SPS Feed

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

The Latest News, Articles, and Events in Signal Processing

Lecture Date: May 30, 2019
Chapter: Poland
Chapter Chair: Piotr Samczynski
Topic: Towards Autonomous Video Surveillance and
Privacy-Preserving Localization and Recognition of Human Activities

Lecture Date: May 28, 2019
Chapter: Poland
Chapter Chair: Piotr Samczynski
Topic: Towards Autonomous Video Surveillance and
Privacy-Preserving Localization and Recognition of Human Activities

Lecture Date: May 21-22, 2019
Chapter: Poland
Chapter Chair: Piotr Samczynski
Topic: Towards Autonomous Video Surveillance and
Privacy-Preserving Localization and Recognition of Human Activities

Saarland University

Two PhD positions in the area of Information Extraction, Data Mining and Machine Learning
at Saarland University
We anticipate the availability of funds for two PhD positions in the area of information extraction, data mining and machine learning.

Lecture Date: April 15, 2019
Chapter: Atlanta
Chapter Chair: Alessio Medda
Topic: Tackling the Cocktail Party Problem for
Hearing Devices: Solutions, Challenges and Opportunities

IEEE Transactions on Signal Processing

Radio tomographic imaging (RTI) is an emerging technology to locate physical objects in a geographical area covered by wireless networks. From the attenuation measurements collected at spatially distributed sensors, radio tomography capitalizes on spatial loss fields (SLFs) measuring the absorption of radio frequency waves at each location along the propagation path.

IEEE Transactions on Signal Processing

In this paper, we propose a regular vine copula based methodology for the fusion of correlated decisions. Regular vine copula is an extremely flexible and powerful graphical model to characterize complex dependence among multiple modalities.

IEEE Transactions on Signal Processing

This paper addresses the design and analysis of feedback-based online algorithms to control systems or networked systems based on performance objectives and engineering constraints that may evolve over time. The emerging time-varying convex optimization formalism is leveraged to model optimal operational trajectories of the systems, as well as explicit local and network-level operational constraints.

IEEE Transactions on Signal Processing

In this paper, we address the problem of observability of a linear dynamical system from compressive measurements and the knowledge of its external inputs. Observability of a high-dimensional system state in general requires a correspondingly large number of measurements.

IEEE Transactions on Information Forensics and Security

This paper presents a comprehensive study of post-mortem human iris recognition carried out for 1200 near-infrared and 1787 visible-light samples collected from 37 deceased individuals kept in mortuary conditions. We used four independent iris recognition methods (three commercial and one academic) to analyze genuine and impostor comparison scores and check the dynamics of iris quality decay over a period of up to 814 h after death.

IEEE Transactions on Information Forensics and Security

Video watermarking is a well-established technology to help identify digital pirates when they illegally re-distribute multimedia content. In order to provide every client with a unique, watermarked video, the traditional distribution architectures separately encode each watermarked video. However, since these encodings require a high amount of computational resources, such architectures do not scale well to a large number of users.

IEEE Transactions on Information Forensics and Security

Despite the benefits of cyber-insurance, organizations are reluctant to enroll in such policies mainly because of their limitation and high price. On the other hand, insurers are confronting the adverse selection and moral hazard problems as monitoring and distinguishing insureds' cybersecurity posture are highly complicated. Considering the organizations' security interdependency and their demand for cyber-insurance, we study the design of coalitional insurance mechanisms...

IEEE Transactions on Information Forensics and Security

This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on the screen and the screen information is captured by the camera, we can still extract the watermark message from the captured photo. To realize such demands, we analyzed the special distortions caused by the screen-shooting process, including lens distortion, light source distortion, and moiré distortion.

IEEE Transactions on Information Forensics and Security

Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove audio watermarks. Although much effort has been made in recent years, the robustness of audio watermarking against recapturing and de-synchronization attacks is still a challenging issue. Specifically, we first construct the frequency-domain coefficients logarithmic mean (FDLM) feature of digital audio.

IEEE Transactions on Information Forensics and Security

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

IEEE Transactions on Information Forensics and Security

The forensic investigation of JPEG compression generally relies on the analysis of first-order statistics based on image histogram. The JPEG compression detection methods based on such methodology can be effortlessly circumvented by adopting some anti-forensic attacks. This paper presents a counter JPEG anti-forensic method by considering the second-order statistical analysis based on the co-occurrence matrices (CMs).

IEEE Transactions on Information Forensics and Security

Intrusion detection systems (IDSs) analyze data that are collected by sensors, which monitor the network traffic. Any alert generated by the IDS is transmitted to a cybersecurity operations center (CSOC), which performs the important task of analyzing the alerts.

IEEE Transactions on Information Forensics and Security

The thermal camera can capture keyboard surface temperature change after a human's touch. This phenomenon may be used to steal users' passwords physically. In this paper, based on the study of thermal dynamics of keyboards, we design a password break system using an infrared thermal camera. First, we build a signal model to describe the dynamic process of temperature change on the keyboard using Newton's law of cooling.

IEEE Transactions on Information Forensics and Security

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

IEEE Transactions on Information Forensics and Security

Thanks to Mr. James Bond, we are aware that diamonds are forever but, are fingerprints? It is well known that biometrics brings to the security field a new paradigm; unlike traditional systems, individuals are not identified by something that they have or they know, but by what they are. While such an approach entails some clear advantages, an important question remains: is what we are today the same as what we will be tomorrow?

Pages

SPS Social Media

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel