By Topic

Signal Processing Magazine, IEEE

Issue 2 • Date March 2013

Filter Results

Displaying Results 1 - 24 of 24
  • [Front cover]

    Publication Year: 2013, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (834 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (332 KB)
    Freely Available from IEEE
  • Conferences: A Catalyst for New Ideas [From the Editors]

    Publication Year: 2013, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (387 KB) | HTML iconHTML
    Freely Available from IEEE
  • Staff listing

    Publication Year: 2013, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (387 KB)
    Freely Available from IEEE
  • Inside signal processing [From the Editors]

    Publication Year: 2013, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (1044 KB) | HTML iconHTML
    Freely Available from IEEE
  • Awards and recognition [President's Message]

    Publication Year: 2013, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (315 KB)
    Freely Available from IEEE
  • Oceans Are a Testbed for Signal Processing-Driven Technologies [Special Reports]

    Publication Year: 2013, Page(s):6 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    This article presents a discussion on Sensorbots. Sensorbots are sphere-shaped robotic devices equipped with a set of biogeochemical sensors designed to monitor deep ocean regions for extended periods of time and to relay key information back to researchers. The Sensorbots will enable continuous spatiotemporal monitoring of key elements in the ocean and the ability to respond to events such as und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defense Budgets Shrink Technology Spending [Special Reports]

    Publication Year: 2013, Page(s):10 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    As defense budgets go, so goes a lot of spending on technology. But for most major countries, a lot of belt tightening is in the works, most notably in the United States and across Europe.Defense budget cuts are hitting prime contractors and their suppliers hard. The postelection picture in Washington and the budget crisis in Europe are making projections difficult, but the top 20 global defense a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPS Members Recognized As Fellows and with Awards [Society News]

    Publication Year: 2013, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (1950 KB)
    Freely Available from IEEE
  • Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors]

    Publication Year: 2013, Page(s): 16
    Request permission for commercial reuse | PDF file iconPDF (172 KB) | HTML iconHTML
    Freely Available from IEEE
  • Privacy-preserving nearest neighbor methods: comparing signals without revealing them

    Publication Year: 2013, Page(s):18 - 28
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1300 KB) | HTML iconHTML

    Comparing two signals is one of the most essential and prevalent tasks in signal processing. A large number of applications fundamentally rely on determining the answers to the following two questions: 1) How should two signals be compared? 2) Given a set of signals and a query signal, which signals are the nearest neighbors (NNs) of the query signal, i.e., which signals in the database are most s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure signal processing in the cloud: enabling technologies for privacy-preserving multimedia cloud processing

    Publication Year: 2013, Page(s):29 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2376 KB) | HTML iconHTML

    In recent years, the paradigm of cloud computing has gained an increasing interest from the academic community as well as from the commercial point of view. The cloud is a very appealing concept both for the providers (who can benefit from hiring out their extra computation and storage resources) and for the users (who can avoid the initial investment on resources by outsourcing their processes an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends

    Publication Year: 2013, Page(s):42 - 52
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1261 KB) | HTML iconHTML

    This article presents a tutorial overview of the application of techniques of secure two-party computation (also known as secure function evaluation) to biometric identification. These techniques enable to compute biometric identification algorithms while maintaining the privacy of the biometric data. This overview considers the main tools of secure two-party computations such as homomorphic encry... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One-Way Private Media Search on Public Databases: The Role of Signal Processing

    Publication Year: 2013, Page(s):53 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1572 KB) | HTML iconHTML

    Automated media classification is becoming increasingly common in areas ranging from mobile location recognition to surveillance systems to automated annotation. While these tools can add great value to the public sphere, media searches often process private information; in such situations, it is important to protect the interests of one or both parties. Much attention has been given to the scenar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-preserving speech processing: cryptographic and string-matching frameworks show promise

    Publication Year: 2013, Page(s):62 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1407 KB) | HTML iconHTML

