| |||||||||||||||
SMA 2015 : Secure Multimedia Applications | |||||||||||||||
Link: http://dap.vsb.cz/ecc2015/invited.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Objective and Motivation
Security of multimedia assets has been in a center stage of international attention since we first-handedly witnessed the pervasiveness of terrorism activities. Lately, more and more government and industry resources are located to the research of developing high-performance security systems. How can we ensure the trustworthiness of multimedia data? How can analysts extract intelligence from enormous video streaming? How can visual or audio biometric features help to identify suspects? How can we hide, encrypt, compress, extract, decrypt, classify, and/or encode multimedia/biometrics to ensure accurate identification/verification or even accurate delivery. How can we merge multimedia applications to Smartphones, especially with open source operating systems? How can secure multimedia/biometrics help us in taking the right decision at the right time in the right place at the right event? Scope and Interests This session focuses on a variety of multimedia security topics including multimedia identification, biometrics, video surveillance, multimedia forensics, and computer and network security. The purpose of the “Secure Multimedia Applications” session is to bring scientists, researcher scholars, and students from academia and practitioners present ongoing research activities about both theoretical advances and applications of multimedia security and to allow the exchange of new ideas and application experiences face to face. Topics of interest include but are not limited to: - Multimedia watermarking, fingerprinting, and identification - Multimedia network protection, privacy, and security - Multimedia authentication and encryption - Android based safety car driving system based on eye tracking - Development of secure audio watermarking schemes - Development of new optical encryption algorithms - 3D watermarking schemes - Hybrid Encryption-Watermarking schemes for color data - Development of multimodal-multibiometric systems Paper Submission https://cmt.research.microsoft.com/ECCIDAA2015/ Manuscripts should be provided according to the guidelines given at the following link were you can find the necessary styles and information (follow the link "Instructions for Authors" to the right): http://www.springer.com/series/11156 All accepted papers will be published in the conference proceeding which will be published by Springer in the series of “Advances in Intelligent Systems and Computing” and abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago, Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. Important Dates On-line submission of regular, special, and invited session papers: March 31, 2015 Acceptance/rejection notification: April 12, 2015 Camera ready and registration: April 24, 2015 Conference Dates: June 29 - July 1, 2015 Session Organizers: Chair: Assoc. Prof. Mohamed Abdel-Azim Mohamed Faculty of Engineering, Mansoura University, Egypt College of Computer, Qassim Private Colleges, Saudi Arabia E-mail: mazim12@yahoo.com Co-chair: Assoc. Prof. Abdullah Alaraj Dean, College of Computer, Qassim Private Colleges, Saudi Arabia College of Computer, Qassim University, Saudi Arabia E-mail: cocdean@qc.edu.sa Co-chair: Assist. Prof. Abdelhameed Ibrahim Faculty of Engineering, Mansoura University, Egypt College of Computer, Qassim Private Colleges, Saudi Arabia E-mail: a.ibrahim@qc.edu.sa |
|