8 - Multimedia Security [ID:10781]
50 von 922 angezeigt

Well, you are welcome to join the session.

I'm

going to ask you about the

But we really soon deviated from the syllabus, the tentative syllabus that I proposed at

the beginning of the semester.

We have a picture.

Yeah.

We'll make this a little bit larger.

So that was the original proposed plan.

So fingerprinting that would also be part of watermarking.

So two hours on watermarking, but then only one hour on steganography, and a little bit

of other topics in between, like the signal processing in the encrypted domain, biometric

cues and so on.

And then, I mean, when we started to talk about stuff, there was a remark like, can

we do a little bit more on steganography or so?

And then it's like, yeah, sure, we can.

It also makes sense from a, I think, from a technical perspective.

So the way I changed this now effectively is...

Again, let's make this a little bit larger.

So I think we had...

I did this from the top of my head.

I hope it's correct, but I think it is.

We did three hours on watermarking, particularly discussing these robustness, payload security,

imperceptibility things, and then looked at the papers to re-identify things.

So it was like three and a half hours on watermarking.

And then we had another half hour meeting, introduction to steganalysis, steganography,

and then a little bit introduction here.

And last time I was referring to this series of papers from the group at Binghamton at

around 2010, 11 or so, showing like, okay, can we do a more complex embedding?

Oh, then we need a more complex detector, and going back and forth.

And I'm just going to wrap this up today and would then move to image forensics to have

the three large topics covered from this information hiding domain and would say, okay, we can

do, for example, the last hour, just make a fly through or so.

What were the things that we actually omitted when we did not talk about biometric cues?

We did not talk about the signal processing in the encrypted domain?

So maybe we can make just a tutorial like or overview like thing of other topics.

As you will see, they are a little bit different.

Like the type of tasks are a little bit different from these three larger ones.

So the larger ones complement each other nicely.

So they are relatively compact in terms of content, tools, and so on.

The other topics are a little bit further out.

So I thought these are better things to sacrifice.

But we can also negotiate that.

If you would like to pick something up for another hour or so, just let me know.

We can.

I mean, it's not a big deal.

Otherwise I would spend really most or almost all of the time remaining in this semester

on image forensics.

I mean, that's also my special field.

So we can make this at an arbitrary level of detail, actually.

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

01:23:44 Min

Aufnahmedatum

2017-12-11

Hochgeladen am

2019-04-26 22:29:03

Sprache

en-US

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen: Title: Multimedia Security

 

Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30
Einbetten
Wordpress FAU Plugin
iFrame
Teilen