posted by system || 6146 views || tracked by 3 users: [display]

Call for Book Chapters: Bio-CIM 2015 : Large Scale Integration of Biometrics Cues In Identity Management for Homeland Security and Business Media


When Jan 30, 2015 - Oct 30, 2015
Where Durgapur, India
Abstract Registration Due Jan 31, 2015
Submission Deadline May 30, 2015
Notification Due Jul 30, 2015
Final Version Due Aug 30, 2015

Call For Papers

Call for Book Chapters

Large Scale Integration of Biometrics Cues In Identity Management for Homeland Security and Business Media (Bio-CIM 2015)

To be published by IGI Global (Approval is pending)

Volume Editors:

Dakshina Ranjan Kisku, NIT Durgapur, India
Phalguni Gupta, NITTTR Kolkata, India
Jamuna Kanta Sing, Jadavpur University, India

Aims and Objectives:

In recent years, identity management via biometrics evidences has been emerged as a strong and best alternative identity verification practices besides the available knowledge-based and possession-based identity practices. Homeland security issues address the critical and diverse problems of human identification in the field of border control security and intra-nation security aspects. Utilizing the latest technologies and best security practices in government and private agencies for Identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by the person. This does not require any other means of possession-based and knowledge-based identification substance or token that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of it through unauthorized entry to the security zones. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. This book will serve as a collection of latest algorithms, technologies and legal issues of biometrics and identity management.

The primary audience for this book includes researchers, industry practitioners, graduate and research students, faculty members, technological reviewers, etc. Besides, the same would be proved to be beneficial to the government policy makers, planners, government enforcement agencies, legal personnel and business enterprise members to understand the practical aspects of next generation biometrics systems and future research directions. Further this would help them in installing and commissioning of the biometrics surveillance systems in sensitive areas where susceptible activities of malicious users have been detected. Military and defense personnel could also be potential audience of this book for understanding border control security via exploring the possibilities of various surveillance systems. The overall nature of the proposed book will attract a large number of enthusiastic people who are actively engaged in biometrics research and development across the globe. The book will be organized in self-contained chapters to provide readers a great readability and flexibility.

Recommended topics include, but are not limited to, the following:

Section-I: Biometrics and Identity Management
Section-II: Biometrics Cues and Homeland Security Artifacts
Section-III: Feature Extraction and Pattern Matching Techniques in Biometrics Systems
Section-IV: Biometrics Database Idexing Techniques, Protocols and Standards
Section-V: Security, Reliability and Performance Assessments in Biometrics Systems
Section-VI: Unimodal, Multimodal and Multi-classifiers based biometrics Systems
Section-VII: Adaptive Biometrics and Affective Computing
Section-VIII: Heterogeneous Biometrics Systems and Softbiometrics
Section-IX: Liveness Detection in Biometrics
Section-X: Biometrics Devices and Anti-Spoofing
Section-XI: Next Generation Biometrics Systems: Algorithms and Design
Section-XII: Legal and Social Aspects of Biometrics Identification

Submission Procedure

Faculty, researchers, industry practitioners and technology reviewers are invited to submit a 2 page chapter proposal on or before 30th January 2015 to mail-id: The proposal will clearly be explaining the mission and motivation of the proposed chapter. Authors of accepted proposals will be notified by 28th February 2015. Full chapters are expected to be submitted by 30th May 2015. All submitted chapters will be peer reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for the submitted chapters.


IGI Global (Approval is pending)

Inquiries and submissions can be forwarded by e-mail to:

Dr. Dakshina Ranjan Kisku
Department of Computer Science and Engineering,
NIT Durgapur,
Mahatma Gandhi Avenue, A-Zone,
Durgapur - 713209, Barddhaman, West Bengal, India

Related Resources

VLDB 2016   42nd international conference on very large data bases
ci4bigdata 2016   IEEE Computational Intelligence Magazine (IEEE CIM) special issue on Computational Intelligence for Big Social Data Analysis
AKM 2017   Call for Book Chapters: Analytics and Knowledge Management (Taylor & Francis Group)
Gender and Archaeology in Pop Culture 2016   Call for Book Chapters: Gender and Archaeology in Popular Culture
Call for book chapters ASCMLIP 2017   Advances in Soft Computing and Machine Learning in Image Processing (Springer)
WORKS 2016   11th Workflows in Support of Large-Scale Science (WORKS) Workshop
LSTS @ KDD 2016   Machine Learning for Large Scale Transportation Systems
RecSysLSSN 2016   Special Issue on Recommender Systems for Large-Scale Social Networks
WIW 2016   15th International Workshop on Large-Scale Integration of Wind Power into Power Systems as well as on Transmission Networks for Offshore Wind Power Plants
VECPAR 2016   High Performance Computing for Computational Science