Call for Book Chapters 2015 : Handbook of Research on Identity Management and Authentication for Homeland Security
Call For Papers
Dr. Dakshina Ranjan Kisku (National Institute of Technology Durgapur (NITDGP), India)
Dr. Phalguni Gupta (National Institute of Technical Teachers Training and Research (NITTTR), India)
Dr. Jamuna Kanta Sing (Jadavpur University, India)
Dr. Weifeng Li (Tsinghua University, China)
Call for Chapters
Proposals Submission Deadline: April 23, 2015
Full Chapters Due: May 30, 2015
For release in Advances in Information Security, Privacy, and Ethics (AISPE) book series.
The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.
* * *
In recent years, identity management via biometrics evidences has become an emerging and alternative way of identity verification practices besides the available knowledge-based and possession-based identity artifacts. Homeland security addresses the critical and diverse problems of human identification in the field of border control security and internal security aspects. Utilizing the latest technologies and best security practices in government and private agencies for identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by each person. This does not require any other means of possession-based and knowledge-based identification substances or tokens that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of this situation through unauthorized entry into the highly secured places. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. This book will serve as a collection of latest algorithms, technologies and legal issues of biometrics and identity management.
The books which are currently available to the biometrics community mostly deal with unimodal and multimodal biometrics systems in general. These books are tried to present feature extraction, pattern matching and fusion techniques which are very common computational steps in biometrics systems. Although they contain structural and systematic descriptions about biometrics systems, the adaptive biometrics and affective computing based next generation biometrics systems are not discussed as improved and cutting-edge human recognition systems. Therefore, there is a lack of biometrics systems which could involve latest algorithms on action unit recognition, adaptive techniques, heterogeneous characteristics, anti-spoofing features, etc. On the use of novel machine vision and learning algorithms in the various phases of development of newly adopted biometrics systems, a marginal structural gap has evolved and slowly been detected between general purpose biometrics systems and next generation biometric systems in terms of complexity and types of application areas. In order to minimize the gap, researchers are currently engaged in developing robust algorithms for hybrid biometrics systems which are found to be the perfect blend of conventional vision techniques as well as newly developed affective computing techniques.
This book will cover not only the conventional biometric techniques and approaches, but it will also cover the most up-to-date and recently developed biometrics systems which are developed in the last five years. The book will be divided into several sections. Each of these sections will include a few chapters on a particular topic or related topic on biometrics. In addition, comprehensive graphical and modular illustrations will make each one of these chapters excellent readability for the target audience. We will also add some important chapters which are not available in the recently published books on biometrics. These invited chapters will be on completely new topics. Examples of these new topics include applications of effective computing in biometrics, heterogeneous approaches in biometrics, cryptography approaches in biometrics, biometrics alteration, age invariant biometrics, anti-spoofing, template update approaches, tattoo recognition, avatar recognition, etc. Hope, this book will be an exciting project in the end.
This book will be helpful to the biometrics community which includes researchers, industry practitioners, graduate and research students, faculty members, etc. The same would be proved to be beneficial to the government policy makers, planners, government enforcement agencies, legal personnel and business enterprise members to understand the practical aspects of next generation biometrics systems and future research directions. Further this will help them in installing and commissioning of the biometrics surveillance systems in sensitive areas where susceptible activities of malicious users have been detected. Military and defense personnel could also be targeted as potential audience for understanding border control security via exploring the possibilities of various surveillance systems. The overall nature of the proposed book will attract a large number of enthusiastic people who are actively related with biometrics research and development across the globe.
Contributors are welcome to submit chapters on the following topics relating to:
Face, fingerprint, palmprint, iris, ear, vein, signature, footprint, etc.
Unimodal and multimodal biometrics
Multi-classifiers based biometric systems
Liveness detection in biometrics
Biometrics Cues and Homeland Security Artifacts
Biometrics and Identity Management
Feature Extraction in Biometrics Systems
Biometrics pattern matching techniques
Biometrics database indexing techniques, protocols and standards
Security, reliability and performance assessments in biometric systems
Human action based biometric systems
Affective computing and biometrics
Biometrics devices and anti-spoofing methods
Cloud based biometrics
Environment based biometric systems
Cohort selection in biometrics
Gender, race, age detection from biometric evidences
Fusions in biometrics: sensor, feature, score, rank and decision levels
Biometrics identity verification with mobile phones
Measuring entropy of biometric templates
Fusion methods for big data in biometrics
Biometrics data for forensic applications
Mixture biometric templates
Quality checking of biometric cues
Combining geo-spatial and biometric data
Next generation biometrics systems: algorithms and design
Legal and social aspects of biometric identification
Researchers and practitioners are invited to submit on or before January 15, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March 30, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Identity Management and Authentication for Homeland Security. All manuscripts are accepted based on a double-blind peer review editorial process.
Full chapters may be submitted to this book here: Submit a Chapter
All proposals should be submitted through the "Propose a Chapter" link at the bottom of this page.
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.
April 23, 2015: Proposal Submission Deadline
April 30, 2015: Notification of Acceptance
May 30, 2015: Full Chapter Submission
July 30, 2015: Review Results Returned
August 30, 2015: Revised Chapter Submission
September 15, 2015: Final Acceptance Notification
September 30, 2015: Final Chapter Submission
Editorial Advisory Board
Phalguni Gupta, NITTTR Kolkata, India
Jamuna Kanta Sing, Jadavpur University, India
Weifeng LI, Tsinghua University, China
Goutam Sanyal, NIT Durgapur, India
C. Chandra Sekhar, IIT Madras, India
Tandra Pal, NIT Durgapur, India
Karm Veer Arya, ABV – IIITM, India
Arnab Bhattacharyya, IIT Kanpur, India
Satish Kumar Singh, IIIT – Allahabad, India
Bibhas Chandra Dhara, Jadavpur University, India
Dakshina Ranjan Kisku, NIT Durgapur, India
Dr. Dakshina Ranjan Kisku
Department of Computer Science and Engineering,
National Institute of Technology Durgapur (NITDGP),
Durgapur - 713209, Bardhaman, West Bengal, India
Email: firstname.lastname@example.org / email@example.com