Multimedia Communications, Services Security 2013

Web Name: Multimedia Communications, Services Security 2013

WebSite: http://mcss2013.kt.agh.edu.pl

ID:228789

Keywords:

Communications,Multimedia,Services,Security,

Description:

keywords:
description:
Aims and GoalsGeneral Description of the Conference Call for PapersClick here for the PDF version of the CfP Submission Important Dates Program Committees Venue Registration Hotels





Proceedings Proceedings are available here.

Important Dates Submission: 10 Jan 2013
Submission: 1 Feb 2013
Notification: 20 Feb 2013
Notification: 1 Mar 2013
Camera ready: 10 Mar 2013
Conference: 6 - 7 Jun 2013 Contact mcss [at] kt agh edu pl Aims and Goals of the ConferenceIn recent years, Multimedia Communications, Services and Security have been contributing extensively to our life experience and are expected to be among the most important applications in the future. The objective of the Multimedia Communications, Services Security (MCSS’13) conference is to present research and developing activities contributing to aspects of multimedia communications, systems and security. We are inviting both theoretical and experimental papers as well as work-in-progress research. The main topics of interest are as follows:Audio-visual systems including novel multimedia architectures and SOMAMultimedia and data fusion in personal, sensor, p2p and ad-hoc networksAcquisition of multimedia content and QoE management in content distribution networksSeamless mobility of multimedia services including mobile and wireless access networksWatermarking technology and applicationsNetwork measurement, monitoring and performance evaluation of multimedia servicesReliability, availability, serviceability of multimedia servicesSearching methods, search engines and applicationsMultimedia surveillance and compound security, object tracking and threat detectionSemantic description of multimedia data and metadata information systemsIntelligent monitoring of objects and areas, recognition with automatic categorizationModern computing methods for multimedia systems and authentication of multimedia contentInteractive multimedia applicationsEthical issues and law aspects in video surveillance, Internet monitoring, security researchIntelligent urban environment observation systems including safety monitoring and evacuationCybercrime – threats and counteractingCryptography and data protection, including quantum cryptographyEvaluation of security features in end-user applicationsParallel processing of audio video, video processing through cloud computing, video transcodingIntelligent searching of multimedia contentBiometric applicationsPrivacy protectionThe conference objectives are in conformance with the objectives of the FP7 Security Research.Special sessionsA special session on intelligent monitoring, object tracking and threat detection will be organized along with the main conference. The MCSS conference will host not only technical program sessions, but there will also be an exhibition, where research groups can present their innovative achievements and prototypes in small booths or stands. We kindly ask for proposals of exhibition stands to present research outcomes.

A parallel poster and demonstration session entitled “Demonstrations on MCSS” will be organized along with the main conference. This event encourages researchers to present and discuss the “work-in-progress” or “experience-in-practice” of their current studies/implementations and research prototypes which conform to the topics of MCSS’13. KeynoteThe keynote speech will be given by professor K. R. Rao, University of Texas at Arlington. He is credited with the co-invention of discrete cosine transform (DCT), along with N. Ahmed and T. Natarajan due to their benchmark publication, N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete Cosine Transform", IEEE Trans. Computers, 90-93, Jan 1974.

Title: Current Video Coding Standards: H.264/AVC, Dirac, AVS China, HEVC and VC-1

Abstract: Video coding standards: H.264/AVC, HEVC, DIRAC, AVS China and VC-1are presented. These are the latest standards (HEVC is being finalized) and are adopted by ITU-T/ISO-IEC, BBC, China standards organization and SMPTE respectively. Besides presenting these standards, research potential and as well projects (both at UG and grad levels) are emphasized. These are available by accessing the database for research and projects. Web/ftp sites for accessing standards documents, software, test sequences, conformance bit streams, industry activities etc are provided.Invited SpeakersPiotr Konieczny will give a speech about the protection of our privacy online.

Title: We can protect our privacy online. NOT.

