| |||||||||
ITSPMS 2016 : Intelligent Techniques in Signal Processing for Multimedia Security | |||||||||
Link: https://sites.google.com/site/itspms16/ | |||||||||
| |||||||||
Call For Papers | |||||||||
Call for Book Chapters
Intelligent Techniques in Signal Processing for Multimedia Security Webpage of Chapter Call https://sites.google.com/site/itspms16/ Publisher Springer: Intelligent Systems Reference Library Book Series Studies in Computational Intelligence (SCI) http://www.springer.com/series/7092 Indexed By The books of this series are submitted to DBLP, Ulrichs,SCOPUS, MathSciNet, Current Mathematical Publications, Mathematical Reviews, Zentralblatt Math: MetaPress and Springerlink. Volume Editors Nilanjan Dey, PhD. Dept. of Information Technology, Techno India College of Technology, Kolkata India V. Santhi, PhD. VIT University – Vellore School of Computing Science and Engineering, Tamil Nadu Introduction Due to the advancement in sensor technology and digital hardware, signal processing find its applications in variety of disciplines. The headway in digital technology leads to easy creation of various types of signal such as audio, speech, video and images in different modalities. Similarly the advancement in computer hardware increases the rate of processing of signal to accomplish a specific task in an identified domain. Thus the technological advancement in media production and computer hardware/communications makes information processing / transmission relatively simple and quick but at the same times the rate of exposure to various threats keeps increases for multimedia data. It is a very challenging task to provide security for multimedia data due to the availability of many manipulating tools and software at a free of cost. At present, to provide security for multimedia data, various security mechanisms have been developed and being in use including cryptography, steganography and digital watermarking. Cryptographic techniques could be used to protect digital data during the transmission from the sender to the receiver but once it gets decrypted at the reception end there is no control over data in providing security further. In contrast, steganography could be used for secret communication between trusted parties with the limitation of payload and digital watermarking could be used identify the source, creator, owner, distributor or authorized consumer of multimedia data. Thus signal processing provides a major role in providing security for multimedia data. While these are a few examples of issues, our intention in editing this book is to offer concepts of digital signal processing in combined with computational intelligence for multimedia security technologies in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of Signal processing techniques. The conceptual basis required achieving in depth knowledge in the field of signal processing and computational intelligence for security will be stressed upon. All these motivated us towards Intelligent Techniques in Signal Processing for Multimedia Security. Objective & Scope Our intention in editing this book is to offer concepts of computational intelligence for image and video processing in a precise and clear manner to the research community. In editing the book, our attempt is to provide frontier advances and applications of computational intelligence techniques in image and video processing. The conceptual basis required achieving in depth knowledge in the field of computer science and information technology will be stressed upon. All these motivated us towards computational intelligence for image and video processing. Topics of Interest * Digital Signal Processing Theory and Practices Classification of systems and Signals A/D conversion , D/A conversion, sampling techniques, quantization, quantization, error, Nyquist rate, aliasing effect, convolution in time domain- Impulse Response and difference equations. Basics of Laplace and Fourier transforms Z‐transform and its properties, Conversion of Laplace and Fourier into Z transform. Difference equation – Solution by z‐transform ‐ Stability analysis, frequency response – Convolution in frequency domain. DFT and its properties, Relation between DTFT and DFT, ‐ Computation of DFT using FFT by Decimation in time and Decimation in frequency algorithms- Butterfly structure for Radix2. Basics of filter Design- Butterworth and Chebyshev – Design of IIR digital filters using impulse invariance technique – Design of digital filters using bilinear transform- Warping and Pre-warping. Symmetric and Antisymmetric FIR filters – Linear phase FIR filters – Design using Hamming, Hanning and Blackmann Windows – Frequency sampling method – Realization of FIR filters – Transversal, Linear phase and Polyphase structures. Introduction to Multirate signal processing-Decimation-Interpolation-Polyphase implementation of FIR filters for interpolator and decimator -Multistage implementation of sampling rate conversion- Design of narrow band filters - Applications of Multirate signal processing. * Computational Intelligence Neural Networks, Fuzzy Logic and Rough Sets , Tabu Search , Expert Systems, Machine Learning , Hybridization of intelligent techniques, Unsupervised Classification Strategies – clustering, Clustering Algorithms, Syntactic Pattern Classification , Nonparametric Classification. Optimization Techniques: Evolutionary Computing- Problem solving as a search task, Hill Climbing, Simulated Annealing, Evolution as an outcome of Genetic Variation plus Selection, Standard Evolutionary Algorithms, Genetics Algorithms, Parallel Genetic Programming , An Overview of Neural Networks Models, Parallel Cellular Algorithms and Programs, Firefly algorithm, Cuckoo Search, Bat Algorithms, Wolf Search Algorithm, Bacterial Foraging Behaviour and algorithm, Emerging Bacterial Inspired Algorithms, Bee Inspired Algorithms, Artificial Bee Colony Algorithm, Luminous Insect Inspired Algorithms , Fish Inspired Algorithms, Frog Inspired Algorithms. Methodology, History, and Application to Image/ Video Processing * Real Time Security Applications Information Hiding, Steganography, secret communication, Digital watermarking, blind watermarking, non-bind watermarking, spatial domain marketing, Frequency domain watermarking, Broadcast monitoring, Authentication, copy protection, Automatic Visual Inspection System, Surveillance system, Automatic human activity detection, Remotely Sensed Scene Interpretation, Defence Surveillance, Moving-Object Tracking System in protected premises, Data Compression for secret communication, Landmine detection, Missile Detection, Infrared Communication, Infrared Viewing Systems, Infrared Reconnaissance, Border Security, Wild Fire detection, Human face recognition for Surveillances, Home land Security, Artificial Immune System applications. Submission Procedure Researchers and practitioners are invited to submit a single page proposal/abstract clearly explaining the mission and concerns of the proposed chapter. Full chapters (of 20-30 pages) during submission should conform to the standard guidelines of the Springer's book chapter format. For guidelines refer: https://www.springer.com/de/authors-editors/book-authors-editors/manuscriptpreparation/ 5636 Manuscripts can be prepared using Latex or MS-Words, and according to the Springer's svmlt template that can be downloaded from the link: http://www.springer.com/birkhauser/mathematics/download?SGWID=0-40465-0- 0-0 Submission of abstract/full-chapter can be made via the following link: https://easychair.org/conferences/?conf=itspms16 All submitted chapters will be reviewed by at least two independent and expert reviewers for quality, correctness, originality, and relevance. Contributors may also be requested to serve as reviewers for other chapters submissions. There are no submission or acceptance fees for manuscripts submitted to this book Publication Important Dates Abstract/Proposals Submission: Feb 15th, 2015 Full Chapter Submission: March 15th, 2015 Decision Notification: September April 15th 2015 Authors’ Revisions & CRC Submission: April 25th , 2015 Contact Details Nilanjan Dey, PhD. https://sites.google.com/site/nilanjandeyprofile/ E-Mail: neelanjan.dey@gmail.com x |
|