Conferences related to Information Forensics

Back to Top

2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Conference on Multimedia and Expo (ICME)

Multimedia technologies, systems and applications for both research and development of communications, circuits and systems, computer, and signal processing communities.

  • 2019 IEEE International Conference on Multimedia and Expo (ICME)

    speech, audio, image, video, text and new sensor signal processingsignal processing for media integration3D imaging, visualization and animationvirtual reality and augmented realitymulti-modal multimedia computing systems and human-machine interactionmultimedia communications and networkingmedia content analysis and searchmultimedia quality assessmentmultimedia security and content protectionmultimedia applications and servicesmultimedia standards and related issues

  • 2018 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities. ICME also features an Exposition of multimedia products and prototypes.

  • 2017 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to: – Speech, audio, image, video, text and new sensor signal processing – Signal processing for media integration – 3D visualization and animation – 3D imaging and 3DTV – Virtual reality and augmented reality – Multi-modal multimedia computing systems and human-machine interaction – Multimedia communications and networking – Media content analysis – Multimedia quality assessment – Multimedia security and content protection – Multimedia databases and digital libraries – Multimedia applications and services – Multimedia standards and related issues

  • 2016 IEEE International Conference on Multimedia and Expo (ICME)

    Topics of interest include, but are not limited to:- Speech, audio, image, video, text and new sensor signal processing- Signal processing for media integration- 3D visualization and animation- 3D imaging and 3DTV- Virtual reality and augmented reality- Multi-modal multimedia computing systems and human-machine interaction- Multimedia communications and networking- Media content analysis- Multimedia quality assessment- Multimedia security and content protection- Multimedia databases and digital libraries- Multimedia applications and services- Multimedia standards and related issues

  • 2015 IEEE International Conference on Multimedia and Expo (ICME)

    With around 1000 submissions and 500 participants each year, the IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2014 IEEE International Conference on Multimedia and Expo (ICME)

    The IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE societies since 2000. It serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications. In 2014, an Exposition of multimedia products, prototypes and animations will be held in conjunction with the conference.Topics of interest include, but are not limited to:

  • 2013 IEEE International Conference on Multimedia and Expo (ICME)

    To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2009 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2008 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo is a major annual international conference with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of multimedia. ICME serves as a forum for the dissemination of state-of-the-art research, development, and implementations of multimedia systems, technologies and applications.

  • 2007 IEEE International Conference on Multimedia and Expo (ICME)

  • 2006 IEEE International Conference on Multimedia and Expo (ICME)

  • 2005 IEEE International Conference on Multimedia and Expo (ICME)

  • 2004 IEEE International Conference on Multimedia and Expo (ICME)

  • 2003 IEEE International Conference on Multimedia and Expo (ICME)

  • 2002 IEEE International Conference on Multimedia and Expo (ICME)

  • 2001 IEEE International Conference on Multimedia and Expo (ICME)

  • 2000 IEEE International Conference on Multimedia and Expo (ICME)


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2019 27th European Signal Processing Conference (EUSIPCO)

This has been the flagship conference of the European Association for Signal Processing (EURASIP). It offers a comprehensive technical program addressing all the latest developments in research and technology for signal processing and its applications by featuring world-class speakers, oral and poster sessions, keynotes and plenaries, exhibitions, demonstrations, tutorials and satellite workshops, and is expected to attract many leading researchers and industry figures from all over the world.

  • 2018 26th European Signal Processing Conference (EUSIPCO)

    Audio and acoustic signal processingSpeech and language processingImage and video processingMultimedia signal processingSignal processing theory and methodsSensor array and multichannel signal processingSignal processing for communicationsRadar and sonar signal processingSignal processing over graphs and networksNonlinear signal processingStatistical signal processingCompressed sensing and sparse modelingOptimization methodsMachine learningBio-medical image and signal processingSignal processing for computer vision and roboticsComputational imaging/ Spectral imagingInformation forensics and securitySignal processing for power systemsSignal processing for educationBioinformatics and genomicsSignal processing for big dataSignal processing for the internet of thingsDesign/implementation of signal processing systemsOther signal processing areas

  • 2017 25th European Signal Processing Conference (EUSIPCO)

