2 - Multimedia Security [ID:10775]
50 von 682 angezeigt

eigentlich desde la primera hora para todo el lado injury.

your it team.

your

Your it team.

We start to talk about watermarking today.

And also next week.

And I'm roughly following a textbook

that is unfortunately the university only has one copy

but it's not necessary.

I try to do it in a way that it's not necessary

that every one of you has a look

into the actual physical copy of that textbook.

But just for reference, it's from

Cox Miller and Bloom.

And the title is just Digital Watermarking.

It's rather old so the years,

I think the first edition is from 2002

from Morgan Kaufman.

Yeah, so it looks like a book with a lot of pages

but actually it goes really slowly

and the information density is not so high.

So it's friendly to read

but I'm jumping a little bit

because still it's too much content

to really talk about everything in two hours or so.

So first of all, what is watermarking?

So watermarking means, or the idea of watermarking

is that we embed information into some multimedia item

in the most general form.

So the idea of watermarking

is to embed information or a message,

embed a message

into a multimedia item

or let's just call it a work

by someone if we think about copy protection or so.

In a way

that it is visually unobtrusive

and unobtrusive

But hard to separate from the content.

There are certainly better definitions for digital watermarks, but to have something

to talk about it, I think that will do.

And we sort of clarify this loose definition by just looking at a couple of potential applications

of digital watermarks.

So one application, I'm just following a list from the book, is broadcast monitoring.

They provide an example there, consider a company like Coca Cola or so paying for television

advertising towards television networks, and they would like to validate or verify that

their spots have been aired at certain times in certain areas and so on.

But the distribution channels might be noisy, like television signals coming over satellites,

whatever.

So instead of relying on some image recognition or so of the spots, could say, okay, like

Teil einer Videoserie :

Zugänglich über

Offener Zugang

Dauer

01:27:30 Min

Aufnahmedatum

2017-10-30

Hochgeladen am

2019-04-26 18:49:02

Sprache

en-US

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Empfohlene Literatur
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

ECTS-Informationen: Title: Multimedia Security

 

Prerequisites The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")
Here are a few questions for self-assessment on the image processing part:
  • What is a Fourier transform, and why is it interesting for image processing?

  • What is the Bayes rule?

  • Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:

  • What is the difference of a pointer and a reference?

  • How can I define an inherited class in C++?

  • When do I need to implement a copy constructor?

  • What are the meanings of the keyword "const"?

 

Contents Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

 

Literature
  • Farid: "Photo Forensics"
  • Sencar, Memon: "Digital Image Forensics"

  • Oppenheim, Schafer: "Discrete-Time Signal Processing"

A number of scientific publications will be provided as additional reading in the course of the lecture.

 

Zusätzliche Informationen Schlagwörter: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection
Erwartete Teilnehmerzahl: 20, Maximale Teilnehmerzahl: 30
Einbetten
Wordpress FAU Plugin
iFrame
Teilen