Calls for Papers (special): International Journal of Digital Crime and Forensics (IJDCF)


Special Issue On: Image and Video Based Intelligent Surveillance and Forensics

Submission Due Date
3/30/2018

Guest Editors
Xinguo Yu
National Engineering Research Center for E-Learning,
Central China Normal University, China

Chao Sun
National Engineering Research Center for E-Learning,
Central China Normal University, China

Introduction
This special issue is to invite the extended version of the published conference papers of the PSIVT2017 (The 8th Pacific-Rim Symposium on Image and Video Technology) which were held at Wuhan China on November 2017. The PSIVT is a high-quality series of biyearly symposia that aim at providing a forum for researchers and practitioners who contribute to theoretical advances or practical implementations in image and video technology. The researchers, artists, developers, educators, performers, and practitioners from the Pacific-rim countries and over the world were invited to participate PSIVT 2017.

Objective
The focus of this special issue is on image and video based intelligent surveillance and forensics. Both academic and industrial research contributions are encouraged to submit their extended papers to this special issue.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Intelligent surveillance
• Biomedical Image Processing and Analysis
• Vision Intelligence
• Biometrics and Image Forensics
• Image/Video Processing and Analysis
• Applications of Image and Video Technology


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Image and Video Based Intelligent Surveillance and Forensics on or before March 30, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Xinguo Yu and Chao Sun
Guest Editor
The International Journal of Digital Crime and Forensics (IJDCF)
E-mail: xgyu@mail.ccnu.edu.cn; csun@mail.ccnu.edu.cn

Special Issue On: Cybercrime Investigation and Digital Forensics

Submission Due Date
4/18/2018

Guest Editors
Farkhund Iqbal
College of Technological Innovation
Zayed University, UAE

Patrick C. K. Hung
Faculty of Business and Information Technology
University of Ontario Institute of Technology, Canada

Benjamin C. M. Fung
School of Information Studies
McGill University, Canada



Introduction
The unprecedented increase in online crimes including identify theft, phishing and social engineering attacks has increased the need for digital forensics. Digital forensics is aimed to collect, analyze, and present digital evidence to prosecute cybercriminals in the court of law. Digital forensics is becoming more challenging due to tremendous increase in ubiquities computing, emergence of new technologies such as cloud computing and with influx of plethora of smart devices. Finding potential evidence related to a crime is no more an issue due to availability of network logs, chat logs, web forums, emails and social networking posts. The challenge is to precisely analyze large volumes of data in timely manner and collect forensic evidence related to crimes being investigated. Digital forensics is employed for fraud detection, homeland security, financial scams investigation and for revealing discrepancies in business transactions. The increased computing power, storage capability and the development of innovative machine learning and data analytics techniques are playing a vital role in digital forensics. New legislation and revising exiting laws to adequately cover the new online crimes is imperative.

Objective
The goal of this special issue is to present both novel and industrial solutions to challenging technical issues as well as to explore the challenges faced by researchers, practitioners, and non-technical professionals in digital and cybercrime investigation. This special issue will share related practical experiences to benefit the reader, and will provide a forum for law enforcement, judiciary and industry to share their problems and challenges with people from academia and industry for possible solution to meet their needs. This will promote collaboration between industry, academia and R&D and will help the collaborating partners to benefit from each other’s resources and expertise in the domain.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Forensic processes and procedures
• Digital forensic: challenges and common practices
• Network and log forensics
• Memory forensics
• Flash and physical memory forensics
• Software and hardware forensic tools
• Small-scale digital devices forensics
• Smart toy and gaming console forensics
• Messaging forensics
• Anti-Forensic and steganography
• Cloud forensics: technical, jurisdiction and legal challenges
• Digital forensics and cybercrime laws
• Role of Big Data in forensic analysis
• Internet of Thing (IoT) forensics
• Drone forensics
• Cybercrime laws and procedures
• Digital forensics: social crimes
• Digital forensics: financial crimes including money laundering
• Digital forensics: cyber stalking and cyber bullying
• Digital forensics: homeland security
• Digital forensics: operating systems platforms and file system
• Digital crimes and international laws
• Socio-linguistics and criminology
• Email forensics
• Digital crime scene investigation
• Digital forensics tools testing and evaluation
• Case studies


Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on [insert special issue topic] on or before [insert due date]. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung
Guest Editors
The International Journal of Digital Crime and Forensics (IJDCF)
E-mail: farkhund.iqbal@zu.ac.ae, patrick.hung@uoit.ca, ben.fung@mcgill.ca

Special Issue On: Recent Advances on Cyber Security and Privacy for Cloud-of-Things

