1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on the screen and the screen information is captured by the camera, we can still extract the watermark message from the captured photo. To realize such demands, we analyzed the special distortions caused by the screen-shooting process, including lens distortion, light source distortion, and moiré distortion.
Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove audio watermarks. Although much effort has been made in recent years, the robustness of audio watermarking against recapturing and de-synchronization attacks is still a challenging issue. Specifically, we first construct the frequency-domain coefficients logarithmic mean (FDLM) feature of digital audio.
Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.
The forensic investigation of JPEG compression generally relies on the analysis of first-order statistics based on image histogram. The JPEG compression detection methods based on such methodology can be effortlessly circumvented by adopting some anti-forensic attacks. This paper presents a counter JPEG anti-forensic method by considering the second-order statistical analysis based on the co-occurrence matrices (CMs).
Intrusion detection systems (IDSs) analyze data that are collected by sensors, which monitor the network traffic. Any alert generated by the IDS is transmitted to a cybersecurity operations center (CSOC), which performs the important task of analyzing the alerts.
The thermal camera can capture keyboard surface temperature change after a human's touch. This phenomenon may be used to steal users' passwords physically. In this paper, based on the study of thermal dynamics of keyboards, we design a password break system using an infrared thermal camera. First, we build a signal model to describe the dynamic process of temperature change on the keyboard using Newton's law of cooling.
Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.
Thanks to Mr. James Bond, we are aware that diamonds are forever but, are fingerprints? It is well known that biometrics brings to the security field a new paradigm; unlike traditional systems, individuals are not identified by something that they have or they know, but by what they are. While such an approach entails some clear advantages, an important question remains: is what we are today the same as what we will be tomorrow?
Nowadays, mobile devices, such as smartphones, have been widely used all over the world. In addition, the performance of image recognition has drastically increased with deep learning technologies.
This is a great opportunity for recent postdocs that are AI enthusiasts. Knowledge in the area of material sciences is not mandatory (see the link with the job offer). So, if you are working on AI methods, but have not been working with material sciences yet, but would like to acquaint yourself with the topic, feel encouraged to apply.
There is a postdoctoral scholar opportunity at the University of Southern
California (USC) in a multidisciplinary research area involving
sample/learning complexity in machine learning; optimization theory;
information theory; and graph signal processing. More specifically, we are
looking for a candidate with a strong theoretical foundation in some of these
areas while being motivated to apply the theory to practical datasets using
The Signal Processing research group at the Universität Hamburg (http://uhh.de/inf-sp) is hiring a postdoctoral researcher for 33 months for the project "Crossmodal Processing of Audio-Visual Signals".
PhD-student positions (\approx 3 years) and Postdoc positions (1-->5 years) available for research in Wireless Communications, Information Theory, Edge and Distributed Computing, Caching. EURECOM is located in the French Riviera's silicon valley and is an English speaking Graduate school.
Are you an early-career researcher who enjoys finding innovative solutions to unmet clinical needs and translating deep learning in medical image analysis to the clinic? Do you have a background in medical image computing and experience with working collaboratively with clinicians and clinical image databases? Do you have a passion for developing statistical deep Bayesian methods for medical image analysis?
The Department of Medical Physics and Acoustics at the University of Oldenburg, Germany, is seeking to fill the position of a
Professor (W2) Speech Technology and Hearing Devices
commencing as soon as possible within the cluster of excellence “Hearing4all”.
Fractional interpolation is used to provide sub-pixel level references for motion compensation in the interprediction of video coding, which attempts to remove temporal redundancy in video sequences. Traditional handcrafted fractional interpolation filters face the challenge of modeling discontinuous regions in videos, while existing deep learning-based methods are either designed for a single quantization parameter (QP), only generating half-pixel samples, or need to train a model for each sub-pixel position.
Recent studies have shown the effectiveness of using depth information in salient object detection. However, the most commonly seen images so far are still RGB images that do not contain the depth data.