entropy-logo

Journal Browser

Journal Browser

Information Hiding and Secret Sharing for New Carriers and Their Security Evaluation Methods

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: 20 February 2025 | Viewed by 143

Special Issue Editors

The College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China.
Interests: secret image sharing; information hiding; AI security; multimedia security; air-gapped
Special Issues, Collections and Topics in MDPI journals
Department of Mathematics and Physics, North China Electric Power University, Baoding 071003, China
Interests: secret sharing; secret image sharing; polynomial-based secret image sharing; information hiding; multimedia security; information theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Information hiding and secret sharing are key techniques used to protect private information; they can be applied to copyright protection, access control, etc. Many new carriers have appeared in recent years, such as AI, encrypted multimedia, and barcodes, whose security is crucial. AI is widely developed and used nowadays, and its security has attracted the attention of researchers and engineers. Multimedia sources, such as an image, are encrypted first and then stored in the cloud, thus making encrypted multimedia a new carrier. Barcodes, like QR codes, are widely used, and their security is important for everyone. In addition, security evaluation methods of information protection techniques are important but difficult as well.

In this Special Issue, first we intend to consider information hiding and secret sharing for new carriers, such as deep learning models, encrypted multimedia, and barcodes, in order to protect their security. Second, we intend to consider the security evaluation methods of the above related protection techniques for new carriers, like using information theory or lossy entropy.

Dr. Xuehu Yan
Dr. Peng Li
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information hiding
  • secret image sharing
  • AI security
  • multimedia security
  • barcode

Published Papers

This special issue is now open for submission.
Back to TopTop