Signal Processing
 Special Issue on: Security of Data Hiding Technologies
 
 New possibilities of digital imaging and data hiding open wide prospects
 in modern imaging science, content management and secure communications.
 However, despite the obvious advantages of digital data hiding
 technologies and their current progress, these developments carry
 inherent risks such as copyright violation, unauthorized prohibited
 usage and distribution of digital media, secret communications and
 network security violations. 
 
 Although the issues of robustness, visibility and capacity of digital
 data hiding technologies have received a lot of attention, their
 security aspect still remains an open and little studied problem. The
 security requirement is closely related to the stochastic visibility and
 unauthorized detection of hidden information and requires both new and
 careful study.  New information-theoretic methods for blind stochastic
 detection of hidden data should be investigated. This aspect will have a
 great impact on robust digital watermarking, steganography, integrity
 control and tamper proofing (possibly even without embedded hidden data)
 and Internet/network security. 
 
 This special issue will focus on the theory and state-of-art
 applications of Security of Data Hiding Technologies in digital signal
 processing research. Some of the research topics for submission include,
 but are not limited to:
 * Security-visibility-robustness-capacity aspects of data hiding
   technologies
 * Information-theoretic aspects of data hiding technologies
 * Steganalysis and unauthorized detection of hidden data
 * Visual and stochastic visibility of hidden data
 * Secure data embedding: content-adaptive watermark encoding,
   modulation and embedding
 * Steganography
 * Active and passive attacks against data hiding technologies
 * Stegoviruses and security architectures preventing distribution
   of hidden data and stegoviruses
 * Internet/network and protocol security issues
 * Blind classification of robust watermarking technologies
 * Integrity control and tamper proofing
 
 Prospective authors should submit an electronic copy of their complete
 manuscript to the address below, according to the following timetable:
 
 Manuscripts due:         November 30, 2002
 Acceptance notification: February 28, 2003
 Final versions due:      April 30, 2003
 
 Guest Editors:
 S. Voloshynovskiy, University of Geneva, Switzerland
 T. Pun, University of Geneva, Switzerland
 J. Fridrich, SUNY Binghamton, USA
 F. Perez-Gonzalez, University of Vigo, Spain
 N. Memon, Polytechnic University, USA
 
 Manuscripts should be sent to:
 S. Voloshynovskiy, CUI-University of Geneva
 24 rue General-Dufour, 1211 Geneva SWITZERLAND