Springer Knight

SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Submit a manuscript Sign up for article alerts Contact us Support

About EURASIP Journal on Information Security

This page includes information about the aims and scope of EURASIP Journal on Information Security, editorial policies, open access and article-processing charges, the peer review process and other information. For details of how to prepare and submit a manuscript through the online submission system, please see the instructions for authors.

Aims & scope

The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.

The journal is an Open Access journal since 2007.

The EURASIP Journal on Information Security is published using an open access publishing model, which makes the full-text of all peer-reviewed articles freely available online with no subscription barriers. EURASIP Journal on Information Security employs a paperless, electronic submission and evaluation system to promote a rapid turnaround in the peer review process. Fairness and transparency of the review process are pursued by traditional and innovative means.

In addition to creating an international forum for the publication of high quality articles in the broad range of information security, the EURASIP Journal on Information Security aims at reaching the highest quality standards with regard to the experimental section of published articles. To this aim we strongly encourage authors to describe, whenever present, experimental results in a way that they can easily be reproduced. For example, algorithms proposed or tested within the papers should be accompanied by a detailed pseudo-code or block diagram description, all necessary parameters should be listed, and a detailed description of the data set used for training or performance evaluation should be given. At the same time, it is recommended that the authors share the source code of the algorithms with readers and reviewers. To this aim specific tools are made available by the electronic submission procedure to upload any relevant piece of the software together with the manuscript. If the authors choose this option, the source code will be freely available to readers under the Creative Commons License after the paper is accepted and published, which allows the free re-use of the source code for all non-commercial purposes.

In order to further facilitate the verification of results and the comparison among competing schemes, the journal also seeks articles whose goal is that of comparing existing systems, testing existing algorithms against new data sets, reporting experimental evidence that results published by someone else are wrong (in this last case software sharing is a mandatory requirement).

Topics relevant to the journal include, but are not limited to:

• Multimedia security primitives (such digital watermarking, perceptual hashing, multimedia authentictaion)
• Steganography and Steganalysis
• Fingerprinting and traitor tracing
• Joint signal processing and encryption, signal processing in the encrypted domain, applied cryptography
• Biometrics (fusion, multimodal biometrics, protocols, security issues)
• Digital forensics
• Multimedia signal processing approaches tailored towards adversarial environments
• Machine learning in adversarial environments
• Digital Rights Management
• Network security (such as physical layer security, intrusion detection)
• Hardware security, Physical Unclonable Functions
• Privacy-Enhancing Technologies for multimedia data
• Private data analysis, security in outsourced computations, cloud privacy

Open access

All articles published by EURASIP Journal on Information Security are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.

Authors of articles published in EURASIP Journal on Information Security are the copyright holders of their articles and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate the article, according to the SpringerOpen copyright and license agreement.

For authors who are US government employees or are prevented from being copyright holders for similar reasons, BioMed Central can accommodate non-standard copyright lines. Please contact us if further information is needed.

Article-processing charges

Open access publishing is not without costs. EURASIP Journal on Information Security therefore levies an article-processing charge of £470/$735/€600 for each article accepted for publication. If the corresponding author's institution is a Member, the cost of the article-processing charge is covered by the membership, and no further charge is payable. In the case of authors whose institutions are Supporter Members, however, a discounted article-processing charge is payable by the author. Please note that EURASIP members receive a 10% discount on the APCs. Editorial Board Members receive a 50% discount. We also routinely waive charges for authors from low-income countries. For further details, see our article-processing charge page.

Indexing services

SpringerOpen is working closely with Thomson Reuters (ISI) to ensure that citation analysis of articles published in EURASIP Journal on Information Security will be available.

Publication and peer review process

Authors will be able to check the progress of their manuscript through the submission system at any time by logging into My EURASIP Journal on Information Security, a personalized section of the site.

Portability of peer review

In order to support efficient and thorough peer review, we aim to reduce the number of times a manuscript is re-reviewed after rejection from EURASIP Journal on Information Security, thereby speeding up the publication process and reducing the burden on peer reviewers. Therefore, please note that, if a manuscript is not accepted for publication in EURASIP Journal on Information Security and the authors choose to submit a revised version to another SpringerOpen journal, we will pass the reviews on to the other journal's editors at the authors' request. We will reveal the reviewers' names to the handling editor for editorial purposes unless reviewers let us know when they return their report that they do not wish us to share their report with another SpringerOpen journal.

Copyediting and proofs

EURASIP Journal on Information Security will copyedit manuscripts before they are published.

