Music
Science
So, welcome to this lecture on multimedia security.
It is the first time that I'm offering this lecture, so let's see what works and what
doesn't work and so on.
But I hope I prepared a nice and interesting program.
And of course, if we remain like six or seven people or something like this, then it just
means okay, everything is more relaxed.
So I'm giving the lecture, I'm also giving the exercise, so it's sort of like a full
stack teaching thing.
And if, I mean, seven people is perfect for an exercise, it's just nice.
And depending on how we go and what your background is and prior knowledge and so on, we can,
I mean, I can, it's much easier for me to adapt to you.
So okay, so first of all, maybe let's find that out.
If you could quickly tell me what you're studying and in which semester you are or so.
My name is Mox.
Okay, your name, that's even better.
You can't stay anonymous if you're like.
Forget that.
I'm studying computer science master's program in first semester.
Okay.
I'm studying computer science and master's.
Okay.
I'm studying computational and material science.
Computational engineering.
Computational engineering.
Computer science and master's.
Master, master, yeah.
I study medical engineering.
Right, thank you.
Okay, so we have like five computer scientists and one computational engineer and a medical
engineer.
Yeah, okay.
Okay, nice.
So the reason why I'm asking, it's a little bit unfortunate that I cannot project anything
today, but the reason why I'm asking is because multimedia security, actually it's more or
less it's a bunch of applications of and like the underlying research fields, you would
probably say, ah, that's either signal processing or statistics or computer vision.
Like it's a little bit from everything, like depending on what specifically you are interested
in.
Hi.
So if you want to enter, you need to tell me what you are studying and...
Computer science.
Okay.
Let's make six.
So thank you.
So the set of tools that we will need is broad and then of course let's save the time where
we can save the time.
So whatever you know already, that's great.
We just move ahead a little bit quicker.
Presenters
Zugänglich über
Offener Zugang
Dauer
00:49:26 Min
Aufnahmedatum
2017-10-16
Hochgeladen am
2019-04-26 14:59:02
Sprache
en-US
Empfohlene Literatur
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
ECTS-Informationen: Title: Multimedia Security
Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
-
What is a Fourier transform, and why is it interesting for image processing?
-
What is the Bayes rule?
-
Write down a filter kernel for high-pass filtering of an image.
Here are a few questions for self-assessment on the C++ part:
-
What is the difference of a pointer and a reference?
-
How can I define an inherited class in C++?
-
When do I need to implement a copy constructor?
-
What are the meanings of the keyword "const"?
Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.
Literature
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30