Music
All right.
And yeah, welcome to Multimedia Security.
Today I will walk through a number of methods
that are specific for the JPEG format.
Some image forensics methods that make use of the JPEG format.
And the papers that I've selected,
they are all from the group of Honey Farid.
But there are also other groups,
like the group by Alessandro Piva.
We had a look at a couple of their papers
for the watermarking topic.
They also did a lot on JPEG forensics, for example.
There's also Qi Wu Huang from China.
So looking specifically into the JPEG format
to detect manipulations in images has been a popular topic.
First of all, how does the JPEG compression work?
We already talked about this,
but let's restate this.
So the JPEG encoding
roughly works like this.
We have as input,
we have a three channel RGB image.
And the steps are convert RGB
to another color space that is called YCBCR.
So Y is the luminance, brightness.
And CB is the blue chromaticity.
And CR is the red chromaticity.
The idea is that once we have the luminance
singled out or separated from the colors,
we can apply compression of different strength.
So we are a little bit more careful with the luminance
because the eye is more sensitive to luminance changes.
And we can apply a stronger compression
on the blue and red color chromaticity.
So green is missing because the green chromaticity
is what is missing in order to add these values
up to unity or to 255 depending on what your basis is.
Okay, the second step is to subsample each channel.
That's an optional step.
Subsample each channel
by a factor of two, three, four.
So these are the typical factors.
In principle, you could do more.
So this subsampling is typically done
on the color channel also,
but it's arguing that we don't see these changes anyways
so much.
And then third step is to subdivide the image
into eight by eight blocks
Presenters
Zugänglich über
Offener Zugang
Dauer
01:30:16 Min
Aufnahmedatum
2018-01-22
Hochgeladen am
2019-04-27 00:29:03
Sprache
en-US
Empfohlene Literatur
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
ECTS-Informationen: Title: Multimedia Security
Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
-
What is a Fourier transform, and why is it interesting for image processing?
-
What is the Bayes rule?
-
Write down a filter kernel for high-pass filtering of an image.
Here are a few questions for self-assessment on the C++ part:
-
What is the difference of a pointer and a reference?
-
How can I define an inherited class in C++?
-
When do I need to implement a copy constructor?
-
What are the meanings of the keyword "const"?
Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.
Literature
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30