posted by user: ABDULLAH || 6494 views || tracked by 12 users: [display]

IJVIPNS 2009 : International Journal of Video & Image Processing and Network Security

FacebookTwitterLinkedInGoogle

Link: http://www.ijens.org
 
When N/A
Where N/A
Submission Deadline Nov 15, 2009
Notification Due Nov 30, 2009
Final Version Due Dec 5, 2009
Categories    video   image processing   computer networks   security
 

Call For Papers

The scope of International Journal of Video & Image Processing and Network Security extends, but not limited to the following:

Digital signal processing

Image processing

Digital signal processing

Video coding techniques

Signals and systems

Medical signal processing

Artificial intelligence

Pattern recognition

Document processing

Natural language processing

Expert systems

Speech recognition

Detection and estimation theory

Information and coding theory

Wireless communications

Probability theory and stochastic processes

Ergodic theory

Large deviation theory

Detection theory- robust detection

DSP architectures

Application of ANN, Evolutionary algorithm, Fuzzy logic

Architecture of imaging and vision systems

Autonomous vehicles

Character and handwritten text recognition

Chemical and spectral sensitization

Chemistry of photosensitive materials

Coating technologiesPhysics and chemistry of AgX

Coding and transmission

Cognitive aspects of image understanding

Color imaging

Communication of visual data

Data fusion from multiple sensor inputs

Display and printing

Document image understanding

Generation and display

Holography

Image analysis and interpretation

Image capturing

Image databases

Image generation

Image manipulation

Image permanence

Image processing

Image processing applications

Image processing: coding analysis and recognition

Image representation

Image sensing

Imaging systems and image scanning

Implementation and architectures

Latent image

Materials for electro-photography

Monitoring and surveillance

Network architecture for real-time video transport

New visual services over ATM/packet network

Non-impact printing technologies

Object modeling and knowledge acquisition

Photoconductors

Photographic emulsions

Photopolymers

Prepress and printing technologies

Processing and analysis

Protocols for packet video

Remote image sensing

Retrieval and multimedia

Scene modeling

Signal-processing aspects of image processing

Storage and transmission

Video coding algorithms and technologies for ATM/p

Visual inspection

Active vision and robotic systems

Bioinformatics

Communications and data security

Anonymity

Anonymity and pseudonymity

Attacks, security mechanisms, and security service

Authentication

Authorisation

Biometrics

Cellular/wireless/mobile/satellite networks securi

Code security, including mobile code security

Computer forensics

Confidentiality, privacy, integrity, authenticatio

Cryptography and cryptanalysis

Data confidentiality issues

Data integrity issues

Data recovery

Database security

Denial of service

Denial of service attacks and countermeasures

Dependability and reliability

Design or analysis of security protocols

Distributed access control

Distributed and parallel systems security

Electronic commerce

Formal security analyses

Fraudulent usage

Information flow

Information hiding and watermarking

Intellectual property protection

Intrusion detection

Key management

Multicast security

Network and Internet security

Network forensics

Network security performance evaluation

Non-repudiation

Peer-to-peer security

Prevention of traffic analysis

Privacy protection

Public key cryptography and key management

Revocation of malicious parties

Risk assessment and management

Secure location determination

Secure PHY/MAC/routing protocols

Secure routing protocols

Security group communications

Security in ad hoc networks

Security in cellular networks (2G, 2.5G, 3G, B3G,

Security in communications

Security in content-delivery networks

Security in distributed systems

Security in domain name service

Security in e-mail

Security in high-speed networks

Security in integrated networks

Security in integrated wireless networks

Security in internet and WWW

Security in IP networks

Security in mobile IP

Security in optical systems and networks

Security in peer-to-peer networks

Security in satellite networks

Security in sensor networks

Security in VoIP

Security in wired and wireless integrated networks

Security in Wired Networks

Security in wireless communications

Security in wireless internet

Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

Security in wireless MANs (IEEE 802.16 and WiMAX)

Security in wireless PANs (Bluetooth and IEEE 802.

Security policies

Security specification techniques

Security standards

Tradeoff analysis between performance and security

Trust establishment

Viruses worms and other malicious code

WLAN and Bluetooth security

Computer Networks

Access control and audit

Computer security

Ad-Hoc, Mobile, Wireless Networks and Mobile Computings

Quantum Computing, Coding, and Error Controls

Agent Computings & Multi-Agents Systems

Defining Spectrum Rights and Open Spectrum Solutions

Quality of Services and Communication Protocols

Satelite and Optical Communication System

OTHERS

Call for Papers (Due: November 15, 2009)

Publication Date: December 10, 2009

Related Resources

ICIP 2019   International Conference on Image Processing
CAIP 2019   Computer Analysis of Images and Patterns
SIGNAL 2019   The Fourth International Conference on Advances in Signal, Image and Video Processing
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
ACNS 2019   International Conference on Applied Cryptography and Network Security
DSN 2019   Dependable Systems and Networks
IEEE S&P 2019   IEEE Symposium on Security and Privacy
IEEE--ICSIP--Ei Compendex and Scopus 2019   2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP 2019)--Ei Compendex and Scopus
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11