Biography: For the last 8 years Piotr has been working with both Polish and internationalcompanies helping them increase the security of their networks and webapplications. A graduate of Glasgow Caledonian University. He beganhis career in IT in the British division of Philips Electronics. Few years later he foundedNiebezpiecznik.pl, a consulting company focused on IT security. WithinNiebezpiecznik.pl Piotr manages the team responsible for penetrationtesting and security audits of IT systems. In addition, he runs a series of popular securitytrainings for programmers and system administrators.

Piotr Drobek will give a speech about privacy protection issues in scientific research.

Title: Dilemmas of privacy protection in researches on public security. Data Protection Authority’s point of view

Biography:Piotr Drobek graduated from the University of Warsaw, Faculty of Law and Administration in 2000. In the same year he started working for the Bureau of the Inspector General for Personal Data Protection in Poland. Where currently he is a deputy director of the Social Education and International Co-operation Department. He is the Polish representative in the Joint Supervisory Body Europol and Joint Supervisory Authority Customs (since October 2012 as a vice chair) and other supervisory and consultative bodies responsible for personal data protection in the EU. He has been an expert of Council of Europe and European Commission in several projects, conferences and seminars. Mr Drobek runs trainings and lectures on data protection in various institutions. At present he is also a lecturer at the Cardinal Stefan Wyszyński University in Warsaw.Call for PapersDownload the Call for Papers: Adobe PDF, 223 kBPaper SubmissionCopyright forms: the copyright forms are available on the Springer's CCIS page.

Update: The conference proceedings will be published in Springer's CCIS. Please refer to the details below for more information. At the same time the maximum paper length has been extended to 15 pages.

Please adhere to the standard manuscript template of Springer-Verlag LNCS (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). The recommended paper length is 10-12 pages. The maximum paper length is 15 pages, including tables and figures. The cover page must contain an abstract of about 150 words, 3-5 keywords, name and affiliation of author(s) as well as the corresponding author's e-mail and postal address.

