ICFSP 2018 - Frontiers of Signal Processing

September 24 - 27, 2018 | Poitiers, France

KEYNOTE SPEAKERS

More information will be released soon.

 

 

 

KEYNOTE SPEAKERS of ICFSP 2017

Prof. Mounir Ghogho,
University of Leeds, UK

Mounir Ghogho has received the M.S. degree in 1993 and the PhD degree in 1997 from the National Polytechnic Institute of Toulouse, France. He was an EPSRC Research Fellow with the University of Strathclyde (Scotland), from Sept 1997 to Nov 2001. Since Dec 2001, he has been a faculty member with the school of Electronic and Electrical Engineering at the University of Leeds (England), where he is currently a Professor. Since 2010, he has also been affiliated with the International University of Rabat, where he is currently a Scientific Advisor to the President and ICT Research Director. He was awarded the UK Royal Academy of Engineering Research Fellowship in September 2000. He is a recipient of the 2013 IBM Faculty Award. He is currently an associate editor of the Signal Processing Magazine, and a steering committee member of the IEEE Transactions on Signals and Information Processing over Networks. He served as an Associate Editor of the IEEE Transactions on Signal Processing from 2005 to 2008, the IEEE Signal Processing Letters from 2001 to 2004, and the Elsevier Digital Signal Processing journal from 2011 to 1012. He served as a member of the IEEE Signal Processing Society SPCOM Technical Committee from 2005 to 2010, a member of IEEE Signal Processing Society SPTM Technical Committee from 2006 to 2011, and is currently a member of the IEEE Signal Processing Society SAM Technical Committee. He was the General Chair of the European SIgnal Processing conference Eusipco2013 and the IEEE workshop on Signal Processing for Advanced Wireless Communications SPAWC’2010. He has published over 300 journal and conference papers in the areas of signal processing, machine leaning and wireless communication. He held invited scientist/professor positions at Telecom Paris-Tech (France), NII (Japan), BUPT (China), University Carlos 3rd of Madrid (Spain), ENSICA (Toulouse), Darmstadt Technical University (Germany), and Minnesota University (USA).

Prof. Jacques Blanc-Talon, Université Paris XI, France
Jacques Blanc-Talon received the Ph.D. degree from Paris XI (Orsay) University in 1991. After a postdoc during 1991-1992 at the CSIRO of Canberra, Australia, he joined the Ministry of Defence procurement agency (DGA) in France. He worked as department Scientific Manager, Head of the "Information Engineering and Robotics" scientific domain at the DGA/MRIS and is currently with the Integrated Navigation Systems department.
Over the years, he has conducted and supervised more than 50 industrial and research contracts. He was the French Delegate of several NATO Groups and of the Horizon 2020 Security Research Programme Committee.
J. Blanc-Talon has conducted the review of around 400 Ph.D. and postdoc grant applications, has participated in 80 defence jurys and has supervised some 40 Ph.D. students. He was author or co-author of about 90 scientific papers and the editor or co-editor of 13 books and special issues of international journals. He served as Associate Editor for IOS Integrated Computer-Aided Engineering from 2000 to 2006, and IEEE TIP from 2005 to 2008; he was a reviewer for IEEE PAMI, IEE Electronics Letters, SIAM on Applied Mathematics and IAPR Pattern Recognition. He has been involved in the organization of more than 90 international conferences
J. Blanc-Talon was with the SEE (Société des Electriciens et Electroniciens) and the Australian Computing Society (ACS). He received the Outstanding Paper Award from the SCS in 1993; he was promoted "Officier de l'ordre des Palmes Académiques" in 2017, and IEEE Senior Member in 2015. He is currently the IEEE Chapter Chair for the French Signal Processing Chapter.

Prof. Gouenou Coatrieux,
Institut Mines-Telecom, Telecom Bretagne, INSERM UMR1101 LaTIM, France


He received the Ph.D. degree in signal processing and telecommunication from the University of Rennes I, Rennes, France, in collaboration with the Ecole Nationale Supérieure des Télécommunications, Paris, France, in 2002. His research is conducted in the LaTIM Laboratory, INSERM U1101, Brest. He is currently a full professor with the Information and Image Processing Department, Institut Mines-Telecom, Telecom Bretagne, Brest, France. He conducts his research in the Laboratory of Medical Information Processing, Institut National de la Santé et de la Recherche Médicale, Brest. He is also the head of the joint laboratory SePEMeD (Security and Processing of Externalized Medical Image Data). His primary research interests concern watermarking (images and databases), crypto-watermarking, secure processing of outsourced data, information system security, digital forensics with a special interest for the medical field. Prof. Coatrieux is an Associate Editor of the IEEE JOURNAL ON BIOMEDICAL AND HEALTH INFORMATICS, Digital Signal Processing, and Innovation and Research in BioMedical Engineering. He is a member of the International Federation for Medical and Biological Engineering "Global Citizen Safety and Security Working Group" and the European Federation for Medical Informatics "Security, Safety, and Ethics Working Group," and has contributed to the Technical Committee of "Information Technology for Health" of the IEEE Engineering in Medicine and Biology Society.

Assoc. Prof. Dr. Huseyin Seker
The University of Northumbria at Newcastle, UK


Dr Huseyin Seker is a multi-disciplinary researcher and data scientist with a particular interest in big data mining, machine learning, and bio-medical and industrial applications. He has published over 100 peer-reviewed papers, led a number of projects, delivered keynote and invited talks at several events and organised a number of conferences and special sessions. He is currently a Reader in the Department of Computer and Information Sciences of Northumbria University in Newcastle-upon-Tyne (UK). He is also the Director of Enterprise and Engagement, and leads Bio-Health Informatics Research Team and Big Data Analytics Lab within the department. In addition to his academic duties, he is an Advisory Board Member of the North East Satellite Applications Centre of Excellence, Steering Group Member of Digital Catapult North East and Tees Valley, and a member of the CyberNorth Initiative in the UK. Further information about his projects and publications can be found at http://computing.unn.ac.uk/staff/yqqd6/home.htm

Jędrzej Bieniasz
Warsaw University of Technology, Poland


Speech Title: Can your OSN profile be a part of the biggest data leakage in history
Abstract: Steganography seems to be a very promising technology for sharing information, especially at the time ?before‖ post quantum cryptography, when there is still a need for the design of tools to communicate securely and no certainty that most of the contemporary cryptography will survive. As it is observed recently, major attention has been paid to constructing image and network steganography methods. Lately, less effort has been applied to text steganography and this presentation revisited this attractive area for research in combination with social media. The idea of StegHash was applied into a novel type of mass storage called SocialStegDisc. It is based on the use of hashtags on various social networks to connect multimedia files, like images, movies or songs, with embedded hidden messages. The concept is characterized with the unlimited data space and the limited address space. Three versions of SocialStegDisc were developed:

1) with direct application of StegHash
2) with elimination of dictionary of used permutations of hashtags
3) with fully dynamic generation and reproduction of multimedia object chains

The third version is the most significant output of our work, which we would like to introduce. At first, the concept was implemented as an interactive console application which replicates the well-known interface of filesystems in Unix terminals. Next, the application of SocialStegDisc as a submodule of a malware bootloader was investigated. In this scenario, the malware bootloader accesses a storage based on SocialStegDisc remotely from where it downloads the execution code. As an example, we used the code to establish a reverse connection which mimics the real situation of cyber-attack

 

 

GALLERY of ICFSP History

Co-sponsored by