
  • Pattern recognition

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our Submitting articles page.

If you have any queries concerning this special issue, please email to Guest Editor, Dr. Amit Kumar Singh, at

Important Dates

Manuscripts due by: 31 May, 2018