Consistent with standard practice, each submitted paper will receive rigorous peer reviewing. Paperswill be selected based on their originality, timeliness, significance, relevance and clarity of presentation.The selection will be based on full papers. Submission implies the willingness of at least one of theauthors to register and present the paper, if accepted. All papers accepted to the conference areexpected to be presented.Publication of the Conference ProceedingsThe proceedings of the MCSS 2013 will be published in the Communications in Computer and Information Science (CCIS) series from Springer. You can find more information about the series at http://www.springer.com/series/7899. The proceedings from previous editions of the conference are available at:MCSS 2011, http://www.springer.com/978-3-642-21511-7.MCSS 2012, http://www.springerlink.com/content/978-3-642-30720-1.Submission SystemSubmissions are handled by EDAS: http://edas.info/N13623.Special Issue of Multimedia Tools and ApplicationsA special issue of the journal Multimedia Tools and Applications on the topic of Multimedia Communications, Systems, and Security will be open for submission after the conference. Selected highest quality papers from the conference, will be invited to prepare extended versions of the manuscripts for consideration to the journal. The extended papers will receive rigorous peer review, performed by experts in the field.Important Dates Submission: 10 Jan 2013
Submission: 1 Feb 2013
Notification: 20 Feb 2013
Notification: 1 Mar 2013
Camera ready: 10 Mar 2013
Conference: 6 - 7 Jun 2013Conference Program Thursday, 2013-06-06 8:00-9:30 Registration 9:30-9:50 Opening Andrzej Dziech; Andrzej Czyżewski 09:50-10:20 Keynote Current Video Coding Standards: H.264/AVC, Dirac, AVS China, HEVC and VC-1 Kamissety R. Rao 10:20-11:00 Session 1: Security Management
Chair: M. Leszczuk Risk Assessment for SWOP Tele-Monitoring System Based on Fuzzy Cognitive Maps Piotr Szwed; Pawel Skrzyński; Pawel Grodniewicz INDECT Security Architecture Manuel Urueña; Petr Machník; Marcin Niemiec; Nikolai Stoianov 11:00-11:20 Coffee Break 11:20-13:20 Session 2: Video Analysis incl. Intelligent Monitoringi
Chair: Z. Wróbel People Detection and Tracking from a Top-View Position using a Time-of-Flight Camera Carsten Stahlschmidt; Alexandros Gavriilidis; Joerg Velten; Anton Kummert Video Analytics-Based Algorithm for Monitoring Egress from Buildings Maciej Szczodrak; Andrzej Czyzewski Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes Piotr Dalka; Piotr Bratoszewski Survey of Recent Developments in Quality Assessment for Target Recognition Video oel Dumke; Mikolaj I. Leszczuk Depth Estimation in Image Sequences in Single-Camera Video Surveillance Systems Aleksander Lamża; Zygmunt Wróbel; Andrzej Dziech Detection of moving objects in images combined from video and thermal cameras Grzegorz Szwoch; Maciej Szczodrak 13:20-14:50 Lunch Break 14:50-15:50 Session 3: Audio Analysis/Processing
Chair: A. Czyżewski Comparison of different feature types for acoustic event detection system Eva Vozarikova-Kiktova; Martin Lojka; Matus Pleva; Jozef Juhár; Anton Cizmar Changing the voice of a subscriber on the example of an implementation of the PSOLA algorithm for the iOS and Android mobile platforms Zbigniew Piotrowski; Michał Ciołek Audio-visual surveillance system for application in bank operating room Jozef Kotus; Kuba Łopatka; Andrzej Czyzewski; Georgis Bogdanis 15:50-16:40 Coffee Break/Expo 16:40-18:00 Session 4: Spatial Data Analysis
Chair: A. Ligęza Mobile context-based framework for monitoring threats in urban environment Szymon Bobek; Grzegorz Nalepa; Weronika Adrian Anchor-free Localization Algorithm with Low- Complexity Method for Node Distance Estimation Enhancement Using ToA Vladimír Cipov; Lubomir Dobos; Ján Papaj Dynamic Map Architecture Evaluation Tools for ATAM Piotr Szwed; Igor Wojnicki; Sebastian Ernst; Andrzej Glowacz Rule-Based Knowledge Management in Social Threat Monitor Mateusz Baran; Antoni Robert Ligęza 18:00-20:00 Break from 20:00 Dinner Friday, 2013-06-07 10:00-11:30 Session 5: Ethical Issues
Chair: J. Derkacz Dilemmas of privacy protection in researches on public security. Data Protection Authority’s point of view Piotr Drobek We can protect our privacy online. NOT. Piotr Konieczny 11:30-11:50 Coffee Break 11:50-13:30 Session 6: Network Data Analysis
Chair: G. Dobrowolski Use of the bio-inspired algorithms to find global minimum in force directed layout algorithms Jan Plucar; Patrik Dubec; Lukáš Rapant Using sub-sequence patterns for detecting organ trafficking websites Suraj Pandey Two Methods for Detecting Malware Maciej Korczyński; Gilles Berger-Sabbatel; Andrzej Duda Downloading and analyzing images from the Internet in order to detect special objects Mikolaj I. Leszczuk; Tomasz Piwowarczyk; Michał Grega Multi-agent System for Pattern Searching in Billing Data Łukasz Bęben; Bartlomiej Sniezynski 13:30-15:00 Lunch Break 15:00-16:20 iSession 7: Image/Video Processing
