posted by user: drkisku || 10431 views || tracked by 7 users: [display]

Call for Book Chapters 2015 : Handbook of Research on Identity Management and Authentication for Homeland Security

FacebookTwitterLinkedInGoogle

Link: http://www.igi-global.com/publish/call-for-papers/call-details/1569
 
When Jan 15, 2015 - Sep 30, 2015
Where India
Submission Deadline Apr 23, 2015
Notification Due Apr 30, 2015
Final Version Due May 30, 2015
Categories    biometrics   computer vision   image processing   pattern classification
 

Call For Papers

Editors
Dr. Dakshina Ranjan Kisku (National Institute of Technology Durgapur (NITDGP), India)
Dr. Phalguni Gupta (National Institute of Technical Teachers Training and Research (NITTTR), India)
Dr. Jamuna Kanta Sing (Jadavpur University, India)
Dr. Weifeng Li (Tsinghua University, China)

Call for Chapters
Proposals Submission Deadline: April 23, 2015
Full Chapters Due: May 30, 2015

Introduction
For release in Advances in Information Security, Privacy, and Ethics (AISPE) book series.

ISSN: 1948-9730

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.

* * *

In recent years, identity management via biometrics evidences has become an emerging and alternative way of identity verification practices besides the available knowledge-based and possession-based identity artifacts. Homeland security addresses the critical and diverse problems of human identification in the field of border control security and internal security aspects. Utilizing the latest technologies and best security practices in government and private agencies for identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by each person. This does not require any other means of possession-based and knowledge-based identification substances or tokens that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of this situation through unauthorized entry into the highly secured places. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. This book will serve as a collection of latest algorithms, technologies and legal issues of biometrics and identity management.

Objective
The books which are currently available to the biometrics community mostly deal with unimodal and multimodal biometrics systems in general. These books are tried to present feature extraction, pattern matching and fusion techniques which are very common computational steps in biometrics systems. Although they contain structural and systematic descriptions about biometrics systems, the adaptive biometrics and affective computing based next generation biometrics systems are not discussed as improved and cutting-edge human recognition systems. Therefore, there is a lack of biometrics systems which could involve latest algorithms on action unit recognition, adaptive techniques, heterogeneous characteristics, anti-spoofing features, etc. On the use of novel machine vision and learning algorithms in the various phases of development of newly adopted biometrics systems, a marginal structural gap has evolved and slowly been detected between general purpose biometrics systems and next generation biometric systems in terms of complexity and types of application areas. In order to minimize the gap, researchers are currently engaged in developing robust algorithms for hybrid biometrics systems which are found to be the perfect blend of conventional vision techniques as well as newly developed affective computing techniques.

This book will cover not only the conventional biometric techniques and approaches, but it will also cover the most up-to-date and recently developed biometrics systems which are developed in the last five years. The book will be divided into several sections. Each of these sections will include a few chapters on a particular topic or related topic on biometrics. In addition, comprehensive graphical and modular illustrations will make each one of these chapters excellent readability for the target audience. We will also add some important chapters which are not available in the recently published books on biometrics. These invited chapters will be on completely new topics. Examples of these new topics include applications of effective computing in biometrics, heterogeneous approaches in biometrics, cryptography approaches in biometrics, biometrics alteration, age invariant biometrics, anti-spoofing, template update approaches, tattoo recognition, avatar recognition, etc. Hope, this book will be an exciting project in the end.

Target Audience
This book will be helpful to the biometrics community which includes researchers, industry practitioners, graduate and research students, faculty members, etc. The same would be proved to be beneficial to the government policy makers, planners, government enforcement agencies, legal personnel and business enterprise members to understand the practical aspects of next generation biometrics systems and future research directions. Further this will help them in installing and commissioning of the biometrics surveillance systems in sensitive areas where susceptible activities of malicious users have been detected. Military and defense personnel could also be targeted as potential audience for understanding border control security via exploring the possibilities of various surveillance systems. The overall nature of the proposed book will attract a large number of enthusiastic people who are actively related with biometrics research and development across the globe.

Recommended Topics
Contributors are welcome to submit chapters on the following topics relating to:

Face, fingerprint, palmprint, iris, ear, vein, signature, footprint, etc.
Unimodal and multimodal biometrics
Multi-classifiers based biometric systems
Template updatation
Liveness detection in biometrics
Biometrics Cues and Homeland Security Artifacts
Biometrics and Identity Management
Feature Extraction in Biometrics Systems
Biometrics pattern matching techniques
Biometrics database indexing techniques, protocols and standards
Security, reliability and performance assessments in biometric systems
Virtual biometrics
Adaptive biometrics
Human action based biometric systems
Affective computing and biometrics
Heterogeneous biometrics
Soft biometrics
Biometrics devices and anti-spoofing methods
Cloud based biometrics
Biometrics cryptosystems
Environment based biometric systems
Cohort selection in biometrics
Gender, race, age detection from biometric evidences
Fusions in biometrics: sensor, feature, score, rank and decision levels
Biometrics identity verification with mobile phones
Measuring entropy of biometric templates
Fusion methods for big data in biometrics
Biometrics data for forensic applications
Mixture biometric templates
Quality checking of biometric cues
Combining geo-spatial and biometric data
Next generation biometrics systems: algorithms and design
Legal and social aspects of biometric identification

Submission Procedure
Researchers and practitioners are invited to submit on or before January 15, 2015, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by March 30, 2015 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2015. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Handbook of Research on Identity Management and Authentication for Homeland Security. All manuscripts are accepted based on a double-blind peer review editorial process.

Full chapters may be submitted to this book here: Submit a Chapter

All proposals should be submitted through the "Propose a Chapter" link at the bottom of this page.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2016.

Important Dates
April 23, 2015: Proposal Submission Deadline
April 30, 2015: Notification of Acceptance
May 30, 2015: Full Chapter Submission
July 30, 2015: Review Results Returned
August 30, 2015: Revised Chapter Submission
September 15, 2015: Final Acceptance Notification
September 30, 2015: Final Chapter Submission

Editorial Advisory Board
Phalguni Gupta, NITTTR Kolkata, India
Jamuna Kanta Sing, Jadavpur University, India
Weifeng LI, Tsinghua University, China
Goutam Sanyal, NIT Durgapur, India
C. Chandra Sekhar, IIT Madras, India
Tandra Pal, NIT Durgapur, India
Karm Veer Arya, ABV – IIITM, India
Arnab Bhattacharyya, IIT Kanpur, India
Satish Kumar Singh, IIIT – Allahabad, India
Bibhas Chandra Dhara, Jadavpur University, India
Dakshina Ranjan Kisku, NIT Durgapur, India

Inquiries
Dr. Dakshina Ranjan Kisku
Department of Computer Science and Engineering,
National Institute of Technology Durgapur (NITDGP),
Durgapur - 713209, Bardhaman, West Bengal, India
Email: drkisku@gmail.com / drkisku@cse.nitdgp.ac.in
Phone: +91-9732111234

Related Resources

Book 2025   Call for book Chapters Mitigating the Risks of AI Deepfakes
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SpS&DA 2025   Call for book chapters - Speech strategies and discourse analysis: the powerful and the oppressed (edited volume)
LSIJ 2024   Life Sciences: an International Journal
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
The Mississippi River: A Cultural Artery 2025   Call for Papers: The Mississippi: Soundings on America’s Arterial River
CMVIT-Maldives 2025   2025 9th International Conference on Machine Vision and Information Technology (CMVIT 2025)
ICERI 2025   2025 The 15th International Conference on Education, Research and Innovation (ICERI 2025)
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications