eigentlich desde la primera hora para todo el lado injury.
your it team.
your
Your it team.
We start to talk about watermarking today.
And also next week.
And I'm roughly following a textbook
that is unfortunately the university only has one copy
but it's not necessary.
I try to do it in a way that it's not necessary
that every one of you has a look
into the actual physical copy of that textbook.
But just for reference, it's from
Cox Miller and Bloom.
And the title is just Digital Watermarking.
It's rather old so the years,
I think the first edition is from 2002
from Morgan Kaufman.
Yeah, so it looks like a book with a lot of pages
but actually it goes really slowly
and the information density is not so high.
So it's friendly to read
but I'm jumping a little bit
because still it's too much content
to really talk about everything in two hours or so.
So first of all, what is watermarking?
So watermarking means, or the idea of watermarking
is that we embed information into some multimedia item
in the most general form.
So the idea of watermarking
is to embed information or a message,
embed a message
into a multimedia item
or let's just call it a work
by someone if we think about copy protection or so.
In a way
that it is visually unobtrusive
and unobtrusive
But hard to separate from the content.
There are certainly better definitions for digital watermarks, but to have something
to talk about it, I think that will do.
And we sort of clarify this loose definition by just looking at a couple of potential applications
of digital watermarks.
So one application, I'm just following a list from the book, is broadcast monitoring.
They provide an example there, consider a company like Coca Cola or so paying for television
advertising towards television networks, and they would like to validate or verify that
their spots have been aired at certain times in certain areas and so on.
But the distribution channels might be noisy, like television signals coming over satellites,
whatever.
So instead of relying on some image recognition or so of the spots, could say, okay, like
Presenters
Zugänglich über
Offener Zugang
Dauer
01:27:30 Min
Aufnahmedatum
2017-10-30
Hochgeladen am
2019-04-26 18:49:02
Sprache
en-US
Empfohlene Literatur
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
ECTS-Informationen: Title: Multimedia Security
Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
-
What is a Fourier transform, and why is it interesting for image processing?
-
What is the Bayes rule?
-
Write down a filter kernel for high-pass filtering of an image.
Here are a few questions for self-assessment on the C++ part:
-
What is the difference of a pointer and a reference?
-
How can I define an inherited class in C++?
-
When do I need to implement a copy constructor?
-
What are the meanings of the keyword "const"?
Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.
Literature
- Farid: "Photo Forensics"
-
Sencar, Memon: "Digital Image Forensics"
-
Oppenheim, Schafer: "Discrete-Time Signal Processing"
A number of scientific publications will be provided as additional reading in the course of the lecture.
Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30