DCABES 2012 - DCABES2012 Technical Session: Media Security and Processing
Topics/Call fo Papers
As a technical session of DCABES2012, we welcome submissions in all areas of Media Processing and Security. In this session we will discuss issues relevant to media security and processing. This will be approached from the media content protection as well as people protection sides where the detection or the protection against misuse of media or tempering with its contents is of interest. Techniques such as: watermarking an image or a video to protect the copyright of the authors, detecting which camera was used to take a photo or if an image was manipulated, are at the center of interest of this session.
SCOPE:
The list of topics of interest includes the topics below but is not limited to them:
Media Cryptography and coding:
JPEG & encryption techniques
MPEG& encryption techniques
Stream media security
Digital watermarking
Perceptual Models
Information hiding techniques
Robust Watermarking
Fragile Watermarking
Watermarking application
Fingerprinting/perceptual HASH
Definition of Fingerprinting/perceptual HASH
Properties of Fingerprinting/perceptual HASH
Usage modes and application scenarios
General framework and methods
Similarity Measures
Media Forensics
Media Tampering
Media Active Forensics
Media Passive blind Forensics
Copy-plaster operation Forensics
Retouch operation Forensics
Re-sampling operation Forensics
Media input/output equipment Forensics
Stegano-operation Forensics
Important Dates
Submission due: Before 9th May 2012
Notification of Acceptance: Before 10th June 2012
Camera-Ready due: Before 8th July 2012
Early Registration Time: Before 8th July 2012
Last Registration time: Before 5th August 2012
Non Author Registration Time: Before 16th October 2012
SCOPE:
The list of topics of interest includes the topics below but is not limited to them:
Media Cryptography and coding:
JPEG & encryption techniques
MPEG& encryption techniques
Stream media security
Digital watermarking
Perceptual Models
Information hiding techniques
Robust Watermarking
Fragile Watermarking
Watermarking application
Fingerprinting/perceptual HASH
Definition of Fingerprinting/perceptual HASH
Properties of Fingerprinting/perceptual HASH
Usage modes and application scenarios
General framework and methods
Similarity Measures
Media Forensics
Media Tampering
Media Active Forensics
Media Passive blind Forensics
Copy-plaster operation Forensics
Retouch operation Forensics
Re-sampling operation Forensics
Media input/output equipment Forensics
Stegano-operation Forensics
Important Dates
Submission due: Before 9th May 2012
Notification of Acceptance: Before 10th June 2012
Camera-Ready due: Before 8th July 2012
Early Registration Time: Before 8th July 2012
Last Registration time: Before 5th August 2012
Non Author Registration Time: Before 16th October 2012
Other CFPs
Last modified: 2011-11-29 16:43:21