posted by user: neelanjandey || 376 views || tracked by 1 users: [display]

ITSPMS 2016 : Intelligent Techniques in Signal Processing for Multimedia Security

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/itspms16/
 
When Jan 15, 2016 - May 15, 2016
Where India
Submission Deadline Feb 15, 2016
 

Call For Papers

Call for Book Chapters

Intelligent Techniques in Signal Processing for Multimedia Security

Webpage of Chapter Call https://sites.google.com/site/itspms16/

Publisher

Springer: Intelligent Systems Reference Library

Book Series

Studies in Computational Intelligence (SCI)
http://www.springer.com/series/7092

Indexed By

The books of this series are submitted to DBLP, Ulrichs,SCOPUS, MathSciNet, Current Mathematical Publications, Mathematical Reviews, Zentralblatt Math: MetaPress and Springerlink.


Volume Editors

Nilanjan Dey, PhD.

Dept. of Information Technology, Techno India College of Technology, Kolkata India


V. Santhi, PhD.

VIT University – Vellore

School of Computing Science and Engineering, Tamil Nadu Introduction

Due to the advancement in sensor technology and digital hardware, signal processing find its applications in variety of disciplines. The headway in digital technology leads to easy creation of various types of signal such as audio, speech, video and images in different modalities. Similarly the advancement in computer hardware increases the rate of processing of signal to accomplish a specific task in an identified domain. Thus the technological advancement in media production and computer hardware/communications makes information processing / transmission relatively simple and quick but at the same times the rate of exposure to various threats keeps increases for multimedia data. It is a very challenging task to provide security for multimedia data due to the availability of many manipulating tools and software at a free of cost. At present, to provide security for multimedia data, various security mechanisms have been developed and being in use including cryptography, steganography and digital watermarking. Cryptographic techniques could be used to protect digital data during the transmission from the sender to the receiver but once it gets decrypted at the reception end there is no control over data in providing security further. In contrast, steganography could be used for secret communication between trusted parties with the limitation of payload and digital watermarking could be used identify the source, creator, owner, distributor or authorized consumer of multimedia data. Thus signal processing provides a major role in providing security for multimedia data.

While these are a few examples of issues, our intention in editing this book is to offer concepts of digital signal processing in combined with computational intelligence for multimedia security technologies in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of Signal processing techniques. The conceptual basis required achieving in depth knowledge in the field of signal processing and computational intelligence for security will be stressed upon. All these motivated us towards Intelligent Techniques in Signal Processing for Multimedia Security.



Objective & Scope

Our intention in editing this book is to offer concepts of computational intelligence for image and video processing in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of computational intelligence techniques in image and video processing. The conceptual basis required achieving in depth knowledge in the field of computer science and information technology will be stressed upon. All these motivated us towards computational intelligence for image and video processing.




Topics of Interest

* Digital Signal Processing Theory and Practices

Classification of systems and Signals A/D conversion , D/A conversion, sampling techniques, quantization, quantization, error, Nyquist rate, aliasing effect, convolution in time domain- Impulse Response and difference equations. Basics of Laplace and Fourier transforms Z‐transform and its properties, Conversion of Laplace and Fourier into Z transform. Difference equation – Solution by z‐transform ‐ Stability analysis, frequency response – Convolution in frequency domain. DFT and its properties, Relation between DTFT and DFT, ‐ Computation of DFT using FFT by Decimation in time and Decimation in frequency algorithms- Butterfly structure for Radix2. Basics of filter Design- Butterworth and Chebyshev – Design of IIR digital filters using impulse invariance technique – Design of digital filters using bilinear transform- Warping and Pre-warping. Symmetric and Antisymmetric FIR filters – Linear phase FIR filters – Design using Hamming, Hanning and Blackmann Windows – Frequency sampling method – Realization of FIR filters – Transversal, Linear phase and Polyphase structures. Introduction to Multirate signal processing-Decimation-Interpolation-Polyphase implementation of FIR filters for interpolator and decimator -Multistage implementation of sampling rate conversion- Design of narrow band filters - Applications of Multirate signal processing.

* Computational Intelligence

Neural Networks, Fuzzy Logic and Rough Sets , Tabu Search , Expert Systems, Machine Learning , Hybridization of intelligent techniques, Unsupervised Classification Strategies – clustering, Clustering Algorithms, Syntactic Pattern Classification , Nonparametric Classification. Optimization Techniques: Evolutionary Computing- Problem solving as a search task, Hill Climbing, Simulated Annealing, Evolution as an outcome of Genetic Variation plus Selection, Standard Evolutionary Algorithms, Genetics Algorithms, Parallel Genetic Programming , An Overview of Neural Networks Models, Parallel Cellular Algorithms and Programs, Firefly algorithm, Cuckoo Search, Bat Algorithms, Wolf Search Algorithm, Bacterial Foraging Behaviour and algorithm, Emerging Bacterial Inspired Algorithms, Bee Inspired Algorithms, Artificial Bee Colony Algorithm, Luminous Insect Inspired Algorithms , Fish Inspired Algorithms, Frog Inspired Algorithms. Methodology, History, and Application to Image/ Video Processing



* Real Time Security Applications

Information Hiding, Steganography, secret communication, Digital watermarking, blind watermarking, non-bind watermarking, spatial domain marketing, Frequency domain watermarking, Broadcast monitoring, Authentication, copy protection, Automatic Visual Inspection System, Surveillance system, Automatic human activity detection, Remotely Sensed Scene Interpretation, Defence Surveillance, Moving-Object Tracking System in protected premises, Data Compression for secret communication, Landmine detection, Missile Detection, Infrared Communication, Infrared Viewing Systems, Infrared Reconnaissance, Border Security, Wild Fire detection, Human face recognition for Surveillances, Home land Security, Artificial Immune System applications.

Submission Procedure

Researchers and practitioners are invited to submit a single page proposal/abstract

clearly explaining the mission and concerns of the proposed chapter.

Full chapters (of 20-30 pages) during submission should conform to the standard

guidelines of the Springer's book chapter format. For guidelines refer:

https://www.springer.com/de/authors-editors/book-authors-editors/manuscriptpreparation/

5636

Manuscripts can be prepared using Latex or MS-Words, and according to the

Springer's svmlt template that can be downloaded from the link:

http://www.springer.com/birkhauser/mathematics/download?SGWID=0-40465-0-

0-0

Submission of abstract/full-chapter can be made via the following link:

https://easychair.org/conferences/?conf=itspms16

All submitted chapters will be reviewed by at least two independent and expert reviewers

for quality, correctness, originality, and relevance. Contributors may also be requested to

serve as reviewers for other chapters submissions.

There are no submission or acceptance fees for manuscripts submitted to this book

Publication



Important Dates

Abstract/Proposals Submission: Feb 15th, 2015

Full Chapter Submission: March 15th, 2015

Decision Notification: September April 15th 2015

Authors’ Revisions & CRC Submission: April 25th , 2015



Contact Details

Nilanjan Dey, PhD.

https://sites.google.com/site/nilanjandeyprofile/

E-Mail: neelanjan.dey@gmail.com




x

Related Resources

APSIPA ASC 2024   APSIPA ASC 2024 : Asia-Pacific Signal and Information Processing Association Annual Summit and Conference
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ICVISP 2024   2024 8th International Conference on Vision, Image and Signal Processing (ICVISP 2024)
Ei/Scopus-ACCMI 2024   2024 2nd Asia Conference on Automation, Cloud Computing and Machine Intelligence (ACCMI 2024)
SOMET 2025   24th International Conference on Intelligent Software Methodologies Tools and Techniques
SPIE-Ei/Scopus-CVCM 2024   2024 5th International Conference on Computer Vision, Communications and Multimedia (CVCM 2024) -EI Compendex
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Springer ICESP 2025   Springer--2025 6th International Conference on Electronics and Signal Processing (ICESP 2025)
Ei/Scopus-SPCVA 2024   2024 2nd Asia Conference on Signal Processing, Computer Vision and Applications (SPCVA 2024) - EI Compendex