The International Conference on Image, Vision and Intelligent Systems (ICIVIS 2021)


Book Description

This book is a collection of the papers accepted by the ICIVIS 2021—The International Conference on Image, Vision and Intelligent Systems held on June 15–17, 2021, in Changsha, China. The topics focus but are not limited to image, vision and intelligent systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings.




Digital Forensics and Watermarking


Book Description

This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology.




Advances in Computer Graphics


Book Description

This book constitutes the refereed proceedings of the 38th Computer Graphics International Conference, CGI 2021, held virtually in September 2021. The 44 full papers presented together with 9 short papers were carefully reviewed and selected from 131 submissions. The papers are organized in the following topics: computer animation; computer vision; geometric computing; human poses and gestures; image processing; medical imaging; physics-based simulation; rendering and textures; robotics and vision; visual analytics; VR/AR; and engage.







Next Generation Systems and Networks


Book Description

The book is a collection of high-quality research papers presented at International Conference on Next Generation Systems and Networks (BITS EEE CON 2022), held at Birla Institute of Technology & Science, Pilani, Rajasthan, India, during November 4–5, 2022. This book provides reliable and efficient design solutions for the next-generation networks and systems. The book covers research areas in energy, power and control; communication and signal processing; and electronics and nanotechnology.




Handbook of Biometric Anti-Spoofing


Book Description

The third edition of this authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous editions, this thoroughly updated third edition has been considerably revised to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website. Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering recent technologies like Vision Transformers, and review of competition series; examines methods for PAD in iris recognition systems, the use of pupil size measurement or multiple spectra for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as recent progress on detection of 3D facial masks and the use of multiple spectra with Deep Neural Networks; presents an analysis of PAD for automatic speaker recognition (ASV), including a study of the generalization to unseen attacks; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and face anti-spoofing; provides analyses of PAD in finger-vein recognition, in signature biometrics, and in mobile biometrics; includes coverage of international standards in PAD and legal aspects of image manipulations like morphing.This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics. This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.




Pattern Recognition. ICPR International Workshops and Challenges


Book Description

This 8-volumes set constitutes the refereed of the 25th International Conference on Pattern Recognition Workshops, ICPR 2020, held virtually in Milan, Italy and rescheduled to January 10 - 11, 2021 due to Covid-19 pandemic. The 416 full papers presented in these 8 volumes were carefully reviewed and selected from about 700 submissions. The 46 workshops cover a wide range of areas including machine learning, pattern analysis, healthcare, human behavior, environment, surveillance, forensics and biometrics, robotics and egovision, cultural heritage and document analysis, retrieval, and women at ICPR2020.







Information Systems and Management Science


Book Description

This multidisciplinary book delves into information systems’ concepts, principles, methods and procedures and their innovative applications in management science and other domains, including business, industry, health care and education. It will be valuable to students, researchers, academicians, developers, policymakers and managers thriving to improve their information and management systems, develop new strategies to solve complex problems and implement novel techniques to utilise the massive data best. This book of Information Systems and Management Science (proceedings of ISMS 2021) is intended to be used as a reference by scholars, scientists and practitioners who collect scientific and technical contributions concerning models, tools, technologies and applications in the field of information systems and management science. This book shows how to exploit information systems in a technology-rich management field.