Governments and organizations across the world are increasingly adopting digital forensic tools and biometric technologies to face identification frauds, civil crimes, and terrorism. Along this line, a big effort has been spent to promote worldwide adoption of biometric Identification documents such as biometric e-passport, bank cards, etc.
Although the goals of biometrics and forensics are different, they are both aimed at supporting law enforcement and investigation by exploiting technologies that change and evolve on a daily basis. Increasingly, new scenarios arise where techniques designed for biometrics can be utilized for forensic purposes, or vice-versa. This is the case of multiple face or fingerprint images captured with low-quality devices, which can be processed with super resolution techniques to reconstruct a high resolution image. In a similar way, sketches drawn by forensic artists based on witnesses’ description can be treated with hallucination techniques to tentatively identify the subject.
The 2nd International Workshop on Recent Advances in Digital Security: Biometrics and Forensics (BioFor 2019) focuses on the ongoing research in the fields of security, forensics, and biometrics, which include many key sectors like Forensics Analysis, Watermarking & Data Hiding, Steganography, Surveillance, Biometrics and Soft Biometrics, Biometric analysis of crime scene traces, etc. It also aims to be an international forum where scientist and researchers can develop synergies between the biometrics and forensic research areas. BioFor 2019 will be held in Trento (Italy) on September 10th, 2019 in conjunction with the 20th International Conference on Image Analysis and Processing (ICIAP).
The workshop calls for submissions addressing, but not limited to, the following topics:
- Anonymity & Privacy
- Applied Cryptography
- Biometrics and Soft Biometrics
- Audiovisual biometrics for multimedia forensics
- Forensic behavioural biometrics
- Biometric analysis of crime scene traces
- Communication & Physical-Layer Security
- Forensics Analysis
- Adversarial machine learning
- Deep learning
- Hardware Security
- Information-Theoretic Security
- Multimedia Content Hash
- Security of Large Networked Systems
- Usability & Human Factors
- Watermarking & Data Hiding
- Covert Communication & Side Channel Attacks
The authors of selected papers will be invited to submit an extended version to a special issue for ''Pattern Recognition Letter''.