![]() |
| |||||||||||||||
B-SIAM 2016 : Biometrics Security Artifacts for Identity Management | |||||||||||||||
Link: http://www.icacni.com/special-sessions | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
Homeland security addresses the critical and diverse challenges in today’s world. Utilizing latest technologies and best security practices in government and private agencies for Identity management are a great concern. Identity Management is able to use biometric evidences to identify or verify a person correctly by using physiological or behavioral characteristics possessed by the person. This does not require any other means of possession-based and knowledge-based identification substance or token that may cause the security susceptible to attack. These substances may be stolen or forgotten and as a result malicious users take advantage of it through unauthorized entry to the security zones. As opposed to these systems, cutting-edge biometrics-based identification systems offer high-end security over conventional identification systems. The special session B-SAIM 2016 will serve as a platform to cover the advanced topics and approaches of homeland security and biometrics systems for identity management. Only original and unpublished high quality research papers are solicited from the academicians, researchers and industry practitioners on traditional and advanced topics of identity management and biometrics. Recommended topics include but are not limited to the following: Homeland security artifacts Feature extraction, pattern classification, matching techniques for biometrics Database indexing techniques for biometrics systems Online and offline biometric systems Avatar recognition Biometrics alteration Extended features in biometrics Biometrics systems for border control security Protocols, cryptography, biometric standards for biometrics systems Performance assessment and resource computation in biometrics systems Match score level, feature level, rank level, sensor level fusions for biometrics Soft biometrics Biometrics template security Face, fingerprint, iris, palm, hand geometry, ear, gait, retina, DNA, footprint, dental biometrics, etc. Security and reliability assessment for biometrics systems Multi-classifiers fusion and score weighting schemes in biometrics Biometrics in affective computing Recognition at distance Multibiometrics Emotion Recognition How to submit: To submit to this special issue, you need to submit through Easychair and select article topic as SI : B-SIAM. Also mail a copy of your article to Special Session Chair for his advance intimation. Proceedings will be published by AISC, Springer and indexed in ISI Proceedings, EI-Compendex, DBLP, SCOPUS. Session Chair: Dakshina Ranjan Kisku, SMIEEE National Institute of Technology Durgapur, India drkisku@cse.nitdgp.ac.in, drkisku@gmail.com |
|