9 - Multimedia Security/ClipID:10782 previous clip next clip

The automatic subtitles generated using Whisper Open AI in this video player (and in the Multistream video player) are provided for convenience and accessibility purposes. However, please note that accuracy and interpretation may vary. For more information, please refer to the FAQs (Paragraph 14).
Recording date 2017-12-18

Via

Free

Language

English

Organisational Unit

Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)

Format

lecture

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen:
Title:
Multimedia Security

 

Prerequisites
The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents
Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen
Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30

Up next

Riess, Christian
Dr. Christian Riess
2018-01-08
Free
Riess, Christian
Dr. Christian Riess
2018-01-22
Free
Riess, Christian
Dr. Christian Riess
2018-02-05
Free

More clips in this category "Technische Fakultät"

2024-07-19
Studon
protected  
2024-07-19
IdM-login
protected  
2024-07-18
Free
public  
2024-07-19
Studon
protected  
2024-07-19
IdM-login
protected