11 - Multimedia Security [ID:10784]
50 von 607 angezeigt

Music

All right.

And yeah, welcome to Multimedia Security.

Today I will walk through a number of methods

that are specific for the JPEG format.

Some image forensics methods that make use of the JPEG format.

And the papers that I've selected,

they are all from the group of Honey Farid.

But there are also other groups,

like the group by Alessandro Piva.

We had a look at a couple of their papers

for the watermarking topic.

They also did a lot on JPEG forensics, for example.

There's also Qi Wu Huang from China.

So looking specifically into the JPEG format

to detect manipulations in images has been a popular topic.

First of all, how does the JPEG compression work?

We already talked about this,

but let's restate this.

So the JPEG encoding

roughly works like this.

We have as input,

we have a three channel RGB image.

And the steps are convert RGB

to another color space that is called YCBCR.

So Y is the luminance, brightness.

And CB is the blue chromaticity.

And CR is the red chromaticity.

The idea is that once we have the luminance

singled out or separated from the colors,

we can apply compression of different strength.

So we are a little bit more careful with the luminance

because the eye is more sensitive to luminance changes.

And we can apply a stronger compression

on the blue and red color chromaticity.

So green is missing because the green chromaticity

is what is missing in order to add these values

up to unity or to 255 depending on what your basis is.

Okay, the second step is to subsample each channel.

That's an optional step.

Subsample each channel

by a factor of two, three, four.

So these are the typical factors.

In principle, you could do more.

So this subsampling is typically done

on the color channel also,

but it's arguing that we don't see these changes anyways

so much.

And then third step is to subdivide the image

into eight by eight blocks

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

01:30:16 Min

Aufnahmedatum

2018-01-22

Hochgeladen am

2019-04-27 00:29:03

Sprache

en-US

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen: Title: Multimedia Security

 

Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30
Einbetten
Wordpress FAU Plugin
iFrame
Teilen