EURASIP Journal on Information Security


EURASIP Journal on Information Security

Publisher: Hindawi Publishing Corporation


The overall goal of the EURASIP Journal on Information Security (EURASIP
JIS), sponsored the European Association for Signal Processing (EURASIP), is
to bring together researchers and practitioners dealing with the general
field of information security, with a particular emphasis on the use of
signal processing tools to enable the security of digital contents. As such,
it addresses any work whereby security primitives and multimedia signal
processing are used together to ensure the secure access to the data.
Enabling technologies include watermarking, data hiding, steganography and
steganalysis, joint signal processing and encryption, perceptual hashing,
identification, biometrics, fingerprinting, and digital forensics.

The EURASIP JIS is published using an open access publishing model, which
makes the full-text of all peer-reviewed papers freely available online with
no subscription or registration barriers. EURASIP JIS employs a paperless,
electronic submission and evaluation system to promote a rapid turnaround in
the peer review process. Fairness and transparency of the review process are
pursued by traditional and innovative means, including the possibility of
reviewers of accepted papers to disclose their identity and publish a brief
commentary together with the article.

In addition to creating an international forum for the publication of high
quality papers in the broad range of information security, the EURASIP JIS
aims at reaching the highest quality standards with regard to the
experimental section of published papers. To this aim it is required that,
whenever present, experimental results are carried out and described by
strictly adhering to the scientific principle of experiment reproducibility.

For this reason, the editorial board will ensure that the following specific
requirements are satisfied, along with the usual requirements of originality
and theoretical rigour:

* all the algorithms proposed or tested within the papers must be
accompanied by a detailed pseudo-code or block diagram description;
* all the parameters that are necessary to implement and run the algorithms
must be listed in a proper table;
* the actual values of the parameters used for the experiments must be
clearly detailed;
* a detailed description of the data set used for training or performance
evaluation must be given.

At the same time, it is strongly recommended that the authors share the
source code of the algorithms (written in a widely diffused language, e.g.
ansi c-code) with readers and reviewers. To this aim specific tools are made
available by the electronic submission procedure to upload any relevant
piece of the software together with the manuscript. Once the paper is
accepted and published, the source code will be freely available to readers
under the Creative Commons Non-Commercial License, which allows the free
re-use of the source code for all non-commercial purposes.

In order to further facilitate the verification of results and the
comparison among competing schemes, a section of the journal will be
expressly devoted to experimental evaluation , i.e., papers whose goal is
that of comparing existing systems, testing existing algorithms against new
data sets, reporting experimental evidence that results published by someone
else are wrong (in this last case software sharing is a mandatory

EURASIP JIS publishes two types of issues: regular issues and special
issues. Regular issues publish collections of papers without special
solicitation. Special issues feature specifically aimed and targeted topics
of interest contributed by authors responding to a particular Call for
Papers or by invitation, edited by invited guest editor(s). Regular papers
can be submitted at any time, while special issue papers can be submitted
only based on planned schedules and submission guidelines of the Call for

Proposals for special issues can be submitted directly to the
Editor-in-Chief.Subject areas include (but are by no means limited to):

* Digital rights management
* Data hiding
* Watermarking
* Fingerprinting and traitor tracing
* Authentication
* Identification
* Perceptual hashing
* Steganography and steganalysis
* Joint signal processing and encryption
* Signal processing in the encrypted domain
* Biometrics
* Digital forensics

ISSN: 1687-4161
e-ISSN: 1687-417X


Mauro Barni
Dipartimento di Ingegneria dell'Informazione
Universita' di Siena, Via Roma 56
53100 Siena - Italy


Current Issue: Forthcoming

Date: 5 June 2006

Open Access: 
Original posting date: 
Monday, June 5, 2006
©1995 - 2014 Georgetown University Library
37th & O Streets NW Washington DC 20057-1174   •   202.687.7607