SPS Feed

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

The Latest News, Articles, and Events in Signal Processing

IEEE Transactions on Multimedia

We propose a novel technique for steganography on 3-D meshes so as to resist steganalysis. The majority of existing methods modulate vertex coordinates to embed messages in a nonadaptive way. We take account of complexity of local regions as joint distortion of a triple unit (vertice) and coding method such as syndrome trellis codes to adaptively embed messages, which owns stronger security with respect to existing steganalysis.

IEEE Transactions on Multimedia

In general, low-rank representation (LRR) aims to find the lowest rank representation with respect to a dictionary. In fact, the dictionary is a key aspect of low-rank representation. However, a lot of low-rank representation methods usually use the data itself as a dictionary (i.e., a fixed dictionary), which may degrade their performances due to the lack of clustering ability of a fixed dictionary.

IEEE Transactions on Multimedia

The partition algorithm as a digital image processing technique is significant to many applications, such as data encryption, image denoising, and 3-D reconstruction. In order to achieve well partition that can availably reduce the distortion phenomenon, a novel approach named image adaptive triangular partition (IATP) is proposed, which considers the grayscale distribution of the image and removes...

IEEE Transactions on Multimedia

The problem of authenticating a re-sampled image has been investigated over many years. Currently, however, little research proposes a statistical model-based test, resulting in that statistical performance of the resampling detector could not be completely analyzed. To fill the gap, we utilize a parametric model to expose the traces of resampling forgery, which is described with the distribution of residual noise.

IEEE Transactions on Image Processing

We present a compression scheme for multiview imagery that facilitates high scalability and accessibility of the compressed content. Our scheme relies upon constructing at a single base view, a disparity model for a group of views, and then utilizing this base-anchored model to infer disparity at all views belonging to the group.

IEEE Transactions on Image Processing

Signal decomposition is a classical problem in signal processing, which aims to separate an observed signal into two or more components, each with its own property. Usually, each component is described by its own subspace or dictionary. Extensive research has been done for the case where the components are additive, but in real-world applications, the components are often non-additive.

IEEE Transactions on Image Processing

The surface normal estimation from photometric stereo becomes less reliable when the surface reflectance deviates from the Lambertian assumption. The non-Lambertian effect can be explicitly addressed by physics modeling to the reflectance function, at the cost of introducing highly nonlinear optimization.

IEEE Transactions on Image Processing

Being able to cover a wide range of views, pan-tilt-zoom (PTZ) cameras have been widely deployed in visual surveillance systems. To achieve a global-view perception of a surveillance scene, it is necessary to generate its panoramic background image, which can be used for the subsequent applications such as road segmentation, active tracking, and so on.

IEEE SPS has built a streamlined mechanism for employers to add a job announcement by simply filling in a simple job opportunity submission Web form related to a particular TC field. To submit job announcements for a particular Technical Committee, the submission form can be found by visiting the page below and selecting a particular TC. Visit the SPS Job Submission Form.

IEEE Transactions on Information Forensics and Security

We introduce the multiple enrollment scheme for SRAM-physical unclonable functions (PUFs). During each enrollment, the binary power-on values of the SRAM are observed, and a corresponding key and helper data are generated. Each key can later be reconstructed from an additional observation and the helper data.

IEEE Transactions on Information Forensics and Security

In September 2017, the McAfee Labs quarterly report estimated that brute-force attacks represent 20% of total network attacks, making them the most prevalent type of attack ex-aequo with browser-based vulnerabilities. These attacks have sometimes catastrophic consequences, and understanding their fundamental limits may play an important role in the risk assessment of password-secured systems and in the design of better security protocols. 

IEEE Transactions on Information Forensics and Security

Electric network frequency (ENF) is a time-varying signal of the frequency of mains electricity in a power grid. It continuously fluctuates around a nominal value (50/60 Hz) due to changes in the supply and demand of power over time. Depending on these ENF variations, the luminous intensity of a mains-powered light source also fluctuates. 

IEEE Transactions on Information Forensics and Security

Face presentation attacks are the main threats to face recognition systems, and many presentation attack detection (PAD) methods have been proposed in recent years. Although these methods have achieved significant performance in some specific intrusion modes, difficulties still exist in addressing replayed video attacks. 

IEEE Transactions on Information Forensics and Security

Low-level criminals, who do the legwork in a criminal organization, are the most likely to be arrested, whereas the high-level ones tend to avoid attention. But crippling the work of criminal organizations is not possible unless investigators can identify the most influential, high-level members and monitor their communication channels.

IEEE Transactions on Information Forensics and Security

Current anomaly detection systems (ADSs) apply statistical and machine learning algorithms to discover zero-day attacks, but such algorithms are vulnerable to advanced persistent threat actors. In this paper, we propose an adversarial statistical learning mechanism for anomaly detection, outlier Dirichlet mixture-based ADS (ODM-ADS), which has three new capabilities.

IEEE Transactions on Information Forensics and Security

Steganographic schemes are commonly designed in a way to preserve image statistics or steganalytic features. Since most of the state-of-the-art steganalytic methods employ a machine learning (ML)-based classifier, it is reasonable to consider countering steganalysis by trying to fool the ML classifiers.

IEEE Transactions on Information Forensics and Security

Automated biometric identification systems are inherently challenged to optimize false (non-)match rates. This can be addressed either by directly improving comparison subsystems, or indirectly by allowing only “good quality” biometric queries to be compared.

IEEE/ACM Transactions on Audio, Speech, and Language Processing

There are a number of studies about extraction of bottleneck (BN) features from deep neural networks (DNNs) trained to discriminate speakers, pass-phrases, and triphone states for improving the performance of text-dependent speaker verification (TD-SV). However, a moderate success has been achieved.

IEEE/ACM Transactions on Audio, Speech, and Language Processing

Single-channel, speaker-independent speech separation methods have recently seen great progress. However, the accuracy, latency, and computational cost of such methods remain insufficient. The majority of the previous methods have formulated the separation problem through the time–frequency representation of the mixed signal, which has several drawbacks, including the decoupling of the phase...

IEEE/ACM Transactions on Audio, Speech, and Language Processing

One of the challenges in computational acoustics is the identification of models that can simulate and predict the physical behavior of a system generating an acoustic signal. Whenever such models are used for commercial applications, an additional constraint is the time to market, making automation of the sound design process desirable.

Pages

SPS ON X

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel