Topic: Video and other sensors have long been used as a part of
physical security. Physical security has been largely immune to the
IT revolution -- the data, if it is looked at all, was usually sent to
video monitors and LED displays where a security guard are supposed to
"notice" significant events in those flickering displays. But the
days of issolated CCTV systems is closing fast, as IP-based cameras and
integrated networked physical security systems being to displace
coax-and-crt systems. Networked physical security systems can be
viewed as a special case of sensor networks, however the key research
issues are often different. Video cameras place significant demands
on both the processors and network bandwidth and hence requires
special attention. Since the primary goal is security, unlike other
sensor networked issues of cybersecurity and encryption must
be addressed. This special session, the first of its kind, will address
these topics:
Networked Video surveillance
Interaction
of CyberSecurity with physical security
Network technology for physical security "First Responders"(i.e. police/fire/EMT)
Sensor fusion for security systems
Codeing/compression of networked video for security.
Automated video detection/tracking in physical
security systems
You are invited to submit a paper ( about 6 pages in 2 column 10pt, IEEE
format, 8 pages single column) on one of the above topics (or other topic
related to Networked physical security systems).
Papers describing novel techniques, performance of existing technology,
design of practical systems will be considered. The first page of the paper
should include: title of the paper, name, affiliation, E-mail address for
each author.
November 21 (extended), 2003
Submission deadline
Author
Notification
December 21, 2003
Papers Decision have been mailed out. Register and get your camera
ready copy in by Jan 9.
Note: The Proceedings will be published by IEEE Computer
Society. A special issue of an international journal is being planned
consisting of selected papers from ITCC (not just this special session), see
the main
ITCC conference site for more details
EVALUATION PROCESS: Papers will be evaluated for originality,
significance, clarity, and soundness. Each paper will be refereed by at
least two researchers. All author submitting papers may be asked also be
asked to review 2-3 papers. If you are interested, but not expereienced, in
reviewing contact T. Boult and we can arrange for you to (unofficially)
review and then get feedback about your review and see copies of the official
reviews.
For more information on the Networked Physical Security session (including if
potential topics would be appropriate) contact the session organizers: