Imaging Security


Image & Video processing is part of many applications related to security: digital watermarking, steganography, image forensics, biometrics, and video surveillance.

  • Digital Watermarking allows owners or providers to hide an invisible and robust message inside a digital Multimedia document, mainly for security purposes such an owner or content authentication. There is a complex trade-off between the different parameters: capacity, visibility and robustness.
  • Steganography is the art and science of writing hidden messages (in a picture or a video) in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message.
  • Image Forensics includes two main objectives:

    • To determine through which data acquisition device a given image is generated;
    • To determine whether a given image has undergone any form of modification or processing.
  • Biometrics: The security fields use three different types of authentication something you know, something you have, ore something you are: a biometric. Common physical biometrics includes fingerprints, hand geometry; and retina, iris or facial characteristics. Behavioural characters include signature, and voice. Ultimately, the technologies could find their strongest role as intertwined and complementary pieces of a multifactor authentication system. In the future biometrics is seen playing a key role in enhancing security, residing in smart cards and supporting personalized Web e-commerce services. Personalization through person authentication is also very appealing in the consumer product area. This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.
  • Video surveillance is the monitoring of the behaviour, activities, or other changing information, usually of people to influence, manage, directing, or protecting. By default, for a better scene understanding, automatic image processing tools are used between acquisition/transmission and visualization or storage.

Teaching and Learning Methods: This course includes a limited amount of problem sessions and lab sessions.

Course Policies: Attendance at practical sessions is mandatory.

  • Book: KATZENBEISSER S., PETITCOLAS A. P. F. Information hiding techniques for steganography and digital watermarking. Artech House Books, 1999, 220 p.
  • Publication: AKHTAR Z., HADID A., NIXON M., TISTARELLI M., DUGELAY J-L., MARCEL S. Biometrics: in search of identity and security (Q & A). IEEE Multimedia, Vol. PP, N°99, June 2017. Redi, J. et al.
  • Publication: TURK A. M., PENTLAND A. P. Face recognition using eigenfaces. Computer Vision and Pattern Recognition, 1991. Proceedings {CVPR'91.}, Computer Society Conference in 1991.


It would be good if you already have some knowledge about signal/image processing and coding, Matlab and OpenCv, but it is not mandatory.


The course is composed of a series of six 3-hour sessions:

  • Lecture on biometrics
  • Lab. session on Eigenfaces
  • Lecture on Digital watermarking, Steganography and Image Forensics
  • Lab. session on Image Integrity
  • Lecture on Video Surveillance
  • Problem Session on past exams.

Learning outcomes:  

  • Become familiar with major image and video processing tools and techniques for security applications.

Nb hours: 21.00


  • Exam QLect – 1 hour – unauthorised documents (80% of the final grade)
  • Lab. reports (20% of the final grade).