    Audio and acoustic signal processingSpeech and language processingImage and video processingMultimedia signal processingSignal processing theory and methodsSensor array and multichannel signal processingSignal processing for communicationsRadar and sonar signal processingSignal processing over graphs and networksNonlinear signal processingStatistical signal processingCompressed sensing and sparse modelingOptimization methodsMachine learningBio-medical image and signal processingSignal processing for computer vision and roboticsInformation forensics and securitySignal processing for power systemsSignal processing for educationBioinformatics and genomicsSignal processing for big dataSignal processing for the internet of thingsDesign and implementation of signal processing systemsOther signal processing areas

  • 2016 24th European Signal Processing Conference (EUSIPCO)

    EUSIPCO is the flagship conference of the European Association for Signal Processing (EURASIP). The 24th edition will be held in Budapest, Hungary, from 29th August - 2nd September 2016. EUSIPCO 2016 will feature world-class speakers, oral and poster sessions, keynotes, exhibitions, demonstrations and tutorials and is expected to attract in the order of 600 leading researchers and industry figures from all over the world.

  • 2015 23rd European Signal Processing Conference (EUSIPCO)

    EUSIPCO is the flagship conference of the European Association for Signal Processing (EURASIP). The 23rd edition will be held in Nice, on the French Riviera, from 31st August - 4th September 2015. EUSIPCO 2015 will feature world-class speakers, oral and poster sessions, keynotes, exhibitions, demonstrations and tutorials and is expected to attract in the order of 600 leading researchers and industry figures from all over the world.

  • 2014 22nd European Signal Processing Conference (EUSIPCO)

    EUSIPCO is one of the largest international conferences in the field of signal processing and addresses all the latest developments in research and technology. The conference will bring together individuals from academia, industry, regulation bodies, and government, to discuss and exchange ideas in all the areas and applications of signal processing. The conference will feature world-class keynote speakers, special sessions, plenary talks, tutorials, and technical sessions.

  • 2013 21st European Signal Processing Conference (EUSIPCO)

    The EUSIPCO is organized by the European Association for Signal, Speech, and Image Processing (EURASIP). The focus will be on signal processing theory, algorithms, and applications.

  • 2012 20th European Signal Processing Conference

    The focus: signal processing theory, algorithms and applications. Papers will be accepted based on quality, relevance, and novelty and will be indexed in the main databases. Organizers: University POLITEHNICA of Bucharest and Telecom ParisTech.


2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)

This conference presents excellent, novel, and contemporary papers covering all aspects of Data ? including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights; and, to create visualizations to aid in presenting and understanding the data. System development and integration needs to also adapt to these new algorithms, technologies, tools, and needs. This conference and its constituents support the development of technologies and applications for peaceful purposes to improve the human condition.


More Conferences

Periodicals related to Information Forensics

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Fuzzy Systems, IEEE Transactions on

Theory and application of fuzzy systems with emphasis on engineering systems and scientific applications. (6) (IEEE Guide for Authors) Representative applications areas include:fuzzy estimation, prediction and control; approximate reasoning; intelligent systems design; machine learning; image processing and machine vision;pattern recognition, fuzzy neurocomputing; electronic and photonic implementation; medical computing applications; robotics and motion control; constraint propagation and optimization; civil, chemical and ...


Image Processing, IEEE Transactions on

Signal-processing aspects of image processing, imaging systems, and image scanning, display, and printing. Includes theory, algorithms, and architectures for image coding, filtering, enhancement, restoration, segmentation, and motion estimation; image formation in tomography, radar, sonar, geophysics, astronomy, microscopy, and crystallography; image scanning, digital half-toning and display, andcolor reproduction.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


More Periodicals

Most published Xplore authors for Information Forensics

Back to Top

Xplore Articles related to Information Forensics

Back to Top

An active/cooperative role-based open source digital labware for information forensics education

2008 IEEE International Symposium on IT in Medicine and Education, 2008

Information forensics is one of the fast growing and very demanding courses in the information security area. This emerging discipline has an increasing demand to provide hands-on labs for students to gain real-world experience. The purpose of this paper is twofold.


Information Forensics: An Overview of the First Decade

IEEE Access, 2013

In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective multimedia content search and retrieval. As a result, multimedia devices and digital content have become ubiquitous. This path of technological evolution has naturally led to a critical ...


Application Layer Information Forensics Based on Packet Analysis

2010 International Conference of Information Science and Management Engineering, 2010

The work presented in this paper focuses on acquiring the original illegal information hidden in the network data traffic, to provide reliable digital evidence for the network crime cases. Directing toward the data transmission based on Web service, the paper designed a total-part type forensics modal, and implemented a passive network forensics system under the windows system. The technology and ...


IE Internet Information Forensics Technology in Unallocated Disk Space

2009 International Symposium on Computer Network and Multimedia Technology, 2009

This paper presents the main content of IE (Internet Explore) Internet record data, what fields are of forensic interest and what information the available tools can extract. It shows that remnants may still be found in unallocated disk space even the IE Internet record normal file data is deleted. This paper proposes a string pattern matching algorithm to find IE ...


Comments on “Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”

IEEE Transactions on Information Forensics and Security, 2016

Most of the known attribute-based encryption (ABE) schemes focused on the data contents privacy and the access control, but less attention was paid to the privilege control and the identity privacy problem. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI:10.1109/TIFS.2014.2368352), Jung et al. proposed an anonymous attribute- based encryption scheme for access privilege and anonymity, which exhibited ...


More Xplore Articles

Educational Resources on Information Forensics

Back to Top

IEEE-USA E-Books

  • An active/cooperative role-based open source digital labware for information forensics education

    Information forensics is one of the fast growing and very demanding courses in the information security area. This emerging discipline has an increasing demand to provide hands-on labs for students to gain real-world experience. The purpose of this paper is twofold.

  • Information Forensics: An Overview of the First Decade

    In recent decades, we have witnessed the evolution of information technologies from the development of VLSI technologies, to communication and networking infrastructure, to the standardization of multimedia compression and coding schemes, to effective multimedia content search and retrieval. As a result, multimedia devices and digital content have become ubiquitous. This path of technological evolution has naturally led to a critical issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with high confidence when otherwise. When security is compromised, intellectual rights are violated, or authenticity is forged, forensic methodologies and tools are employed to reconstruct what has happened to digital content in order to answer who has done what, when, where, and how. The goal of this paper is to provide an overview on what has been done over the last decade in the new and emerging field of information forensics regarding theories, methodologies, state-of-the-art techniques, major applications, and to provide an outlook of the future.

  • Application Layer Information Forensics Based on Packet Analysis

    The work presented in this paper focuses on acquiring the original illegal information hidden in the network data traffic, to provide reliable digital evidence for the network crime cases. Directing toward the data transmission based on Web service, the paper designed a total-part type forensics modal, and implemented a passive network forensics system under the windows system. The technology and methods we applied are referred to as packet capture, packet filtration, protocol analysis, application date regeneration and so on. The system captures, disassembles, identifies and recombines the network information flow, restores the data into a standard format and makes the plaintext information of application layer reappear at last. The result of appraisal and application indicates the system can gain original transparent digital evidence and satisfy network forensics requirements, which provides strong support for solving the network crime cases.

  • IE Internet Information Forensics Technology in Unallocated Disk Space

    This paper presents the main content of IE (Internet Explore) Internet record data, what fields are of forensic interest and what information the available tools can extract. It shows that remnants may still be found in unallocated disk space even the IE Internet record normal file data is deleted. This paper proposes a string pattern matching algorithm to find IE Internet record data in unallocated space based on known internal record structures. The system developed can recover deleted IE records and it may be an approach to obtain evidence in unallocated disk space.

  • Comments on “Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption”

    Most of the known attribute-based encryption (ABE) schemes focused on the data contents privacy and the access control, but less attention was paid to the privilege control and the identity privacy problem. Recently in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI:10.1109/TIFS.2014.2368352), Jung et al. proposed an anonymous attribute- based encryption scheme for access privilege and anonymity, which exhibited a lot of interesting ideas and gave the proof in the standard model. However, after carefully revisiting the scheme, we found that any valid user can compute the system-wide master key and their proof has some mistakes, hence, it fails to meet their security definitions.

  • A Component Estimation Framework for Information Forensics

    With a rapid growth of imaging technologies and an increasingly widespread usage of digital images and videos for a large number of high security and forensic applications, there is a strong need for techniques to verify the source and integrity of digital data. Component forensics is new approach for forensic analysis that aims to estimate the algorithms and parameters in each component of the digital device. In this paper, we develop a novel theoretical foundation to understand the fundamental performance limits of component forensics. We define formal notions of identifiability of components in the information processing chain, and present methods to quantify the accuracies at which the component parameters can be estimated. Building upon the proposed theoretical framework, we devise methods to improve the accuracies of component parameter estimation for a wide range of forensic applications.

  • Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?

    Online Social Networks (OSN) such as Facebook, Twitter, LinkedIn, and Instagram are heavily used to socialize, entertain or gain insights on people behavior and their activities. Everyday terabytes of data is generated over these networks, which is then used by the businesses to generate revenue or misused by the wrongdoers to exploit vulnerabilities of these social network platforms. Specifically social network information helps in extracting various important features such as; user association, access pattern, location information etc. Recent research shows, many such features could be used to develop novel attack models and investigate further into defending the users from exposing their information to outsiders. This paper analyzes some of the available tools to extract OSN information and discusses research work on similar type of unstructured data. Recent research works, which focus on gathering bits and pieces of information to extract meaningful results for digital forensics, has been discussed. An online survey is conducted to gauge the cautiousness of users in social media usage in terms of personal information dissemination.

  • ENF-Based Region-of-Recording Identification for Media Signals

    The electric network frequency (ENF) is a signature of power distribution networks that can be captured by multimedia signals recorded near electrical activities. This has led to the emergence of multiple forensic applications based on the use of ENF signals. Examples of such applications include validating the time-of-recording of an ENF-containing multimedia signal or estimating its recording location based on concurrent reference signals from power grids. In this paper, we examine a novel ENF-based application that infers the power grid in which the ENF-containing multimedia signal was recorded without relying on the availability of concurrent power references. We investigate features based on the statistical differences in ENF variations between different power grids to serve as signatures for the region-of- recording of the media signal. We use these features in a multiclass machine learning implementation that is able to identify the grid-of-recording of a signal with high accuracy. In addition, we explore techniques for building multiconditional learning systems that can adapt to changes in the noise environment between the training and testing data.

  • “Seeing” ENF: Power-Signature-Based Timestamp for Digital Multimedia via Optical Sensing and Signal Processing

    Electric Network Frequency (ENF) fluctuates slightly over time from its nominal value of 50 Hz/60 Hz. The fluctuations in ENF remain consistent across the entire power grid including when measured at physically distant geographical locations. The light intensity from such indoor lighting as fluorescent lamps and incandescent bulbs, which are connected to the power mains, varies in accordance with the ENF, and the fluctuations can be recorded using visual sensors. In this paper, mechanisms using optical sensors and video cameras to record and validate the presence of ENF fluctuations in indoor lighting are presented. Spectrogram and subspace-based signal processing techniques are applied to such recordings to extract the ENF signal by estimating its instantaneous frequencies as a function of time. A high correlation is observed between the ENF fluctuations obtained from indoor lighting and that of the ENF signal captured directly from the power mains supply. A similar mechanism is then used to demonstrate the presence of ENF signals in video recordings taken in different geographical areas. Experimental results show that ENF signals are present in visual recordings made in different geographical areas and can be used as a natural timestamp for optical sensor recordings and video surveillance recordings conducted in indoor lighting environments. Robustness of ENF fluctuation traces under strong compression and CMOS rolling shutter cameras is discussed. Applications of the ENF signal analysis to tampering detection of surveillance video recordings and forensic binding of the audio and visual track of a video are also demonstrated. An analytical model based on an autoregressive process is also developed for ENF signals, and the effectiveness of using innovation sequences from the model for timestamp verification is demonstrated.

  • Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain

    In this paper, we present effective steganalysis techniques for digital video sequences based on interframe collusion that exploits the temporal statistical visibility of a hidden message. Steganalysis is the process of detecting, with high probability, the presence of covert data in multimedia. Present image steganalysis algorithms when applied directly to video sequences on a frame- by-frame basis are suboptimal; we present methods that overcome this limitation by using redundant information present in the temporal domain to detect covert messages embedded via spread-spectrum steganography. Our performance gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and pattern recognition tools. Through analysis and simulations, we evaluate the effectiveness of the video steganalysis based on linear collusion approaches. The proposed steganalysis methods are successful in detecting hidden watermarks bearing low energy with high accuracy. The simulation results also show the improved performance of the proposed temporal-based methods over purely spatial methods



Standards related to Information Forensics

Back to Top

No standards are currently tagged "Information Forensics"


Jobs related to Information Forensics

Back to Top