Skip to main content

About

Aims and scope

The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information forensics, information security and privacy, biometrics, surveillance and systems applications with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby forensics, security and privacy are achieved through a combination of techniques from applied cryptography, software-, hardware- and network security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics.

The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal. 

Additional information

The EURASIP Journal on Information Security is published using an open access publishing model, which makes the full-text of all peer-reviewed articles freely available online with no subscription barriers. EURASIP Journal on Information Security employs a paperless, electronic submission and evaluation system to promote a rapid turnaround in the peer review process. Fairness and transparency of the review process are pursued by traditional and innovative means.

In addition to creating an international forum for the publication of high quality articles in the broad range of information security, the EURASIP Journal on Information Security aims at reaching the highest quality standards with regard to the experimental section of published articles. To this aim we strongly encourage authors to describe, whenever present, experimental results in a way that they can easily be reproduced. For example, algorithms proposed or tested within the papers should be accompanied by a detailed pseudo-code or block diagram description, all necessary parameters should be listed, and a detailed description of the data set used for training or performance evaluation should be given. At the same time, it is recommended that the authors share the source code of the algorithms with readers and reviewers. To this aim specific tools are made available by the electronic submission procedure to upload any relevant piece of the software together with the manuscript. If the authors choose this option, the source code will be freely available to readers under the Creative Commons License after the paper is accepted and published, which allows the free re-use of the source code for all non-commercial purposes.

In order to further facilitate the verification of results and the comparison among competing schemes, the journal also seeks articles whose goal is that of comparing existing systems, testing existing algorithms against new data sets, reporting experimental evidence that results published by someone else are wrong (in this last case software sharing is a mandatory requirement).

Topics relevant to the journal include, but are not limited to:

• Biometrics (fusion, multimodal biometrics, protocols, security issues)
• Digital forensics 
• Digital Rights Management
• Fingerprinting and traitor tracing
• Hardware security, Physical Unclonable Functions 
• Joint signal processing and encryption, signal processing in the encrypted domain, applied cryptography
• Machine learning in adversarial environments 
• Multimedia signal processing approaches tailored towards adversarial environments
• Network security (such as physical layer security, intrusion detection)
• Private data analysis, security in outsourced computations, cloud privacy
• Privacy-Enhancing Technologies for multimedia data
• Steganography and Steganalysis

Benefits of publishing with SpringerOpen

High visibility

EURASIP Journal on Information Security's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience. 

Speed of publication

EURASIP Journal on Information Security offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through EURASIP Journal on Information Security and SpringerOpen.

Flexibility

Online publication in EURASIP Journal on Information Security gives you the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example, to PubMed, to sequence and other databases, and to other articles).

Promotion and press coverage

Articles published in EURASIP Journal on Information Security are included in article alerts and regular email updates. 
In addition, articles published in EURASIP Journal on Information Security may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in EURASIP Journal on Information Security

Copyright

Authors of articles published in EURASIP Journal on Information Security retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement).

For further information about the advantages of publishing in a journal from SpringerOpen, please click here.

Open access

All articles published by the EURASIP Journal on Information Security are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.

As authors of articles published in the EURASIP Journal on Information Security you are the copyright holders of your article and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate your article, according to the SpringerOpen copyright and license agreement.

For those of you who are US government employees or are prevented from being copyright holders for similar reasons, SpringerOpen can accommodate non-standard copyright lines. Please contact us if further information is needed.

Article processing charges (APC)

Authors who publish open access in EURASIP Journal on Information Security are required to pay an article processing charge (APC). The APC price will be determined from the date on which the article is accepted for publication.

The current APC, subject to VAT or local taxes where applicable, is: £740.00/$1040.00/€840.00

Visit our open access support portal and our Journal Pricing FAQs for further information.

Open access funding

Visit Springer Nature’s open access funding & support services for information about research funders and institutions that provide funding for APCs.

Springer Nature offers agreements that enable institutions to cover open access publishing costs. Learn more about our open access agreements to check your eligibility and discover whether this journal is included.

Springer Nature offers APC waivers and discounts for articles published in our fully open access journals whose corresponding authors are based in the world’s lowest income countries (see our APC waivers and discounts policy for further information). Requests for APC waivers and discounts from other authors will be considered on a case-by-case basis, and may be granted in cases of financial need (see our open access policies for journals for more information). All applications for discretionary APC waivers and discounts should be made at the point of manuscript submission; requests made during the review process or after acceptance are unable to be considered.

Indexing services

The full text of all articles is deposited in digital archives around the world to guarantee long-term digital preservation. You can also access all articles published by BioMed Central on SpringerLink.We are working closely with relevant indexing services including PubMed Central and Web of Science (Clarivate Analytics) to ensure that articles published in EURASIP Journal on Information Security will be available in their databases when appropriate.

Peer-review policy

Peer-review is the system used to assess the quality of a manuscript before it is published. Independent researchers in the relevant research area assess submitted manuscripts for originality, validity and significance to help editors determine whether the manuscript should be published in their journal. You can read more about the peer-review process here.

EURASIP Journal on Information Security operates a single-blind peer-review system, where the reviewers are aware of the names and affiliations of the authors, but the reviewer reports provided to authors are anonymous Publication of research articles by EURASIP Journal on Information Security is dependent primarily on their scientific validity and coherence as judged by our external expert editors and/or peer reviewers, who will also assess whether the writing is comprehensible and whether the work represents a useful contribution to the field.

Submitted manuscripts will generally be reviewed by two to three experts who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates already published work, and whether or not the manuscript is sufficiently clear for publication. Reviewers will also be asked to indicate how interesting and significant the research is. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board.

Editorial policies

All manuscripts submitted to EURASIP Journal on Information Security should adhere to SpringerOpen's editorial policies.

Once your article is accepted, it will be processed by production and published shortly afterwards. In some cases, articles may be held for a short period of time prior to publication. If you have any concerns or particular requirements please contact the Journal.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Citing articles in EURASIP Journal on Information Security

Articles in EURASIP Journal on Information Security should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.

Article citations follow this format:

Authors: Title. EURASIP J Inform Secur [year], [volume number]:[article number].

e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. EURASIP J Inform Secur 2009, 1:115.

refers to article 115 from Volume 1 of the journal.

Appeals and complaints

Authors who wish to appeal a rejection or make a complaint should follow the procedure outlined in the BMC Editorial Policies.

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Annual Journal Metrics

  • 2022 Citation Impact
    3.6 - 2-year Impact Factor
    3.6 - 5-year Impact Factor
    1.461 - SNIP (Source Normalized Impact per Paper)
    0.901 - SJR (SCImago Journal Rank)

    2023 Speed
    39 days submission to first editorial decision for all manuscripts (Median)
    141 days submission to accept (Median)

    2023 Usage 
    289,389 downloads

Funding your APC

​​​​​​​Open access funding and policy support by SpringerOpen​​

​​​​We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. Learn more here