Submission Due Date
4/25/2018

Guest Editors
Yassine Maleh, Hassan 1st University, Morocco
Ghita Mezzour, International University of Rabat
Abdelkrim Haqiq, Hassan 1st University, Morocco
Marinella Petrocchi, Institute for Informatics and Telematics IIT, Italy

Introduction
In recent years, Cloud of Things CoT has emerged as a revolutionary paradigm that enables intelligent and self-configuring (smart) IoT devices and sensors to be connected with the cloud through the Internet. The Cloud of thing paradigm can stimulate the development of innovative and novel applications to various areas such as smart cities, smart homes, smart grids, smart agriculture, smart transportation, smart healthcare, etc. In cloud of Things system field, security and privacy threats have been extensively studied and received considerable attention in recent years, as witnessed by the number of related publications. In the context of these trends, the forthcoming special issue on recent advances on Cyber Security and privacy for Cloud-of-Things will address significant issues in the field. Topics covered include issues of personal information and identity crime for cloud of thing, intellectual property-related issues in cyberspace, computer forensic investigation in cloud of things.

Objective
The main goal of this special issue is to encourage both researchers and practitioners to share and exchange their experiences and recent studies with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of Cloud of Things devices (Smart sensors, 6lowpan, M2M, IoT,…). The overall objectives are:

• To improve the awareness of readers about cyber Security and Privacy for Cloud-of-Things.
• To analyze and present the state-of-the-art of the cyber Security and privacy for Cloud-of-Things and Edge Computing and related technologies and methodologies.
• To highlight and discuss the recent development and emerging trends related to cyber Security and privacy for Cloud-of-Things.
• To propose new models, practical solutions and technological advances related to cyber Security and privacy for Cloud-of-Things.
• Discusses new cyber Security and privacy models, prototypes and protocols for the Cloud of Things environment.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Cybersecurity dynamics theory in Cloud of things devices;
• Cybersecurity dynamics simulation in Cloud of things
• Cybersecurity dynamics modelling technologies in Cloud of things
• Computer forensic investigation in cloud of things;
• Malware analysis in Cloud of things;
• Privacy-preserving solutions in Cloud of things;
• Countermeasures solutions in Cloud of things;
• Seamless security solutions of Cloud of things;
• Threats and vulnerabilities in in Cloud of things;
• Botnets analysis for Cloud of things;
• BYOD security in Cloud of things;
• Identity management in Cloud of things;
• Cybercrime and digital forensics in Cloud of things.

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme on Recent Advances on Cyber Security and Privacy for Cloud-of-Things on or before April, 25. Only papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered. Extended works must have a significant (over 70%) of new/rewritten content. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Yassine Maleh, Ghita Mezzour, Abdelkrim Haqiq, Marinella Petrocchi
Guest Editors
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: y.maleh@uhp.ac.ma

Special Issue On: Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices

Submission Due Date
5/1/2018

Guest Editors
Gulshan Shrivastava, National Institute of Technology Patna, India
Nhu Nguyen Gia, Duy Tan University, Vietnam
Loredana-Mihaela STANCIU, Politehnica University Timisoara, Romania
Dac-Nhuong Le, Haiphong University, Vietnam

Introduction
In recent years, privacy and forensic analysis concerns with smart devices have becoming a key research area. The smart devices provide enhanced features such as optimized display, in-house health monitoring, people tracking, driving directions, etc. Smart device forensics analysis is a classification under digital forensics that mainly deals with the analysis of digital evidence found in smart devices such as Smart phones, tablets and Smart watch. There is an enormous rate of increase in threats with constantly increasing releases of smart devices and hasty development in innovative technologies. Digital forensics analysis procedure to acquire and analyze digital evidences originated in a smart device based on file systems, logical memory storage and operating system architectures.

Objective
Main intend of this special issue to provide a premier international platform for wide range of professions including scholars, researchers, academicians and Industry people to present and discuss to bridge the gap by providing an in-depth look into smart devices and explaining technologies involved and their relationship to analytic procedures. This special issue covers smart devices with features beyond sensor and IoT capabilities. This special issue will also discusses procedures for the validation, preservation, acquisition, examination, analysis, and reporting of digital information and its best practices for the real world.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Secure converged and integrated systems for forensic computing
• Investigation modeling for Smart device data analytics & platforms
• Privacy and forensic of Smart devices in banking systems
• Privacy and forensic of Smart devices in telecommunication systems
• Privacy and forensic of Smart devices in finance systems
• Risk and reliability analysis in the Internet and enterprise Smart devices
• Privacy and forensic of Smart devices in communication systems
• Privacy and forensic of Smart devices in e-Commerce
• Analysis of big data in emergency services, energy, food chain
• Privacy analysis of Smart devices in critical infrastructure
• Privacy and forensics management of Smart devices in cloud computing
• Security and privacy analysis of Industrial control systems
• Security, privacy and forensics of big data in stock trade
• Smart device data for security analysis
• Evidence collection through Smart device data analytics
• Privacy and forensic of Web engineering in telecommunication systems

