Lecture: Multimedia & Security

Dozenten / Course Leader:

Prof. Dr. Jana Dittmann

Type: Course 2 and Exercise 2 (V2+Ü2), Applied Computer Science
Credits: 6
More Infos

Die Veranstaltung wird auch für den Masterstudiengang Computer Visualistic angeboten, so dass die Unterlagen in englischer Sprache zur Verfügung gestellt werden.
The course will be held also for master students, the course material is provided in English.

Time of Lecture:

Course: Wed 11am-1pm
Building-Room: G29-335
The first course will be held on 12.04.2006!

Exercise: Thu 1-3 PM
Building-Room: G29-307
As we have poster presentations we have selected the lecture hall. The first exercise will be held on 20.04.2006!

Inhalt / Content:

Der/die Studierende soll Sicherheitsprobleme in Multimediaanwendungen
erkennen und lösen können. Dafür soll er/sie Multimedia spezifische
Umsetzungen von Sicherheitsprotokollen für Bild, Video und Audio
erlernen und anwenden können.

  1. Motivation, Introduction and Basics
  2. Intellectual Property Rights (IPR), Digital Rights Management (DRM)
  3. Access Protection
    Pay-TV
    Scrambling and Encryption of Video-and Audio Data
  4. Hidden Communication: Steganography
  5. Authenticity and Integrity of digital Media
    Electronic Signatures
    Digital Watermarking
    Perceptual Hashing
    Digital Forensics
    User Authentication: Multimodal Biometrics

Prüfungsvoraussetzung / Examination Prerequisites: Ausarbeitung und Vortrag zur Projektaufgabe / Project work and presentation
Prüfung: mündliche Prüfung / Oral Examination

Handouts/Lecture notes

Material 1

Lecturnity Records:


MM&SEC 22th June 2005


Übung / Exercise Material:

Theme
Questionaire

 

Zusätzliche / Additional Material:

which will be discussed during the course (please
read this material before the course topic, see blue links in the script
"Students: please read this paper before the course"):

  • Introduction Paper: Dittmann/Wohlmacher/Nahrstedt, Approaches to Multimedia and Security: Cryptographic and watermarking algorithms (link to pdf)
  • Watermarking Algorithm Paper: Paper from Zhao and Koch (link to pdf)
  • Watermarking Benchmarking paper from Macq/Dittmann/Delp (link to pdf)
  • S. Lyu, D. Rockmore and H. Farid: A Digital Technique for Art Authentication, Proceedings of the National Academy of Sciences, 101(49):17006-17010, 2004 (link to pdf)
  • Rebecca T.Mercuri, The Many Colors of Multimedia Security (link to pdf)
  • IT-Security Begriffe und Glossar (link to web)
  • Hyoung Joong Kim: Audio Watermarking Techniques (link to pdf)

 


Last Change: 22.01.2007

Sie können eine Nachricht versenden an: Webmaster
Sicherheitsabfrage:
Captcha
 
Lösung: