Diese Seite ist ein Ausdruck von: https://omen.cs.uni-magdeburg.de/fz/contenido48/cms/front_content.php?lang=1&idart=490&idcat=160
Course "Multimedia and Security" Summer term 2014
Lecturers:
Prof. Dr.-Ing. Jana Dittmann, Prof. Dr.-Ing. Claus Vielhauer (lecture)
Dr.-Ing. Christian Krätzer (exercise)
Time of Lecture, room:
Wed. 11:15 - 12:55, G29-K059
Please note: there will be no lecture on June 25th, 2014 - to compensate for this fact every other lecture will be 10 minutes longer
Exercises:
Exercise: Thursday 09:15-10:45, G29-E037
Reserved Lab time for the recording / aquisition of the media data repositories: Monday 13:15-14:45, G29-146
Remarks:
The first lecture will be held on: 02.04.2014
The first exercises will be on: 03.04.2014
Registration:
The lecture is limited to 20 students Please register: here
Course classification:
All Master courses offered at the FIN
Type: Lecture 2 SWS and Exercise 2 SWS
ETCS Credits: 6
Computervisualistik - Master (CV;M)
Bereich Computervisualistik
Anwendungen der Computervisualistik
Wirtschaftsinformatik - Master (WIF;M)
Austauschschwerpunkte im Bereich Informatik
Sicherheit und Kryptologie
Ingenieurinformatik - Master (IngINF;M)
Bereich Informatik
Sicherheit und Kryptologie
Informatik - Master (INF;M)
Bereich Informatik
Sicherheit und Kryptologie
Data & Knowledge Engineering (neu) - Master (DKE-neu;M)
Applications
Content:
Focus of this lecture is the security of multimedia applications. The student will obtain the knowledge to apply multimedia specific security protocols to media like image, audio and video.
Exam:
Beginning with this semester the oral exam is replaced by a combination of presentation and seminar paper (in German: "Referat") on a given course topic.
The topics are drawn from the fields of hidden communication, digital watermarking, perceptual hashing, forensics and biometrics. Each topic is restricted to a student team of 2 students and focusses on the the realisation of an own setup of demonstrators and experimental setup (requires code adaptation) of a media security mechanism (e.g. an image manipulation detection algorithm), the collection and documentation of a media data repository generated as a joint effort by all student teams and the evaluation of the mechanism using the media data repository generated as a joint effort by all student teams.
Due tue the increased effort for the students as well as teaching staff, the course size is restricted to 20 participants.
Lecture notes:
The course material is provided in English.
Slides of the lecture:
Exercise material:
The exercise topics are found here (after the first exercise).
Report template:
Additional Material:
Which will be discussed during the course (please read this material before the course topic, see blue links in the script "Students: please read this paper before the course"):