Keynote Speakers on ICOIP 2018

Prof. Jacques Blanc-Talon, Université Paris XI, France

Jacques Blanc-Talon received the Ph.D. degree from Paris XI (Orsay) University in 1991. After a postdoc during 1991-1992 at the CSIRO of Canberra, Australia, he joined the Ministry ofDefence procurement agency (DGA) in France. He worked as department Scientific Manager, Head of the “Information Engineering and Robotics” scientific domain at the DGA/MRIS and is currently with the Integrated Navigation Systems department.

Over the years, he has conducted and supervised more than 50 industrial and research contracts. He was the French Delegate of several NATO Groups and of the Horizon 2020 Security ResearchProgramme Committee.

J. Blanc-Talon has conducted the review of around 400 Ph.D. and postdoc grant applications, has participated in more than 80defencejurys and has supervised some 40 Ph.D. students. He was author or co-author of about 90 scientific papers and the editor or co-editor of 17 books and special issues of international journals. He served as Associate Editor for IOS Integrated Computer-Aided Engineering from 2000 to 2006, and IEEE TIP from 2005 to 2008; he was a reviewer for IEEE PAMI, IEE Electronics Letters, SIAM on Applied Mathematics and IAPR Pattern Recognition. He has been involved in the organization of about 100 international conferences.

J. Blanc-Talon was with the SEE (Société desElectriciens et Electroniciens) and the Australian Computing Society (ACS). He received the Outstanding Paper Award from the SCS in 1993; he was promoted “Officier del’ordre des Palmes Académiques” in 2017, and IEEE Senior Member in 2015. He served the IEEE Chapter Chair for the French Signal Processing Chapter for 14 years.

Prof. Gouenou Coatrieux
Institut Mines-Telecom, Telecom Bretagne, INSERM UMR1101 LaTIM, France

He received the Ph.D. degree in signal processing and telecommunication from the University of Rennes I, Rennes, France, in collaboration with the Ecole Nationale Supérieure des Télécommunications, Paris, France, in 2002. His research is conducted in the LaTIM Laboratory, INSERM U1101, Brest. He is currently a full professor with the Information and Image Processing Department, Institut Mines-Telecom, Telecom Bretagne, Brest, France. He conducts his research in the Laboratory of Medical Information Processing, Institut National de la Santé et de la Recherche Médicale, Brest. He is also the head of the joint laboratory SePEMeD (Security and Processing of Externalized Medical Image Data). His primary research interests concern watermarking (images and databases), crypto-watermarking, secure processing of outsourced data, information system security, digital forensics with a special interest for the medical field. Prof. Coatrieux is an Associate Editor of the IEEE JOURNAL ON BIOMEDICAL AND HEALTH INFORMATICS, Digital Signal Processing, and Innovation and Research in BioMedical Engineering. He is a member of the International Federation for Medical and Biological Engineering “Global Citizen Safety and Security Working Group” and the European Federation for Medical Informatics “Security, Safety, and Ethics Working Group,” and has contributed to the Technical Committee of “Information Technology for Health” of the IEEE Engineering in Medicine and Biology Society.

Speech Title: Crypto-Watermarking in the medical field
Advances in information and communication technologies provide new means to access, share, duplicate and manipulate medical data. But if daily medical practices take advantage of such an evolution, this facility to handle data also compromises their security. In this talk, we will focus on the security of multimedia digital contents in medical information systems and how they can be secured by means of the watermarking and crypto-watermarking technologies. These technologies can advantageously complete existing measures for protecting medical data (e.g. access control, traceability tools) through the insertion of messages/watermarks into data (e.g. images, medical record databases) these ones being encrypted or not. Depending on the relationships between the watermark and the data, watermarking can serve different security services within a medical information system. However, the deployment of such a solution is not free of constraints. In this lecture, we will expose: i) the complementary role of watermarking and crypto-watermarking with existing security tools in medical information systems; ii) different watermarking modulations for medical data and their combination with encryption mechanisms.


