Multimedia and Security (summer term 2015)


Lecturers:
Prof. Dr.-Ing. Jana Dittmann, Prof. Dr.-Ing. Claus Vielhauer (lecture)
Dr.-Ing. Christian Krätzer (exercise)


Time of Lecture, room:
Wed. 11:15 - 12:45, G29-K058

Exercises / Reserved Lab time for the recording and acquisition of the media data repositories:
Exercise: Thursday 09:15-10:45, G29-K058

Remarks:
The first lecture will be held on: 08.04.2015
The first exercises will be on: 09.04.2015

Registration:
The lecture is limited to 20 students, please register (Registration opening on March 23rd, 2015): here

Course classification:

All Master courses offered at the FIN
Type: Lecture 2 SWS and Exercise 2 SWS 
ETCS Credits: 6


Computervisualistik - Master (CV;M)
Bereich Computervisualistik
Anwendungen der Computervisualistik

Wirtschaftsinformatik - Master (WIF;M)
Austauschschwerpunkte im Bereich Informatik
Sicherheit und Kryptologie

Ingenieurinformatik - Master (IngINF;M)
Bereich Informatik
Sicherheit und Kryptologie

Informatik - Master (INF;M)
Bereich Informatik
Sicherheit und Kryptologie

Data & Knowledge Engineering (neu) - Master (DKE-neu;M)
Applications


Content:
Focus of this lecture is the security of multimedia applications. The student will obtain the knowledge to apply multimedia specific security protocols to media like image, audio and video.

  • Motivation, Introduction and Basics
  • Intellectual Property Rights (IPR), Digital Rights Management (DRM)
  • Access Protection - Pay-TV, Scrambling and Encryption of Video-and Audio Data, Services on Encrypted Data
  • Hidden Communication: Steganography
  • Digital Watermarking - Robust Watermarking, Fragile Watermarking
  • Perceptual Hashing
  • Digital Forensics and Digitized Forensics
  • Multimodal Biometrics

Exam:
Beginning with summer term 2014 the oral exam used in this course for a decade was replaced by a combination of presentation and seminar paper (in German: "Referat") on a given course topic.
The topics are drawn from the fields of hidden communication, digital watermarking, perceptual hashing, forensics and biometrics. Each topic is restricted to a student team of 2 students and focusses on the the realisation of an own setup of demonstrators and experimental setup (requires code adaptation) of a media security mechanism (e.g. an image manipulation detection algorithm), the collection and documentation of a media data repository generated as a joint effort by all student teams and the evaluation of the mechanism using the media data repository generated as a joint effort by all student teams.

Due tue the increased effort for the students as well as teaching staff, the course size is restricted to 20 participants.

 

Lecture notes:
The course material is provided in English.

Slides of the lecture:

  • Part 1
  • Part 2
  • Part 3
  • Part 4
  • Part 5
  • Part 6
  • Part 7
  • Part 8

Exercise material:

Report template:

Additional Material:
Which will be discussed during the course (please read this material before the course topic, see blue links in the script "Students: please read this paper before the course"):

  • Introduction Paper: Dittmann/Wohlmacher/Nahrstedt, Approaches to Multimedia and Security: Cryptographic and watermarking algorithms (link to pdf)
  • Watermarking Algorithm Paper: Paper from Zhao and Koch (link to pdf)
  • Watermarking Benchmarking paper from Macq/Dittmann/Delp (link to pdf)
  • S. Lyu, D. Rockmore and H. Farid: A Digital Technique for Art Authentication, Proceedings of the National Academy of Sciences, 101(49):17006-17010, 2004 (link to pdf)
  • Rebecca T. Mercuri, The Many Colors of Multimedia Security (link to pdf)
  • IT-Security Begriffe und Glossar (link to web)
  • Ingemar J. Cox, Gwenael Doerr and Teddy Furon: Watermarking Is Not Cryptography. In: Digital Watermarking, Springer LNCS Berlin, Volume Volume 4283, ISBN 978-3-540-48825-5, pp. 1-15. (link to pdf

 

 


Letzte Änderung: 19.10.2016

Sie können eine Nachricht versenden an: Webmaster
Sicherheitsabfrage:
Captcha
 
Lösung: