This will count as one of your downloads.
You will have access to both the presentation and article (if available).
This course will present an integrative overview of recent work of cryptography, digital watermarking, media forensics, and biometrics in the field of multimedia systems. Recent advances in image, video, and audio processing to achieve security are introduced covering the full range of security aspects: data confidentiality, data integrity and authenticity, and non-repudiation, as well as user identification and authentication.
The first part of the course will introduce symmetric (private-key) and asymmetric (public-key) crypto systems to ensure confidentiality along with authentication techniques to ensure integrity and authenticity. Infrastructure solutions for non-repudiation of digital signatures will be discussed.
Furthermore, the course will describe digital watermarking techniques that include both spatial, spectral, and temporal watermarking algorithms, as well as the approaches and roles of steganography, perceptual hashing techniques, and media forensics. The goal is to show which security aspects can be met by security mechanisms, as well as how all mechanisms can be combined usefully to achieve, for example, data authentication. Additionally, the unique nature of these new technologies relative to intellectual property rights and digital rights management systems (DRM) will be presented.
In the second part of the course, particular emphasis will be placed on user authentication techniques by image and signal processing and multimodal approaches by combining and fusing multiple single biometric traits for more convenient and reliable identification or verification of users. Based on a case-by-case examination of the modalities of face (2D and 3D face analysis), fingerprint (fingerprint image analysis), signature (handwriting analysis of visual and dynamic signals), and voice (speech signals), the underlying technical concepts will be elaborated and design paradigms, as well as performance evaluations, will be given.
Biometric technologies are currently on the verge of large-scale deployment in everyday life in applications such as travel documents and access control. Over the past decades, a wide variety of biometric modalities have been suggested, from passive properties like fingerprint, face, and iris recognition to active traits such as voice or signatures. Consequently, with these developments, issues of standardization and system evaluation have emerged recently. As the increasing complexity of these noticeable developments makes it difficult to maintain a comprehensive overview, this tutorial will provide an opportunity for experts and decision-makers to get compact insight in the actual status quo by a well-known expert in the biometric research domain. The goals of this course are fourfold:
• to acquire a general overview with respect to applications for biometrics;
• to discuss the advantages and disadvantages of the most relevant biometric modalities;
• to summarize and elaborate on the actual standards in the domain; and
• to present guidelines for evaluation and classification of biometric user authentication technology in different application domains.
This course will present an overview of recent work of media forensics with focus on sensometrics for sensor identification and signal processing for tamper detection. Particularly, we define sensometrics as the application of methods for the analysis and determination of a particular sensor (capturing or sampling device for digital media), whereby the actual application and context in which the original sampling has been performed can vary. For example, for identifying digital cameras, any photographic image can be taken into account, whereas for identifying pen digitizer, sensors for capturing handwriting samples such as signatures can be analyzed. The general fundamentals will be introduced and specific approaches for selected media examples of image, audio and digital handwritten documents will be discussed to show the recent advances and still open problems.
View contact details
No SPIE Account? Create one