Navigation

Multimedia Security

Lecturers

Details

Time and place:

  • Thu 16:00-18:00, Room 00.153-113

Fields of study

  • WPF INF-MA from SEM 1
  • WPF IuK-MA from SEM 1

Prerequisites / Organisational information

The majority of the methods are applications of signal processing. Thus, it is recommended to bring prior basic knowledge either in signal processing, pattern recognition, image processing, or related fields. Additionally, it is important to bring basic knowledge of C++ (nothing fancy, but "reasonable working skills")

Here are a few questions for self-assessment on the image processing part:
- What is a Fourier transform, and why is it interesting for image processing?
- What is the Bayes rule?
- Write down a filter kernel for high-pass filtering of an image.

Here are a few questions for self-assessment on the C++ part:
- What is the difference of a pointer and a reference?
- How can I define an inherited class in C++?
- When do I need to implement a copy constructor?
- What are the meanings of the keyword "const"?

Content

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

Recommended Literature

- Farid: "Photo Forensics" - Sencar, Memon: "Digital Image Forensics" - Oppenheim, Schafer: "Discrete-Time Signal Processing" A number of scientific publications will be provided as additional reading in the course of the lecture.

ECTS information

Title

Multimedia Security

Content:

Participants of this lecture obtain an overview of the field of Multimedia Security. This includes a variety of security-related questions around multimedia data. In particular, we present key results and techniques from image forensics, steganography, watermarking, and biometrics. Selected algorithms are implemented and tested by the participants. It is helpful to bring prior experience in signal processing or pattern recognition.

Literature:

- Farid: "Photo Forensics" - Sencar, Memon: "Digital Image Forensics" - Oppenheim, Schafer: "Discrete-Time Signal Processing" A number of scientific publications will be provided as additional reading in the course of the lecture.

Additional information

Keywords: Steganography, Watermarking, Multimedia Forensics, Data Hiding, Copyright Protection

Expected participants: 20