posted by user: NDey || 1350 views || tracked by 4 users: [display]

ITSPMS 2016 : Intelligent Techniques in Signal Processing for Multimedia Security


When Jan 15, 2016 - May 15, 2016
Where India
Submission Deadline Feb 15, 2016
Categories    security   computer science

Call For Papers

Call for Book Chapters

Intelligent Techniques in Signal Processing for Multimedia Security

Springer: Intelligent Systems Reference Library

Book Series
Studies in Computational Intelligence (SCI)

Indexed By
The books of this series are submitted to DBLP, Ulrichs,
SCOPUS, MathSciNet, Current Mathematical
Publications, Mathematical Reviews, Zentralblatt Math:
MetaPress and Springerlink.

Volume Editors

Nilanjan Dey, PhD.
Dept. of Information Technology, Techno India College of Technology, WestBengal, India

Santhi Vaithiyanathan, PhD.
VIT University – Vellore
School of Computing Science and Engineering, Tamil Nadu, India


Due to the advancement in sensor technology and digital hardware, signal processing find its applications in variety of disciplines. The headway in digital technology leads to easy creation of various types of signal such as audio, speech, video and images in different modalities. Similarly the advancement in computer hardware increases the rate of processing of signal to accomplish a specific task in an identified domain. Thus the technological advancement in media production and computer hardware/communications makes information processing / transmission relatively simple and quick but at the same times the rate of exposure to various threats keeps increases for multimedia data. It is a very challenging task to provide security for multimedia data due to the availability of many manipulating tools and software at a free of cost. At present, to provide security for multimedia data, various security mechanisms have been developed and being in use including cryptography, steganography and digital watermarking. Cryptographic techniques could be used to protect digital data during the transmission from the sender to the receiver but once it gets decrypted at the reception end there is no control over data in providing security further. In contrast, steganography could be used for secret communication between trusted parties with the limitation of payload and digital watermarking could be used identify the source, creator, owner, distributor or authorized consumer of multimedia data. Thus signal processing provides a major role in providing security for multimedia data.
While these are a few examples of issues, our intention in editing this book is to offer concepts of digital signal processing in combined with computational intelligence for multimedia security technologies in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of Signal processing techniques. The conceptual basis required achieving in depth knowledge in the field of signal processing and computational intelligence for security will be stressed upon. All these motivated us towards Intelligent Techniques in Signal Processing for Multimedia Security.

Objective & Scope
Our intention in editing this book is to offer concepts of computational intelligence for image and video processing in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of computational intelligence techniques in image and video processing. The conceptual basis required achieving in depth knowledge in the field of computer science and information technology will be stressed upon. All these motivated us towards computational intelligence for image and video processing.

Topics of Interest

Digital Signal Processing Theory and Practices

Classification of systems and Signals A/D conversion , D/A conversion, sampling techniques, quantization, quantization, error, Nyquist rate, aliasing effect, convolution in time domain- Impulse Response and difference equations. Basics of Laplace and Fourier transforms Z‐transform and its properties, Conversion of Laplace and Fourier into Z transform. Difference equation – Solution by z‐transform ‐ Stability analysis, frequency response – Convolution in frequency domain. DFT and its properties, Relation between DTFT and DFT, ‐ Computation of DFT using FFT by Decimation in time and Decimation in frequency algorithms- Butterfly structure for Radix2. Basics of filter Design- Butterworth and Chebyshev – Design of IIR digital filters using impulse invariance technique – Design of digital filters using bilinear transform- Warping and Pre-warping. Symmetric and Antisymmetric FIR filters – Linear phase FIR filters – Design using Hamming, Hanning and Blackmann Windows – Frequency sampling method – Realization of FIR filters – Transversal, Linear phase and Polyphase structures. Introduction to Multirate signal processing-Decimation-Interpolation-Polyphase implementation of FIR filters for interpolator and decimator -Multistage implementation of sampling rate conversion- Design of narrow band filters - Applications of Multirate signal processing.

Computational Intelligence

Neural Networks, Fuzzy Logic and Rough Sets , Tabu Search , Expert Systems, Machine Learning , Hybridization of intelligent techniques, Unsupervised Classification Strategies – clustering, Clustering Algorithms, Syntactic Pattern Classification , Nonparametric Classification. Optimization Techniques: Evolutionary Computing- Problem solving as a search task, Hill Climbing, Simulated Annealing, Evolution as an outcome of Genetic Variation plus Selection, Standard Evolutionary Algorithms, Genetics Algorithms, Parallel Genetic Programming , An Overview of Neural Networks Models, Parallel Cellular Algorithms and Programs, Firefly algorithm, Cuckoo Search, Bat Algorithms, Wolf Search Algorithm, Bacterial Foraging Behaviour and algorithm, Emerging Bacterial Inspired Algorithms, Bee Inspired Algorithms, Artificial Bee Colony Algorithm, Luminous Insect Inspired Algorithms , Fish Inspired Algorithms, Frog Inspired Algorithms. Methodology, History, and Application to Image/ Video Processing

 Real Time Security Applications

Information Hiding, Steganography, secret communication, Digital watermarking, blind watermarking, non-bind watermarking, spatial domain marketing, Frequency domain watermarking, Broadcast monitoring, Authentication, copy protection, Automatic Visual Inspection System, Surveillance system, Automatic human activity detection, Remotely Sensed Scene Interpretation, Defence Surveillance, Moving-Object Tracking System in protected premises, Data Compression for secret communication, Landmine detection, Missile Detection, Infrared Communication, Infrared Viewing Systems, Infrared Reconnaissance, Border Security, Wild Fire detection, Human face recognition for Surveillances, Home land Security, Artificial Immune System applications.

Submission Procedure
Researchers and practitioners are invited to submit a single page proposal/abstract
clearly explaining the mission and concerns of the proposed chapter.
Full chapters (of 20-30 pages) during submission should conform to the standard
guidelines of the Springer's book chapter format. For guidelines refer:
Manuscripts can be prepared using Latex or MS-Words, and according to the
Springer's svmlt template that can be downloaded from the link:
Submission of abstract/full-chapter can be made via the following link:
All submitted chapters will be reviewed by at least two independent and expert reviewers
for quality, correctness, originality, and relevance. Contributors may also be requested to
serve as reviewers for other chapters submissions.
There are no submission or acceptance fees for manuscripts submitted to this book

Important Dates

Abstract/Proposals Submission: Feb 15th t, 2016
Full Chapter Submission: March 15th t, 2016
Decision Notification: September April 15th 2016
Authors’ Revisions & CRC Submission: April 25th , 2016

Contact Details
Nilanjan Dey, PhD.
Mb: +91-8942809380

Santhi. V, PhD.

Related Resources

MMSP 2017   Multimedia Signal Processing
ICML 2017   34th International Conference on Machine Learning
QoMEX 2017   Quality of Multimedia Experience
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ICSIP-IEEE 2017   2nd International Conference on Signal and Image Processing - IEEE
ICCV 2017   International Conference on Computer Vision
ICWOC 2017   5th International Conference on Wireless and Optical Communications-Scopus, Ei Compendex
IJE 2016   International Journal of Education
ICGSP-Ei 2017   2017 International Conference on Graphics and Signal Processing (ICGSP 2017) -- EI &Scopus
ICMBN 2017   2017 International Conference on Multimedia, Broadcasting and Network (ICMBN 2017)--Ei, Scopus