Assoc. Prof. Siamak Khatibi, Blekinge Institute of Technology,Sweden

Siamak khatibi received the M.Sc. degree in electrical engineering from the Chalmers University of Technology, Gothenburg, Sweden, in 1993, and the Ph.D. degree in electrical engineering from Chalmers University of Technology, Gothenburg, Sweden, in 1999. He is currently an associate professor in computer science at Blekinge Institute of technology, Karlskrona, Sweden. His research team is conducting leading-edge research in advanced computer vision with special focus on image sensor, 3D reconstruction and image/video-based scene understanding. His team has been developing novel reconstruction methods for a variety of data types from singular single image data to spatial-temporal big data resources. The research of the team has led to several innovations for industrial applications. Semantic content awareness of streaming data and implementing bio-inspired methodologies have been other research areas. These ideas have been implemented in many applications for detection, classification, analysis and defining new image/video quality metrics.
Speech Title: Virtual Deformable Image Sensors
In recent years, the performance of digital cameras has improved drastically due to increase of resolution of the image sensors achieved by reducing the pixel size. However, the smaller pixel size results to lower dynamic range, lower signal-to-noise ratio (SNR) and lower fill factor, indicating that by reducing the pixel size the image quality is reduced. Moreover, the optical diffraction limit; which is a constraint by the aperture of optical elements, makes it impossible to physically reduce the pixel size less than according to Rayleigh criterion, where is the wavelength of light, is the focal length of lens, and is the aperture diameter. Anatomical and physiological studies indicate that our visual quality-related issues, such as high contrast sensitivity, high SNR, and optimal sampling are related directly to the form and arrangement of the sensors in the visual system, which have a significant role in optimizing the visual acuity.

Inspired by the visual system, in our recent research we have proposed a general framework towards a virtual deformable image sensor in which grid, pixel and the gap (i.e., the empty space among pixels) can change their form and size. This facilitates application-based configuration of grid, pixel, and gap on the image sensor. In the core framework, we use the idea of modelling the incident photons onto the sensor surface.



Jedrzej Bieniasz
Warsaw University of Technology, Poland

He is to present the research work of Prof. Krzysztof Szczypiorski
Warsaw University of Technology, Poland

Jedrzej Bieniasz is a researcher and a full-time project associate at Institute of Telecommunications (IT), Warsaw University of Technology (WUT), Poland. He collaborates in projects on digital forensics and network security systems. He pursues the PhD degree in Computer Sciences’ at IT, WUT under supervision of Professor Krzysztof Szczypiorski. In last few years he gained the experience on the contact between research and industry He started from industrial research with reaching the leading position in the R&D team in cybersecurity startup. His main area of interest is to develop new defensive network cyber security solutions. He tries to find new methods of phenomenon observation to detect unknown cyber threats.

Speech Title: Towards Empowering Security of Cyberspace – Insight from the Field
Abstract: Looking at development of our computing systems we see two directions:
– cloud computing (centralized model), which is extensively developed and widely applied in last years
– Internet of Things with deployment of smart and interconnected devices, for example mobile phones, wearables, sensors, power grids etc. could overgrow 50 billion units by 2020.
It ultimately triggers a need for defining a new paradigms of computing. One of the most important ideas is fog computing that complement the centralized cloud computing. Furthermore, National Institute of Standards and Technology (NIST) went further with unification of the description of computing systems. They defined a whole new framework called cyber-physical systems (CPS) and IoT could be considered as the implementation of CPS. Could the fog computing be considered as as a network and data security mechanism? We would investigate the trend in security of utilizing the dispersion of data between multiple carriers creating a kind of fog of data. It could be assumpted that if an adversary compromises the system it could take only a part of the them and it would be useless. We would consider a design of a new system in which security would be implemented by applying steganographic methods of StegHash and SocialStegDisc proposed in last two years of research at Warsaw University of Technology with fulfilling the requirements of cyberfog security approach.
The advances of network and digital steganography would be presented as the introduction for the second topic of analysis and detection of such systems. This field has a cure a extensive looking for the best and the only one detection method. Is this the right approach? We would try to look at the main promising directions and discuss its limitations. This would be concluded with the idea of combining many single algorithms and transformations into bigger pipelines of processing from data to anomalies to classifications and predictions of cyber threats. As the final topic we focus on providing security by revisiting formal modelling approach with the question is any universal model of communicating protocol exists? We look on protocol engineering and designing with taking into account network steganography as another type of such protocol.

Leave a Reply

Your email address will not be published. Required fields are marked *