ImSecu
Abstract
Image & Video processing is part of many applications related to security: digital watermarking, steganography, image forensics, biometrics, and video surveillance.
- Digital Watermarking allows owners or providers to hide an invisible and robust message inside a digital Multimedia document, mainly for security purposes such an owner or content authentication. There is a complex trade-off between the different parameters: capacity, visibility and robustness.
- Steganography is the art and science of writing hidden messages (in a picture or a video) in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message.
-
Image Forensics includes two main objectives:
- To determine through which data acquisition device a given image is generated;
- To determine whether a given image has undergone any form of modification or processing.
- Biometrics: The security fields use three different types of authentication something you know, something you have, ore something you are: a biometric. Common physical biometrics includes fingerprints, hand geometry; and retina, iris or facial characteristics. Behavioural characters include signature, and voice. Ultimately, the technologies could find their strongest role as intertwined and complementary pieces of a multifactor authentication system. In the future biometrics is seen playing a key role in enhancing security, residing in smart cards and supporting personalized Web e-commerce services. Personalization through person authentication is also very appealing in the consumer product area. This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.
- Video surveillance is the monitoring of the behaviour, activities, or other changing information, usually of people to influence, manage, directing, or protecting. By default, for a better scene understanding, automatic image processing tools are used between acquisition/transmission and visualization or storage.
Teaching and Learning Methods: This course includes a limited amount of problem sessions and lab sessions.
Course Policies: Attendance at practical sessions is mandatory.
Bibliography
- Book: KATZENBEISSER S., PETITCOLAS A. P. F. Information hiding techniques for steganography and digital watermarking. Artech House Books, 1999, 220 p.
- Publication: AKHTAR Z., HADID A., NIXON M., TISTARELLI M., DUGELAY J-L., MARCEL S. Biometrics: in search of identity and security (Q & A). IEEE Multimedia, Vol. PP, N°99, June 2017. Redi, J. et al.
- Publication: TURK A. M., PENTLAND A. P. Face recognition using eigenfaces. Computer Vision and Pattern Recognition, 1991. Proceedings {CVPR'91.}, Computer Society Conference in 1991.
Requirements
It would be good if you already have some knowledge about signal/image processing and coding, Matlab and OpenCv, but it is not mandatory.
Description
The course is composed of a series of six 3-hour sessions:
- Lecture on biometrics
- Lab. session on Eigenfaces
- Lecture on Digital watermarking, Steganography and Image Forensics
- Lab. session on Image Integrity
- Lecture on Video Surveillance
- Problem Session on past exams.
Learning outcomes:
- Become familiar with major image and video processing tools and techniques for security applications.
Nb hours: 21.00
Evaluation:
- Exam QLect – 1 hour – unauthorised documents (80% of the final grade)
- Lab. reports (20% of the final grade).