Aims and scope
The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.
The EURASIP Journal on Information Security is published using an open access publishing model, which makes the full-text of all peer-reviewed articles freely available online with no subscription barriers. EURASIP Journal on Information Security employs a paperless, electronic submission and evaluation system to promote a rapid turnaround in the peer review process. Fairness and transparency of the review process are pursued by traditional and innovative means.
In addition to creating an international forum for the publication of high quality articles in the broad range of information security, the EURASIP Journal on Information Security aims at reaching the highest quality standards with regard to the experimental section of published articles. To this aim we strongly encourage authors to describe, whenever present, experimental results in a way that they can easily be reproduced. For example, algorithms proposed or tested within the papers should be accompanied by a detailed pseudo-code or block diagram description, all necessary parameters should be listed, and a detailed description of the data set used for training or performance evaluation should be given. At the same time, it is recommended that the authors share the source code of the algorithms with readers and reviewers. To this aim specific tools are made available by the electronic submission procedure to upload any relevant piece of the software together with the manuscript. If the authors choose this option, the source code will be freely available to readers under the Creative Commons License after the paper is accepted and published, which allows the free re-use of the source code for all non-commercial purposes.
In order to further facilitate the verification of results and the comparison among competing schemes, the journal also seeks articles whose goal is that of comparing existing systems, testing existing algorithms against new data sets, reporting experimental evidence that results published by someone else are wrong (in this last case software sharing is a mandatory requirement).
Topics relevant to the journal include, but are not limited to:
• Multimedia security primitives (such digital watermarking, perceptual hashing, multimedia authentictaion)
• Steganography and Steganalysis
• Fingerprinting and traitor tracing
• Joint signal processing and encryption, signal processing in the encrypted domain, applied cryptography
• Biometrics (fusion, multimodal biometrics, protocols, security issues)
• Digital forensics
• Multimedia signal processing approaches tailored towards adversarial environments
• Machine learning in adversarial environments
• Digital Rights Management
• Network security (such as physical layer security, intrusion detection)
• Hardware security, Physical Unclonable Functions
• Privacy-Enhancing Technologies for multimedia data
• Private data analysis, security in outsourced computations, cloud privacy
Why publish your article in EURASIP Journal on Information Security?
EURASIP Journal on Information Security's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience.
Speed of publication
EURASIP Journal on Information Security offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through EURASIP Journal on Information Security and SpringerOpen.
Online publication in EURASIP Journal on Information Security gives you the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example, to PubMed, to sequence and other databases, and to other articles).
Promotion and press coverage
Articles published in EURASIP Journal on Information Security are included in article alerts and regular email updates.
In addition, articles published in EURASIP Journal on Information Security may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in EURASIP Journal on Information Security.
Authors of articles published in EURASIP Journal on Information Security retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement).
For further information about the advantages of publishing in a journal from SpringerOpen, please click here.
All articles published by EURASIP Journal on Information Security are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.
As authors of articles published in EURASIP Journal on Information Security you are the copyright holders of your article and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate your article, according to the SpringerOpen copyright and license agreement.
For those of you who are US government employees or are prevented from being copyright holders for similar reasons, SpringerOpen can accommodate non-standard copyright lines. Please contact us if further information is needed.
Open access publishing is not without costs. EURASIP Journal on Information Security therefore levies an article-processing charge of £495.00/$775.00/€630.00 for each article accepted for publication.
If the corresponding author's institution participates in our open access membership program, some or all of the publication cost may be covered (more details available on the membership page). We routinely waive charges for authors from low-income countries. For other countries, article-processing charge waivers or discounts are granted on a case-by-case basis to authors with insufficient funds. Authors can request a waiver or discount during the submission process. For further details, see our article-processing charge page.
SpringerOpen provides a free open access funding support service to help authors discover and apply for article processing charge funding. Visit our OA funding and policy support page to view our list of research funders and institutions that provide funding for APCs, and to learn more about our email support service.
The full text of all articles is deposited in digital archives around the world to guarantee long-term digital preservation. You can also access all articles published by BioMed Central on SpringerLink.We are working closely with relevant indexing services including PubMed Central and Web of Science (Clarivate Analytics) to ensure that articles published in EURASIP Journal on Information Security will be available in their databases when appropriate.
EURASIP Journal on Information Security operates a single-blind peer-review system, where the reviewers are aware of the names and affiliations of the authors, but the reviewer reports provided to authors are anonymous Publication of research articles by EURASIP Journal on Information Security is dependent primarily on their scientific validity and coherence as judged by our external expert editors and/or peer reviewers, who will also assess whether the writing is comprehensible and whether the work represents a useful contribution to the field.
Submitted manuscripts will generally be reviewed by two to three experts who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates already published work, and whether or not the manuscript is sufficiently clear for publication. Reviewers will also be asked to indicate how interesting and significant the research is. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board.
All manuscripts submitted to EURASIP Journal on Information Security should adhere to SpringerOpen's editorial policies.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Citing articles in EURASIP Journal on Information Security
Articles in EURASIP Journal on Information Security should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.
Article citations follow this format:
Authors: Title. EURASIP J Inform Secur [year], [volume number]:[article number].
e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. EURASIP J Inform Secur 2009, 1:115.
refers to article 115 from Volume 1 of the journal.
Appeals and complaints
If you wish to appeal a rejection or make a complaint you should, in the first instance, contact the Editor who will provide details of the journal's complaints procedure.
2016 Journal Metrics
Funding your APC
- ISSN: 2510-523X