posted by system || 7541 views || tracked by 3 users: [display]

Call for Book Chapters: Bio-CIM 2015 : Large Scale Integration of Biometrics Cues In Identity Management for Homeland Security and Business Media


When Jan 30, 2015 - Oct 30, 2015
Where Durgapur, India
Abstract Registration Due Jan 31, 2015
Submission Deadline May 30, 2015
Notification Due Jul 30, 2015
Final Version Due Aug 30, 2015

Call For Papers

Call for Book Chapters

Large Scale Integration of Biometrics Cues In Identity Management for Homeland Security and Business Media (Bio-CIM 2015)

To be published by IGI Global (Approval is pending)

Volume Editors:

Dakshina Ranjan Kisku, NIT Durgapur, India
Phalguni Gupta, NITTTR Kolkata, India
Jamuna Kanta Sing, Jadavpur University, India

Aims and Objectives:

In recent years, identity management via biometrics evidences has been emerged as a strong and best alternative identity verification practices besides the available knowledge-based and possession-based identity practices. Homeland security issues address the critical and diverse problems of human identification in the field of border control security and intra-nation security aspects. Utilizing the latest technologies and best security practices in government and private agencies for Identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by the person. This does not require any other means of possession-based and knowledge-based identification substance or token that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of it through unauthorized entry to the security zones. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. This book will serve as a collection of latest algorithms, technologies and legal issues of biometrics and identity management.

The primary audience for this book includes researchers, industry practitioners, graduate and research students, faculty members, technological reviewers, etc. Besides, the same would be proved to be beneficial to the government policy makers, planners, government enforcement agencies, legal personnel and business enterprise members to understand the practical aspects of next generation biometrics systems and future research directions. Further this would help them in installing and commissioning of the biometrics surveillance systems in sensitive areas where susceptible activities of malicious users have been detected. Military and defense personnel could also be potential audience of this book for understanding border control security via exploring the possibilities of various surveillance systems. The overall nature of the proposed book will attract a large number of enthusiastic people who are actively engaged in biometrics research and development across the globe. The book will be organized in self-contained chapters to provide readers a great readability and flexibility.

Recommended topics include, but are not limited to, the following:

Section-I: Biometrics and Identity Management
Section-II: Biometrics Cues and Homeland Security Artifacts
Section-III: Feature Extraction and Pattern Matching Techniques in Biometrics Systems
Section-IV: Biometrics Database Idexing Techniques, Protocols and Standards
Section-V: Security, Reliability and Performance Assessments in Biometrics Systems
Section-VI: Unimodal, Multimodal and Multi-classifiers based biometrics Systems
Section-VII: Adaptive Biometrics and Affective Computing
Section-VIII: Heterogeneous Biometrics Systems and Softbiometrics
Section-IX: Liveness Detection in Biometrics
Section-X: Biometrics Devices and Anti-Spoofing
Section-XI: Next Generation Biometrics Systems: Algorithms and Design
Section-XII: Legal and Social Aspects of Biometrics Identification

Submission Procedure

Faculty, researchers, industry practitioners and technology reviewers are invited to submit a 2 page chapter proposal on or before 30th January 2015 to mail-id: The proposal will clearly be explaining the mission and motivation of the proposed chapter. Authors of accepted proposals will be notified by 28th February 2015. Full chapters are expected to be submitted by 30th May 2015. All submitted chapters will be peer reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for the submitted chapters.


IGI Global (Approval is pending)

Inquiries and submissions can be forwarded by e-mail to:

Dr. Dakshina Ranjan Kisku
Department of Computer Science and Engineering,
NIT Durgapur,
Mahatma Gandhi Avenue, A-Zone,
Durgapur - 713209, Barddhaman, West Bengal, India

Related Resources

(Book Chapter) 2018   Call for IGI-Global Book Chapter Proposals: ‘‘Virtual Reality Techniques’’
NICDL 2018   Nature-Inspired Computation in Data Mining and Machine Learning
DSTAA 2019   Taylor and Francis - DSTAA 2019 : Call for Book Chapters - Data Science: Theory, Analysis, and Applications
EC in Scheduling 2019   Call for a WILEY book chapter proposal on Evolutionary Computation in Scheduling
Book proposals 2018   Call for book proposals: digital humanities, media and society, environmental humanities
LSDVE@EUROPAR 2018   6th Int.Workshop on Large Scale Distributed Environments
W-PSDS 2018   Workshop on Planetary-Scale Distributed Systems
IOTSTREAMING-ECML 2018   ECML/PKDD 2018 Workshop on IoT Large Scale Machine Learning from Data Streams
WORKS 2018   13th Workflows in Support of Large-Scale Science Workshop
LABELS 2018   Large-scale Annotation of Biomedical data and Expert Label Synthesis