1 - Multimedia Security [ID:10774]
50 von 523 angezeigt

Music

Science

So, welcome to this lecture on multimedia security.

It is the first time that I'm offering this lecture, so let's see what works and what

doesn't work and so on.

But I hope I prepared a nice and interesting program.

And of course, if we remain like six or seven people or something like this, then it just

means okay, everything is more relaxed.

So I'm giving the lecture, I'm also giving the exercise, so it's sort of like a full

stack teaching thing.

And if, I mean, seven people is perfect for an exercise, it's just nice.

And depending on how we go and what your background is and prior knowledge and so on, we can,

I mean, I can, it's much easier for me to adapt to you.

So okay, so first of all, maybe let's find that out.

If you could quickly tell me what you're studying and in which semester you are or so.

My name is Mox.

Okay, your name, that's even better.

You can't stay anonymous if you're like.

Forget that.

I'm studying computer science master's program in first semester.

Okay.

I'm studying computer science and master's.

Okay.

I'm studying computational and material science.

Computational engineering.

Computational engineering.

Computer science and master's.

Master, master, yeah.

I study medical engineering.

Right, thank you.

Okay, so we have like five computer scientists and one computational engineer and a medical

engineer.

Yeah, okay.

Okay, nice.

So the reason why I'm asking, it's a little bit unfortunate that I cannot project anything

today, but the reason why I'm asking is because multimedia security, actually it's more or

less it's a bunch of applications of and like the underlying research fields, you would

probably say, ah, that's either signal processing or statistics or computer vision.

Like it's a little bit from everything, like depending on what specifically you are interested

in.

Hi.

So if you want to enter, you need to tell me what you are studying and...

Computer science.

Okay.

Let's make six.

So thank you.

So the set of tools that we will need is broad and then of course let's save the time where

we can save the time.

So whatever you know already, that's great.

We just move ahead a little bit quicker.

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

00:49:26 Min

Aufnahmedatum

2017-10-16

Hochgeladen am

2019-04-26 14:59:02

Sprache

en-US

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen: Title: Multimedia Security

 

Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30
Einbetten
Wordpress FAU Plugin
iFrame
Teilen