Chair: K. R. Rao Practical Implementation of Visual Hash Functions for CCTV Footage Authentication Katarzyna Żarnowiec; Pawel Korus; Andrzej Dziech; Andrzej Glowacz 3D video compression using depth map propagation Sergey Matyunin; Dmitriy Vatolin Selective Robust Image Encryption For Social Networks A. Emir Dirik; Nasir Memon New robust video watermarking techniques based on DWT Transform and spread spectrum of basis images of 2D Hadamard Transform Jakob Wassermann 16:20-16:40 Coffee Break 16:40-17:40 Session 8: Image Analysis
Chair: J. Wassermann Knife Detection Scheme Based on Possibility Shell Clustering Aleksandra Maksimova Neural Network Regression of Eyes Location in Face Images Krzysztof Rusek; Piotr Guzik Feature Recycling Cascaded SVM Classifier Based on Feature Selection of HoGs for Pedestrian Detection Alexandros Gavriilidis; Carsten Stahlschmidt; Joerg Velten; Anton Kummert 17:40-18:00 Best Paper/Closing Andrzej Dziech; Andrzej Czyżewski General ChairAndrzej Dziech, AGH University of Science and Technology, Poland
dziech (at) kt (.) agh (.) edu (.) plCommittee ChairsAndrzej Dziech, AGH University of Science and Technology, Poland
dziech (at) kt (.) agh (.) edu (.) plAndrzej Czyżewski, Gdansk University of Technology, Poland
indect (at) sound (.) eti (.) pg (.) gda (.) plTechnical Program CommitteeAtta Badii, University of Reading, United KingdomRemigiusz Baran, Kielce University of Technology, PolandAlexander Bekiarski, technical University - Sofia, BulgariaFernando Boavida, University of Coimbra, PortugalEduardo Cerqueira, Federal University of Para, BrazilRyszard Choras, University of Technology and Life Sciences, PolandMichele Colajanni, University of Modena and Reggio Emilia, ItalyMarilia Curado, University of Coimbra, PortugalAndrzej Czyzewski, Gdansk University of Technology, PolandAdam Dąbrowski, Poznan University of Technology, PolandAnne Demoisy, Skynet Belgacom, BelgiumMarek Domański, Poznan University of Technology, PolandAndrzej Duda, Grenoble Institute of Technology, FranceAndrzej Dziech, AGH University of Science and Technology, PolandAndrzej Głowacz, AGH University of Science and Technology, PolandMichał Grega, AGH University of Science and Technology, PolandNils Johanning, InnoTec Data, PolandJozef Juhár, Technical University of Kosice, SlovakiaEva Kiktova, Technical University of Kosice, SlovakiaGeorgios Kioumourtzis, Ministry of Citizen Protection, GreeceMarek Kisiel-Dorohinicki, AGH University of Science and Technology, PolandChristian Kollmitzer, FHTW Wien, AustriaBozena Kostek, Gdansk University of Technology, PolandZbigniew Kotulski, Warsaw University of Technology, PolandAnton Kummert, University of Wuppertal, GermanyDavid Larrabeiti, Universidad Carlos III de Madrid, SpainMikołaj Leszczuk, AGH University of Science and Technology, PolandAntoni Ligęza, AGH University of Science and Technology, PolandJózef Lubacz, Warsaw University of Technology, PolandTomasz Marciniak, Poznan University of Technology, PolandWojciech Mazurczyk, Warsaw University of Technology, PolandLibor Michalek, VSB - Technical University of Ostrava, Czech RepublicSuraj Pandey, University of York, United KingdomGeorge Papanikolaou, Aristotle University Of Thessaloniki, GreeceAnna Paulson, NTIA/Institute for Telecommunication Sciences, USAMuttukrishnan Rajarajan, City University London, United KingdomK. R. Rao, University of Texas at Arlington, USAThomas Sablik, University of Wuppertal, GermanyHaluk Sarlan, PSI Transcom GmbH, GermanyIrena Stange, U. S. Department of Commerce, USANikolai Stoianov, Technical University of Sofia, BulgariaPiotr Szczuko, Gdansk University of Technology, PolandAndrzej Szwabe, Poznan University of Technology, PolandRyszard Tadeusiewicz, AGH University of Science and Technology, PolandManuel Urueña, Universidad Carlos III de Madrid, SpainGuillaume Urvoy-Keller, Université de Nice Sophia-Antipolis, FranceVladimir Vasinek, VSB – Technical University of Ostrava, Czech RepublicJoerg Velten, University of Wuppertal, GermanyPlamen Vichev, Technical University of Sofia, BulgariaEva Vozarikova Kiktova, Technical University of Kosice, SlovakiaZygmunt Wrobel, University of Silesia, PolandJaroslav Zdralek, VSB – Technical University of Ostrava, Czech RepublicMariusz Ziolko, AGH University of Science and Technology, PolandOrganization CommitteeJacek Dańda, AGH University of Science and Technology, PolandJan Derkacz, AGH University of Science and Technology, PolandSabina Drzewicka, AGH University of Science and Technology, PolandAndrzej Głowacz, AGH University of Science and Technology, PolandMichał Grega, AGH University of Science and Technology, PolandPiotr Guzik, AGH University of Science and Technology, PolandPaweł Korus, AGH University of Science and Technology, PolandMikołaj Leszczuk, AGH University of Science and Technology, PolandAndrzej Matiolański, AGH University of Science and Technology, PolandMichał Pawłowski, AGH University of Science and Technology, PolandMałgorzata Janiszewska, AGH University of Science and Technology, PolandKrzysztof Rusek, AGH University of Science and Technology, PolandVenueThe conference will take place in Krakow, one of the largest and oldest cities in Poland, the former the capital of Poland and a popular tourist destination. The venue will be at the Department of Telecommunications, AGH University of Science and Technology.

