posted by user: NDey || 3892 views || tracked by 3 users: [display]

ITSPMS 2016 : Intelligent Techniques in Signal Processing for Multimedia Security

FacebookTwitterLinkedInGoogle

Link: https://sites.google.com/site/itspms16/
 
When Jan 15, 2016 - May 15, 2016
Where India
Submission Deadline Feb 15, 2016
Categories    security   computer science
 

Call For Papers

Call for Book Chapters

Intelligent Techniques in Signal Processing for Multimedia Security

Publisher
Springer: Intelligent Systems Reference Library
http://www.springer.com/series/8578

Book Series
Studies in Computational Intelligence (SCI)
http://www.springer.com/series/7092

Indexed By
The books of this series are submitted to DBLP, Ulrichs,
SCOPUS, MathSciNet, Current Mathematical
Publications, Mathematical Reviews, Zentralblatt Math:
MetaPress and Springerlink.

Volume Editors

Nilanjan Dey, PhD.
Dept. of Information Technology, Techno India College of Technology, WestBengal, India

Santhi Vaithiyanathan, PhD.
VIT University – Vellore
School of Computing Science and Engineering, Tamil Nadu, India
--------

Introduction

Due to the advancement in sensor technology and digital hardware, signal processing find its applications in variety of disciplines. The headway in digital technology leads to easy creation of various types of signal such as audio, speech, video and images in different modalities. Similarly the advancement in computer hardware increases the rate of processing of signal to accomplish a specific task in an identified domain. Thus the technological advancement in media production and computer hardware/communications makes information processing / transmission relatively simple and quick but at the same times the rate of exposure to various threats keeps increases for multimedia data. It is a very challenging task to provide security for multimedia data due to the availability of many manipulating tools and software at a free of cost. At present, to provide security for multimedia data, various security mechanisms have been developed and being in use including cryptography, steganography and digital watermarking. Cryptographic techniques could be used to protect digital data during the transmission from the sender to the receiver but once it gets decrypted at the reception end there is no control over data in providing security further. In contrast, steganography could be used for secret communication between trusted parties with the limitation of payload and digital watermarking could be used identify the source, creator, owner, distributor or authorized consumer of multimedia data. Thus signal processing provides a major role in providing security for multimedia data.
While these are a few examples of issues, our intention in editing this book is to offer concepts of digital signal processing in combined with computational intelligence for multimedia security technologies in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of Signal processing techniques. The conceptual basis required achieving in depth knowledge in the field of signal processing and computational intelligence for security will be stressed upon. All these motivated us towards Intelligent Techniques in Signal Processing for Multimedia Security.


Objective & Scope
Our intention in editing this book is to offer concepts of computational intelligence for image and video processing in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of computational intelligence techniques in image and video processing. The conceptual basis required achieving in depth knowledge in the field of computer science and information technology will be stressed upon. All these motivated us towards computational intelligence for image and video processing.






Topics of Interest

Digital Signal Processing Theory and Practices


Classification of systems and Signals A/D conversion , D/A conversion, sampling techniques, quantization, quantization, error, Nyquist rate, aliasing effect, convolution in time domain- Impulse Response and difference equations. Basics of Laplace and Fourier transforms Z‐transform and its properties, Conversion of Laplace and Fourier into Z transform. Difference equation – Solution by z‐transform ‐ Stability analysis, frequency response – Convolution in frequency domain. DFT and its properties, Relation between DTFT and DFT, ‐ Computation of DFT using FFT by Decimation in time and Decimation in frequency algorithms- Butterfly structure for Radix2. Basics of filter Design- Butterworth and Chebyshev – Design of IIR digital filters using impulse invariance technique – Design of digital filters using bilinear transform- Warping and Pre-warping. Symmetric and Antisymmetric FIR filters – Linear phase FIR filters – Design using Hamming, Hanning and Blackmann Windows – Frequency sampling method – Realization of FIR filters – Transversal, Linear phase and Polyphase structures. Introduction to Multirate signal processing-Decimation-Interpolation-Polyphase implementation of FIR filters for interpolator and decimator -Multistage implementation of sampling rate conversion- Design of narrow band filters - Applications of Multirate signal processing.

