7 - Multimedia Security [ID:10780]
50 von 595 angezeigt

exclusive data to leverage on 승min.

If your mother also doesn't have

Sounds like a lot of work.

$28K

Alright, so welcome to multimedia security.

Sorry for not putting up the steganography papers earlier,

but here they are now, since today.

There are four papers in Stutton at the usual place

in the subdirectory literature.

So, four papers from the same group.

So, this is not the only group that has worked on steganography,

but I find this particular combination of the papers very interesting.

And I will explain this in a minute.

But that is the reason why the same actors or authors reappear here

in all these four papers.

So, what are these papers?

So, here's an abbreviation of the place or the journal where this paper was published.

So, IH is the Information Hiding Conference 2011.

That was also at Information Hiding 2011.

That was at Information Hiding 2010.

So, these are three conference papers, and this is a journal paper

from Transactions on Information Forensics and Security 2010.

Okay, so when you submit a paper to a journal, it takes a while until it is reviewed.

Then they say, oh, can you please change this, or I don't understand that.

So, it comes back to you, you change it again, send it back.

It again takes an awful lot of time to review it and so on.

So, knowing that Transactions on Information Forensics was published in 2010,

it means that the work itself was done in 2008 or 2009, and then they send it there.

Conferences are quicker because it's a binary decision.

So, you send something there, someone reads it, maybe even reads it very quickly,

and then decides whether he or she likes it or doesn't, and then it's accepted or it's not.

So, that means in terms of temporal ordering, this is the oldest work.

Then comes Information Hiding 10, and then comes Information Hiding 11.

Okay, so the nice thing about these papers is that they together sort of tell a story,

like a pattern recognition, steganography story, which makes it actually so nice to look at them,

and then we can get from the sometimes complicated technical content.

But let's abstract ourselves a little bit from that.

And today I would like to sort of retell that story, and we can, I mean, at a fairly abstract level,

and we can talk about additional details, if you like, in the exercises on Thursday,

or if really necessary, next week, but I would like to start another topic next week, ideally.

Okay, so what is that story?

Yes, let's start with the oldest paper, the Transactions on Information Forensics and Security 2010.

So, the title, okay, let's look at the authors first. So, Tomas, he was either a PhD student or a postdoc at that time.

So, he was relatively, like comparatively junior.

Patrick and Jessica, they are in the business already for a long time, and they are well known in the field.

And they submitted this work, Steganalysis, by subtractive pixel adjacency matrix.

So, Steganalysis, it means our goal is to discover that a steganographic message has been embedded into an image.

And the claim is, this paper presents a method for detection of steganog, is that readable at all?

Yes? Okay.

This paper presents a method for detection of steganographic methods that embed in the spatial domain.

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

01:20:06 Min

Aufnahmedatum

2017-12-04

Hochgeladen am

2019-04-26 14:59:16

Sprache

en-US

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen: Title: Multimedia Security

 

Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30
Einbetten
Wordpress FAU Plugin
iFrame
Teilen