Following the acceptance of an article, it is published in EURASIP Journal on Information Security as a provisional PDF file with minimal delay (subject to formatting checks, copyediting and author verification). Fully formatted PDF and full-text (HTML) versions are made available shortly after that.


Please see our reprints website for information about reprinting articles.


EURASIP Journal on Information Security will consider supplements based on proceedings (full articles or meeting abstracts), reviews or research. All articles submitted for publication in supplements are subject to peer review. Published supplements are fully searchable and freely accessible online and can also be produced in print. For further information, please contact us.

Editorial policies

Any manuscript, or substantial parts of it, submitted to the journal must not be under consideration by any other journal. In general, the manuscript should not have already been published in any journal or other citable form, although it may have been deposited on a preprint server. Authors are required to ensure that no material submitted as part of a manuscript infringes existing copyrights, or the rights of a third party.

Correspondence concerning articles published in EURASIP Journal on Information Security is encouraged. A 'post a comment' feature is available on all articles published by EURASIP Journal on Information Security. Comments will be moderated by the editorial office (see our Comment policy for further information) and linked to the full-text version of the article, if suitable.

Editorial standards

SpringerOpen is a member of the Committee on Publication Ethics (COPE). In order to safeguard the quality of SpringerOpen journal publications, Springer has developed a policy on Publishing Integrity which is in line with the philosophy of COPE.

We follow the principle that we have a prime duty to maintain the integrity of the scientific record. Springer’s Policy on Publishing Integrity addresses:

  • Clear definitions of what violation of Publishing Integrity is.
  • A manual on how to identify such a violation (in the document referred to as an Act of Misconduct).
  • Clear (COPE) examples of what such an Act of Misconduct looks like in practice.
  • Clearly defined actions which have to be undertaken by the Editor and Springer when such an Act is a clearly proven fact.
  • Q & A – a useful list of Questions and Answers on the definition of Publishing Integrity.

Please find the full document of Springer's Policy on Publishing Integrity here.

Data and materials release

Submission of a manuscript to EURASIP Journal on Information Security implies that readily reproducible materials described in the manuscript, including all relevant raw data, will be freely available to any scientist wishing to use them for non-commercial purposes. Nucleic acid sequences, protein sequences, and atomic coordinates should be deposited in an appropriate database in time for the accession number to be included in the published article. In computational studies where the sequence information is unacceptable for inclusion in databases because of lack of experimental validation, the sequences must be published as an additional file with the article.

Any 'in press' articles cited within the references and necessary for the reviewers' assessment of the manuscript should be made available if requested by the editorial office.

Appeals and complaints

Authors who wish to appeal a rejection or make a complaint should, in the first instance, contact the Editor-in-Chief who will provide details of the journal's complaints procedure.

Competing interests

EURASIP Journal on Information Security requires authors to declare any competing financial or other interest in relation to their work. All competing interests that are declared will be listed at the end of published articles. Where an author gives no competing interests, the listing will read 'The author(s) declare that they have no competing interests'.

Plagiarism detection

EURASIP Journal on Information Security's publisher, SpringerOpen, is a member of the CrossCheck plagiarism detection initiative. In cases of suspected plagiarism CrossCheck is available to the editors of EURASIP Journal on Information Security to detect instances of overlapping and similar text in submitted manuscripts by using the plagiarism detection tool iThenticate. CrossCheck is a multi-publisher initiative allowing screening of published and submitted content for originality.

Citing articles in EURASIP Journal on Information Security

Articles in EURASIP Journal on Information Security should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.

Article citations follow this format:

Authors: Title. EURASIP J Inform Secur [year], [volume number]:[article number].

e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. EURASIP J Inform Secur 2009, 1:115.

refers to article 115 from Volume 1 of the journal.

Why publish your article in EURASIP Journal on Information Security?

High visibility

EURASIP Journal on Information Security's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience. Articles that have been especially highly accessed are highlighted with a 'Highly accessed' graphic, which appears on the journal's contents pages and search results.

Speed of publication

EURASIP Journal on Information Security offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through EURASIP Journal on Information Security and SpringerOpen.


Online publication in EURASIP Journal on Information Security gives authors the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example to relevant databases and papers).

Promotion and press coverage

Articles published in EURASIP Journal on Information Security are included in article alerts and regular email updates. Some may be included in abstract books mailed to academics and are highlighted on EURASIP Journal on Information Security's pages and on the SpringerOpen homepage.

In addition, articles published in EURASIP Journal on Information Security may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in EURASIP Journal on Information Security.

Authors of articles published in EURASIP Journal on Information Security retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement.

For further information about the advantages of publishing in a journal from SpringerOpen, please click here.