In the last decade, a large number of techniques have been proposed to ensure integrity and authenticity of data in security-oriented applications, e.g. multime-dia forensics, biometrics, watermarking and information hiding, network intrusion detection, reputation systems, etc.... The development of these methods has re-ceived a new boost in the last few years with the advent of Deep Learning (DL) techniques and Convolutional Neural Networks (CNNs).
ScopeThe purpose of the Computational Imaging Technical Committee (CI TC) is to promote activities within the technical area of computational imaging, distinguished from image processing by the role of computation in the image formation process. The technical scope includes those areas listed under all EDICS categories of the IEEE Transactions on Computational Imaging and under the EDICS subcategory Computational Imaging of IEEE Transactions on Image Processing.