You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.


Despite the benefits of cyber-insurance, organizations are reluctant to enroll in such policies mainly because of their limitation and high price. On the other hand, insurers are confronting the adverse selection and moral hazard problems as monitoring and distinguishing insureds' cybersecurity posture are highly complicated. Considering the organizations' security interdependency and their demand for cyber-insurance, we study the design of coalitional insurance mechanisms...

This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on the screen and the screen information is captured by the camera, we can still extract the watermark message from the captured photo. To realize such demands, we analyzed the special distortions caused by the screen-shooting process, including lens distortion, light source distortion, and moiré distortion.

Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove audio watermarks. Although much effort has been made in recent years, the robustness of audio watermarking against recapturing and de-synchronization attacks is still a challenging issue. Specifically, we first construct the frequency-domain coefficients logarithmic mean (FDLM) feature of digital audio.

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object.

The forensic investigation of JPEG compression generally relies on the analysis of first-order statistics based on image histogram. The JPEG compression detection methods based on such methodology can be effortlessly circumvented by adopting some anti-forensic attacks. This paper presents a counter JPEG anti-forensic method by considering the second-order statistical analysis based on the co-occurrence matrices (CMs).

Intrusion detection systems (IDSs) analyze data that are collected by sensors, which monitor the network traffic. Any alert generated by the IDS is transmitted to a cybersecurity operations center (CSOC), which performs the important task of analyzing the alerts.


SPS on Twitter

  • Our Biomedical Imaging and Signal Processing Webinar Series continues on Tuesday, 5 July when Michael Unser present…
  • Join us TODAY at 11:00 AM ET when the Brain Space Initiative Talk Series continues with Dr. Tianming Liu presenting…
  • Our 75th anniversary is approaching in 2023, and we're celebrating with a Special Issue of IEEE Signal Processing M…
  • The SPS Webinar Series continues on Monday, 20 June when Dr. Zhijin Qin presents "Semantic Communications: Principl…
  • CALL FOR PROPOSALS: Now seeking proposals for the 2024 IEEE International Workshop on Machine Learning for Signal P…

SPS Videos

Signal Processing in Home Assistants


Multimedia Forensics

Careers in Signal Processing             


Under the Radar