Computational Intelligence

Neural Networks, Fuzzy Logic and Rough Sets , Tabu Search , Expert Systems, Machine Learning , Hybridization of intelligent techniques, Unsupervised Classification Strategies – clustering, Clustering Algorithms, Syntactic Pattern Classification , Nonparametric Classification. Optimization Techniques: Evolutionary Computing- Problem solving as a search task, Hill Climbing, Simulated Annealing, Evolution as an outcome of Genetic Variation plus Selection, Standard Evolutionary Algorithms, Genetics Algorithms, Parallel Genetic Programming , An Overview of Neural Networks Models, Parallel Cellular Algorithms and Programs, Firefly algorithm, Cuckoo Search, Bat Algorithms, Wolf Search Algorithm, Bacterial Foraging Behaviour and algorithm, Emerging Bacterial Inspired Algorithms, Bee Inspired Algorithms, Artificial Bee Colony Algorithm, Luminous Insect Inspired Algorithms , Fish Inspired Algorithms, Frog Inspired Algorithms. Methodology, History, and Application to Image/ Video Processing

 Real Time Security Applications

Information Hiding, Steganography, secret communication, Digital watermarking, blind watermarking, non-bind watermarking, spatial domain marketing, Frequency domain watermarking, Broadcast monitoring, Authentication, copy protection, Automatic Visual Inspection System, Surveillance system, Automatic human activity detection, Remotely Sensed Scene Interpretation, Defence Surveillance, Moving-Object Tracking System in protected premises, Data Compression for secret communication, Landmine detection, Missile Detection, Infrared Communication, Infrared Viewing Systems, Infrared Reconnaissance, Border Security, Wild Fire detection, Human face recognition for Surveillances, Home land Security, Artificial Immune System applications.




Submission Procedure
Researchers and practitioners are invited to submit a single page proposal/abstract
clearly explaining the mission and concerns of the proposed chapter.
Full chapters (of 20-30 pages) during submission should conform to the standard
guidelines of the Springer's book chapter format. For guidelines refer:
https://www.springer.com/de/authors-editors/book-authors-editors/manuscriptpreparation/
5636
Manuscripts can be prepared using Latex or MS-Words, and according to the
Springer's svmlt template that can be downloaded from the link:
http://www.springer.com/birkhauser/mathematics/download?SGWID=0-40465-0-
0-0
Submission of abstract/full-chapter can be made via the following link:
https://easychair.org/conferences/?conf=bsimi2015
All submitted chapters will be reviewed by at least two independent and expert reviewers
for quality, correctness, originality, and relevance. Contributors may also be requested to
serve as reviewers for other chapters submissions.
There are no submission or acceptance fees for manuscripts submitted to this book
Publication

Important Dates

Abstract/Proposals Submission: Feb 15th t, 2016
Full Chapter Submission: March 15th t, 2016
Decision Notification: September April 15th 2016
Authors’ Revisions & CRC Submission: April 25th , 2016

Contact Details
Nilanjan Dey, PhD.
https://sites.google.com/site/nilanjandeyprofile/
E-Mail: neelanjan.dey@gmail.com
Mb: +91-8942809380

Santhi. V, PhD.
E-Mail: vsanthinathan@gmail.com






Related Resources

ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
ICOSP 2024   2024 The 10th International Conference on Signal Processing (ICOSP 2024)
IEEE ICA 2022   The 6th IEEE International Conference on Agents
ICVISP 2024   2024 8th International Conference on Vision, Image and Signal Processing (ICVISP 2024)
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
Springer ICESP 2025   Springer--2025 6th International Conference on Electronics and Signal Processing (ICESP 2025)
SPIE-Ei/Scopus-CVCM 2024   2024 5th International Conference on Computer Vision, Communications and Multimedia (CVCM 2024) -EI Compendex
SMC 2024   8th International Conference on Soft Computing, Mathematics and Control
MMSP 2024   IEEE 26th International Workshop on Multimedia Signal Processing