Address: ul. Czarnowiejska 78, 30-054 Krakow, Poland.
View Larger MapLandmarksConference FeesThe conference fee is €350. This includes the proceedings, coffee breaks, lunches, and a conference dinner. Student registration (for undergraduate authors of accepted papers): 50% reduction of the regular fee (€175). IEEE member registration: 10% reduction of the regular fee (€315).

Hotel SuggestionsGuest house Anticaul .Czarnowiejska 76
30-054 Kraków

Voice: +48 12 631-23-50
Fax: +48 12 633-49-52
Email: antica@jordan.pl
Web: http://www.antica.jordan.pl Hotel Leopolis ***Ul. Juliusza Lea 253 A
30-133 Kraków

Voice: +48 012 636 51 95
Fax: +48 012 637 70 05
Email: leopolis@leopolis.com.pl
Web: http://www.leopolis.com.pl Novotel Krakow City WestUl. Armii Krajowej 11
30-150 Krakow

Voice: +48 12 622 64 92
Fax: +48 12 622 64 94
Email: H3407-RE1@accor.com
Web: http://www.novotel.com Hotel Polonezul. Reymonta 15
30-059 Kraków

Voice: +48 (12) 292 82 94/95
Voice: +48 (12) 634-19-54
Fax: +48 (12) 631 87 31
Email: recepcja@hotel-polonez.pl
Web: http://www.hotel-polonez.pl/Radisson Blueul. Straszewskiego 17
31-101 Krakow

Voice: +48 12 618 88 88
Email: magdalena.goc@radissonblu.com
Web: http://www.radissonblu.comIbis budget Kraków BronowiceAl. Armii Krajowej 11a
30-150 Kraków

Voice: +48 (12) 626 11 45 / +48 505 198 336
Fax: +48 (12) 626 20 60
Email: H6605@accor.com
Web: http://www.ibisbudget.com Conference organization: PopArt

TAGS:Communications Multimedia Services Security 

<<< Thank you for your visit >>>

Websites to related :
W4 Investir dans le potentiel de

  keywords:
description:W4 la première plateforme de crowdfunding dédiée à l'émancipation des femmes et des filles à travers le monde. Nous vous i

TeslaPittsburgh.com

  keywords:
description:
TeslaPittsburgh.comModel S owner's updates on America's best car: @TeslaPittsburgh on TwitterTESLA STORE: https://www.teslamot

Schoology 2021.10.2 Free Downloa

  keywords:Schoology publisher description, publisher description, Schoology download, Schoology free download, Schoology
description:Schoology - Get th

Medical Illustration and Animati

  keywords:
description:Find certified Medical Illustrators and Medical Animators for assignment. Easily view hundreds of portfolios and search thousand

Fun Things To Do This Weekend or

  keywords:Where to go on Vacation, Vacation Ideas, Getaway Weekends, things to do this weekend, things to do in the Unitied States, things to do in the

freexboxlivecodesxcom

  keywords:
description:

PAT LEE SILK FLOWERS COMPANY LTD

  keywords:
description:
Your vision is our expertiseManufactu

Study.Net

  keywords:Higher Education, Corporate Education, Harvard Cases, Darden Cases, Ivey Cases, Electronic Distribution of Materials, Online content, Online

Tesla Studio

  keywords:
description:
PáginasHOMESOBREARTISTASHQS ONLINENOTÍCIASAMAZONLOJA ONLINE Compre em nossa lojinha online

JasonLee Photography

  keywords:Your keywords
description:Your description
home Pre

ads

Hot Websites