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Recent Research in Security, Privacy and Forensic Analysis System for Smart Devices on or before May 01, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Gulshan Shrivastava
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: gulshan.shrivastava@ieee.org

Special Issue On: Multimedia Security and Forensics

Submission Due Date
5/15/2018

Guest Editors
Xianfeng Zhao
Institute of Information Engineering, Chinese Academy of Sciences

Introduction
The wide use of multimedia introduces new security issues, most of which are closely related to forensic techniques. Noticeably, copyright violation, which leads to the spread of pirated multimedia, has been concerned by content industry for many years. On the contrast, people may not know that the widespread of multimedia gives digital criminals a covert communication channel, which challenges security protection or investigation at present. In addition, with the development of multimedia editing tools, the contents can be unperceivably manipulated or tampered. It makes the judicial use of multimedia proofs more difficult.

To tackle the above problems, multimedia security and forensics have been investigated worldwide for almost 20 years. To let the readers of IJDCF be more aware of the development as well as the existing problems, it is worth dedicating a special issue to the recent results in the field.

Objective
Although the technologies of multimedia security and forensics, such as watermarking, steganalysis and content authentication, have been researched and developed for many years, a series of problems still exist. For examples, the robustness of most watermarking is still weak under geometric attacks. The accuracy of both steganalysis and content forensics should be further improved. Moreover, with the changing network environment, the security of more and more systems or protocols for protecting multimedia content need further been improved and verified. Consequently, the objective of this special issue is to publish the most recent results of these technologies and further advance of the research.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Multimedia forensics
• Multimedia tampering techniques
• Anti-forensic technology
• Steganography
• Steganalysis
• Watermarking and fingerprinting
• Attacks on watermarking and fingerprinting
• Multimedia encryption
• Digital rights management
• Artificial Intelligence for multimedia forensics
• Application protocol for multimedia protection

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Multimedia Security and Forensics on or before May 15, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/journal/international-journal-digital-crime-forensics. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Xianfeng Zhao
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
Email: zhaoxianfeng@iie.ac.cn

Special Issue On: Advances in Multimedia Information Hiding, Tampering Detection, and Data Forensics

Submission Due Date
5/30/2018

Guest Editors
Xuping HUANG, Meiji University, Japan

Introduction
Information hiding technologies, including digital watermarking and steganography, facilitates the protection of data’s integrity and guarantees the authentication and confidentiality of multimedia data besides encryption applications and protocols. However, it faces the challenge that detecting malicious modification of multimedia contents has been difficult because of sophisticated Artificial Intelligence technologies, such as lip synchronization, speech synthesis and voice conversion.

Objective
To limit abuse of these technologies and to provide efficient solutions to protect data from threat and vulnerability, researchers are encouraged to submit papers to share the bleeding-edge ideas and achievements on information security, particularly multimedia information hiding, tampering detection and data forensics. Technologies to generate contents by AI and machine learning technologies are also welcome for further discussion and feedbacks to improve their research to its full potential. This issue covers topics on both of attack and protection technologies as the spear and the shield.

Recommended Topics
Topics to be discussed in this special issue include (but are not limited to) the following:

• Audio Watermarking and Steganography
• Algorithm and Application for Audio Steganalysis
• Audio Tampering Detection
• Data Forensics for Speech and Audio Data
• Fake News and Data Trust
• Voice Conversion
• Identity Fraud
• Applications to Detect Speech Synthesis
• Acoustic CAPTCHA
• Data’s Authentication and Integrity
• Detection of Artificial Intelligence
• Lip Synchronization Detection
• Privacy Preserving
• IoT Data Reliability
• Encryption Protocol for IoT and Mobile Devices

Submission Procedure
Researchers and practitioners are invited to submit papers for this special theme issue on Advances in Multimedia Information Hiding, Tampering Detection, and Data Forensics on or before May 30, 2018. All submissions must be original and may not be under review by another publication. INTERESTED AUTHORS SHOULD CONSULT THE JOURNAL’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at http://www.igi-global.com/publish/contributor-resources/before-you-write//. All submitted papers will be reviewed on a double-blind, peer review basis. Papers must follow APA style for reference citations.

All submissions and inquiries should be directed to the attention of:
Xuping HUANG
Guest Editor
International Journal of Digital Crime and Forensics (IJDCF)
E-mail: huang_xp@meiji.ac.jp