SPS Feed

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

The Latest News, Articles, and Events in Signal Processing

IEEE Transactions on Multimedia

We have recently seen great progress in image classification due to the success of deep convolutional neural networks and the availability of large-scale datasets. Most of the existing work focuses on single-label image classification. However, there are usually multiple tags associated with an image. The existing works on multi-label classification are mainly based on lab curated labels.

IEEE Transactions on Multimedia

The mnemonic descent method (MDM) algorithm is the first end-to-end recurrent convolutional system for high-accuracy face alignment. However, the heavy computational complexity and high memory access demands make it difficult to satisfy the requirements of real-time applications. To address this problem, an improved MDM (I-MDM) algorithm is proposed for efficient hardware implementation based on several hardware-oriented optimizations.

IEEE Transactions on Image Processing

Radial distortion has widely existed in the images captured by popular wide-angle cameras and fisheye cameras. Despite the long history of distortion rectification, accurately estimating the distortion parameters from a single distorted image is still challenging. The main reason is that these parameters are implicit to image features, influencing the networks to learn the distortion information fully.

IEEE Transactions on Image Processing

The performance of ellipse fitting may significantly degrade in the presence of outliers, which can be caused by occlusion of the object, mirror reflection or other objects in the process of edge detection. In this paper, we propose an ellipse fitting method that is robust against the outliers, and thus maintaining stable performance when outliers can be present.

IEEE Transactions on Image Processing

Gait recognition aims to recognize persons' identities by walking styles. Gait recognition has unique advantages due to its characteristics of non-contact and long-distance compared with face and fingerprint recognition. Cross-view gait recognition is a challenge task because view variance may produce large impact on gait silhouettes.

IEEE Transactions on Information Forensics and Security

Monitoring all the internal flows in a datacenter is important to protect a victim against internal distributed denial-of-service (DDoS) attacks. Unused virtual machines (VMs) in a datacenter are used as monitors and flows are copied to the monitors from software defined networking (SDN) switches by adding some special rules. In such a system, a VM runs a machine learning method to detect DDoS behavior but it can only process a limited number/amount of flows. 

IEEE Transactions on Information Forensics and Security

User activities in cyberspace leave unique traces for user identification (UI). Individual users can be identified by their frequent activity items through statistical feature matching. However, such approaches face the data sparsity problem. In this paper, we propose to address this problem by multi-item-set fingerprinting that identifies users not only based on their frequent individual activity items, but also their frequent consecutive item sequences with different lengths.

IEEE Transactions on Information Forensics and Security

Identifying information sources plays a significant role in network science and engineering. However, existing source identification approaches generally focus on static networks without considering the temporal features of networks. To this end, we comprehensively study the problem of identifying single and multiple information sources in time-varying networks.

IEEE Transactions on Computational Imaging

We present an all-in-one camera model that encompasses the architectures of most existing compressive-sensing light-field cameras, equipped with a single lens and multiple amplitude coded masks that can be placed at different positions between the lens and the sensor. The proposed model, named the equivalent multi-mask camera (EMMC) model, enables the comparison between different camera designs, e.g using monochrome or CFA-based sensors, single or multiple acquisitions, or varying pixel sizes, via a simple adaptation of the sampling operator. 

IEEE Transactions on Computational Imaging

Recently, deep learning-based compressive imaging (DCI) has surpassed conventional compressive imaging in reconstruction quality and running speed. While multi-scale sampling has shown superior performance over single-scale, research in DCI has been limited to single-scale sampling. Despite training with single-scale images, DCI tends to favor low-frequency components similar to conventional multi-scale sampling, especially at low subrates. 

IEEE Transactions on Computational Imaging

In this article, we propose a method to reconstruct the total electromagnetic field in an arbitrary two-dimensional scattering environment without any prior knowledge of the incident field or the permittivities of the scatterers. However, we assume that the region between the scatterers is homogeneous and that the approximate geometry describing the environment is known.

IEEE Transactions on Computational Imaging

Most digital cameras use specialized autofocus sensors, such as phase detection, lidar or ultrasound, to directly measure focus state. However, such sensors increase cost and complexity without directly optimizing final image quality. This paper proposes a new pipeline for image-based autofocus and shows that neural image analysis finds focus 5-10x faster than traditional contrast enhancement. 

Are you looking to energize signal processing students, early stage researchers, and industry practitioners? Consider hosting a virtual Seasonal School for young engineers! Cycle 2 is considering events that will be held between October 2021 and March 2022. 

The upcoming 5G network needs to achieve substantially larger link capacity and ultra-low latency to support emerging mobile applications. While conventional techniques have reached their limits, uplifting the carrier frequency to the millimeter-wave (mm-wave) band stands out as an effective approach to further boost the network capacity, as it provides orders of magnitude greater spectrum than current cellular bands.

IEEE/ACM Transactions on Audio, Speech, and Language Processing

Most of the existing feature representations for spoofing countermeasures consider information either from the magnitude or phase spectrum. We hypothesize that both magnitude and phase spectra can be beneficial for spoofing detection (SD) when collectively used to capture the signal artifacts. In this work, we propose a novel feature referred to as modified magnitude-phase spectrum (MMPS) to capture both magnitude and phase information from the speech signal. 

IEEE/ACM Transactions on Audio, Speech, and Language Processing

Voice and face are two most popular biometrics for person verification, usually used in speaker verification and face verification tasks. It has already been observed that simply combining the information from these two modalities can lead to a more powerful and robust person verification system.

IEEE Signal Processing Letters

Previous works about linguistic steganography such as synonym substitution and sampling-based methods usually manipulate observed symbols explicitly to conceal secret information, which may give rise to security risks. In this letter, in order to preclude straightforward operation on observed symbols, we explored generation-based linguistic steganography in latent space by means of encoding secret messages in the selection of implicit attributes (semanteme) of natural language.

IEEE Signal Processing Letters

Traffic flow prediction is a challenging task while most existing works are faced with two main problems in extracting complicated intrinsic and extrinsic features. In terms of intrinsic features, current methods don't fully exploit different functions of short-term neighboring and long-term periodic temporal patterns.

IEEE Signal Processing Letters

Consider a robust multiple-input single-output downlink beamforming optimization problem in a frequency division duplexing system. The base station (BS) sends training signals to the users, and every user estimates the channel coefficients, quantizes the gain and the direction of the estimated channel and sends them back to the BS. 

Pages

SPS ON X

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel