posted by user: drkisku || 9973 views || tracked by 7 users: [display]

Call for Book Chapters 2015 : Handbook of Research on Identity Management and Authentication for Homeland Security

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/1569
 
When Jan 15, 2015 - Sep 30, 2015
Where India
Submission Deadline Jan 15, 2015
Notification Due Mar 30, 2015
Final Version Due May 30, 2015
Categories    biometrics   computer vision   image processing   pattern classification
 

Call For Papers

Editors
Dr. Dakshina Ranjan Kisku (National Institute of Technology Durgapur (NITDGP), India)
Dr. Phalguni Gupta (National Institute of Technical Teachers Training and Research (NITTTR), India)
Dr. Jamuna Kanta Sing (Jadavpur University, India)
Dr. Weifeng Li (Tsinghua University, China)

Call for Chapters
Proposals Submission Deadline: April 23, 2015
Full Chapters Due: May 30, 2015

Introduction
For release in Advances in Information Security, Privacy, and Ethics (AISPE) book series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.

* * *

In recent years, identity management via biometrics evidences has become an emerging and alternative way of identity verification practices besides the available knowledge-based and possession-based identity artifacts. Homeland security addresses the critical and diverse problems of human identification in the field of border control security and internal security aspects. Utilizing the latest technologies and best security practices in government and private agencies for identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by each person. This does not require any other means of possession-based and knowledge-based identification substances or tokens that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of this situation through unauthorized entry into the highly secured places. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. This book will serve as a collection of latest algorithms, technologies and legal issues of biometrics and identity management.

Objective
The books which are currently available to the biometrics community mostly deal with unimodal and multimodal biometrics systems in general. These books are tried to present feature extraction, pattern matching and fusion techniques which are very common computational steps in biometrics systems. Although they contain structural and systematic descriptions about biometrics systems, the adaptive biometrics and affective computing based next generation biometrics systems are not discussed as improved and cutting-edge human recognition systems. Therefore, there is a lack of biometrics systems which could involve latest algorithms on action unit recognition, adaptive techniques, heterogeneous characteristics, anti-spoofing features, etc. On the use of novel machine vision and learning algorithms in the various phases of development of newly adopted biometrics systems, a marginal structural gap has evolved and slowly been detected between general purpose biometrics systems and next generation biometric systems in terms of complexity and types of application areas. In order to minimize the gap, researchers are currently engaged in developing robust algorithms for hybrid biometrics systems which are found to be the perfect blend of conventional vision techniques as well as newly developed affective computing techniques.

This book will cover not only the conventional biometric techniques and approaches, but it will also cover the most up-to-date and recently developed biometrics systems which are developed in the last five years. The book will be divided into several sections. Each of these sections will include a few chapters on a particular topic or related topic on biometrics. In addition, comprehensive graphical and modular illustrations will make each one of these chapters excellent readability for the target audience. We will also add some important chapters which are not available in the recently published books on biometrics. These invited chapters will be on completely new topics. Examples of these new topics include applications of effective computing in biometrics, heterogeneous approaches in biometrics, cryptography approaches in biometrics, biometrics alteration, age invariant biometrics, anti-spoofing, template update approaches, tattoo recognition, avatar recognition, etc. Hope, this book will be an exciting project in the end.

Target Audience
This book will be helpful to the biometrics community which includes researchers, industry practitioners, graduate and research students, faculty members, etc. The same would be proved to be beneficial to the government policy makers, planners, government enforcement agencies, legal personnel and business enterprise members to understand the practical aspects of next generation biometrics systems and future research directions. Further this will help them in installing and commissioning of the biometrics surveillance systems in sensitive areas where susceptible activities of malicious users have been detected. Military and defense personnel could also be targeted as potential audience for understanding border control security via exploring the possibilities of various surveillance systems. The overall nature of the proposed book will attract a large number of enthusiastic people who are actively related with biometrics research and development across the globe.

Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to:

Face, fingerprint, palmprint, iris, ear, vein, signature, footprint, etc.
Unimodal and multimodal biometrics
Multi-classifiers based biometric systems
Template updatation
Liveness detection in biometrics
Biometrics Cues and Homeland Security Artifacts
Biometrics and Identity Management
Feature Extraction in Biometrics Systems
Biometrics pattern matching techniques
Biometrics database indexing techniques, protocols and standards
Security, reliability and performance assessments in biometric systems
Virtual biometrics
Adaptive biometrics
Human action based biometric systems
Affective computing and biometrics
Heterogeneous biometrics
Soft biometrics
Biometrics devices and anti-spoofing methods
Cloud based biometrics
Biometrics cryptosystems
Environment based biometric systems
Cohort selection in biometrics
Gender, race, age detection from biometric evidences
Fusions in biometrics: sensor, feature, score, rank and decision levels
Biometrics identity verification with mobile phones
Measuring entropy of biometric templates
Fusion methods for big data in biometrics
Biometrics data for forensic applications
Mixture biometric templates
Quality checking of biometric cues
Combining geo-spatial and biometric data
Next generation biometrics systems: algorithms and design
Legal and social aspects of biometric identification

Submission Procedure
Researchers and practitioners are invited to submit on or before January 15, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March 30, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Identity Management and Authentication for Homeland Security. All manuscripts are accepted based on a double-blind peer review editorial process.

Full chapters may be submitted to this book here: Submit a Chapter

All proposals should be submitted through the "Propose a Chapter" link at the bottom of this page.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.

Important Dates
April 23, 2015: Proposal Submission Deadline
April 30, 2015: Notification of Acceptance
May 30, 2015: Full Chapter Submission
July 30, 2015: Review Results Returned
August 30, 2015: Revised Chapter Submission
September 15, 2015: Final Acceptance Notification
September 30, 2015: Final Chapter Submission

Editorial Advisory Board
Phalguni Gupta, NITTTR Kolkata, India
Jamuna Kanta Sing, Jadavpur University, India
Weifeng LI, Tsinghua University, China
Goutam Sanyal, NIT Durgapur, India
C. Chandra Sekhar, IIT Madras, India
Tandra Pal, NIT Durgapur, India
Karm Veer Arya, ABV – IIITM, India
Arnab Bhattacharyya, IIT Kanpur, India
Satish Kumar Singh, IIIT – Allahabad, India
Bibhas Chandra Dhara, Jadavpur University, India
Dakshina Ranjan Kisku, NIT Durgapur, India

Inquiries
Dr. Dakshina Ranjan Kisku
Department of Computer Science and Engineering,
National Institute of Technology Durgapur (NITDGP),
Durgapur - 713209, Bardhaman, West Bengal, India
Email: drkisku@gmail.com / drkisku@cse.nitdgp.ac.in
Phone: +91-9732111234

Related Resources

Call for Chapters - CRC Press 2024   Internet of Things: Challenges and Advances
ECAI 2024   27th European Conference on Artificial Intelligence
Cyberpunk and Digital Rebellion of AI 2024   Call for Book Chapters for the Edited Volume: Interdisciplinary Studies on German Philology: Cyberpunk and Digital Rebellion of AI
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
Call for Book Chapter 2024   Call for Chapters for Four Books of the Springer Edited Book Series “Decision Sciences and Data Analytics for Operations and Business Excellence”
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
Call for Chapters - Wiley-IEEE Press 2025   Internet of Things A to Z: Technologies and Applications - Second Edition
CCVPR 2024   2024 International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2024)
ECMLG 2024   20th European Conference on Management Leadership and Governance
CVIPPR 2024   2024 2nd Asia Conference on Computer Vision, Image Processing and Pattern Recognition