    Speech is one of the most private forms of communication. People do not like to be eavesdropped on. They will frequently even object to being recorded; in fact, in many places it is illegal to record people speaking in public, even when it is acceptable to capture their images on video [1]. Yet, when a person uses a speech-based service such as a voice authentication system or a speech recognition... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-preserving data aggregation in smart metering systems: an overview

    Publication Year: 2013, Page(s):75 - 86
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1320 KB) | HTML iconHTML

    Growing energy needs are forcing governments to look for alternative resources and ways to better manage the energy grid and load balancing. As a major initiative, many countries including the United Kingdom, United States, and China have already started deploying smart grids. One of the biggest advantages of smart grids compared to traditional energy grids is the ability to remotely read fine-gra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues

    Publication Year: 2013, Page(s):87 - 96
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1167 KB) | HTML iconHTML

    The paper illustrates recent results regarding secure watermarking to the signal processing community, highlighting both benefits and still open issues. Secure signal processing, by which indicates a set of techniques able to process sensitive signals that have been obfuscated either by encryption or by other privacy-preserving primitives, may offer valuable solutions to the aforementioned issues.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

    Publication Year: 2013, Page(s):97 - 107
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3214 KB) | HTML iconHTML

    This article introduces the reader to the relevant techniques that are needed to implement such an end-to-end commutative security system for video distribution and presents a practical solution for encryption and watermarking compliant with H.264/Advanced Video Coding (AVC) and the upcoming High Efficiency Video Coding (HEVC) video coding standards. To minimize the overhead and visual impact, a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain

    Publication Year: 2013, Page(s):108 - 117
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1585 KB) | HTML iconHTML

    Since the introduction of the notion of privacy homomorphism by Rivest et al. in the late 1970s, the design of efficient and secure encryption schemes allowing the performance of general computations in the encrypted domain has been one of the holy grails of the cryptographic community. Despite numerous partial answers, the problem of designing such a powerful primitive has remained open until the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reusing Speech Techniques for Video Semantic Indexing [Applications Corner]

    Publication Year: 2013, Page(s):118 - 122
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (899 KB) | HTML iconHTML

    Many techniques developed in speech research have been successfully employed in other fields, such as automatic video semantic indexing. In this application, a user submits a textual input query for an desired object or a scene to a search system, which returns video shots that include the object or scene. Recently, a new method using Gaussian-mixture model (GMM) supervectors and support vector ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Private Computing with Garbled Circuits [Applications Corner]

    Publication Year: 2013, Page(s):123 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    Private computing provides a clever way to process data without revealing any details about the data itself to the party in charge of processing it. When the to-beprocessed data is a signal, private computing is customarily referred to as SPED, which stands for signal processing in the encrypted domain, since signal protection is usually achieved by encrypting the signals and processing them in en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socially Aware Virtual Characters: The Social Signal of Smiles [Social Sciences]

    Publication Year: 2013, Page(s):128 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1187 KB) | HTML iconHTML

    At first, machines were mainly used to solve complex mathematical problems. Today, they often embody more and more roles typically endowed by humans, such as a tutor in a virtual learning class or an assistant for virtual task realization. Moreover, the paradigm highlighted in [1] reveals that the user's relation with the computer is intrinsically social, with high similarities compared to interpe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handbook of Blind Source Separation: Independent Component Analysis and Applications (Common, P. and Jutten, ; 2010 [Book Review]

    Publication Year: 2013, Page(s):133 - 134
    Request permission for commercial reuse | PDF file iconPDF (552 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Dates Ahead]

    Publication Year: 2013, Page(s): 135
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Signal Processing Magazine publishes tutorial-style articles on signal processing research and applications, as well as columns and forums on issues of interest. Its coverage ranges from fundamental principles to practical implementation, reflecting the multidimensional facets of interests and concerns of the community. Its mission is to bring up-to-date, emerging and active technical developments, issues, and events to the research, educational, and professional communities. It is also the main Society communication platform addressing important issues concerning all members.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Min Wu
University of Maryland, College Park
United States 

http://www/ece.umd.edu/~minwu/