Security in Media Processing and Communications (Acronym: SMPCIG)

Chair: Jun Dai, Worcester Polytechnic Institute, USA
Co-chairs: Rose Hu, Utah State University, USA
Anthony Ho, University of Surrey, UK
Advisor: Deepa Kundur, University of Toronto, Canada

IG Scope:

Security of media processing and communications plays an important role in today’s information age where digital data is ubiquitous. Security is an inter-disciplinary and complex problem with multiple dimensions such as information security and hiding, digital rights, privacy, and risk management. Consequently, multimedia and communications security encompasses many diverse research topics utilizing cryptography, signal processing, communication theory, machine learning, information theory, decision theory, and game theory. Non-technical issues such as policy, usage case, attack model and user behavior also have profound impact on the research, development and deployment of security related technologies for media processing and communications. The objective of SecIG is to address various security issues in media processing and communications from a fresh and interdisciplinary perspective. In particular, synthesis of methods from various fields are applied to security problems as required. The interplay between analytical methods and practical solutions to problems is especially encouraged. SecIG will promote a healthy growth of its community by exploring synergies between ts interdisciplinary and diverse members. SecIG will also act as a communication bridge with security and other relevant communities for their mutual benefits. To achieve these goals, SecIG will promote and support workshops, conferences, special sessions, tutorials, and journal special issues. Our target areas and topics include, but are not limited to the following:

  • Theory and algorithms for protecting media content and services, especially for networked and emerging applications. Such emerging applications include, but are not limited to social media, versatile media application and communications over highly distributed, unreliable and ad-hoc infrastructures, and etc.
  • Theories and algorithms for media processing and communications that< are inherently amiable to provisioning security
  • Efficient software and hardware implementations for security related protocols as integrated into media processing and communications systems, e.g. low power design and implementations
  • Security and standards for securing media processing and communications
  • Privacy, policy, user behavior, and other related issues that impact security in media processing and communication.