Back to main page Research Interests Teaching Publications Contact me Search the site

Homepage for the Discipline MO447 and MC919


Class Materials | Support Material | Presentations | Practical Assignments


Presentation

Professor: Anderson Rocha

Class Day Time Room
A Wednesdays 19-20:40 CB14
Fridays 21-22:40 CB03


Extra Class Office Policy: Schedule by e-mails.

Avisos:

20/09/2013 Presentation templates are already available
01/08/2013 Class description, rules and syllabus are already available


Class Materials

Class #0 - Presentation of the Discipline. Syllabus. 151 KB

(PDF)

Class #1 and #2 -- Introduction to Digital Forensics

Reading: Surveys #1, #3, #4 and #5 on digital forensics mentioned in class and in the document above
29.3 MB

(PDF)

Class #3 and #4-- File Carving and Smart File Carving

Reading: The evolution of file carving -- the benefits and problems of forensics recovery. Anandabrata Pal and Nasir Memon. IEEE Signal Processing Magazine, 26(2):59-71, March 2009.
3.6 MB

(PDF)

Up

Class #4 -- Are EXIF telltales really non-reliable?

Reading: Forensic Analysis of Ordered Data Structures on the Example of JPEG Files. Thomas Gloe. 2012 IEEE International Workshop on Information Forensics and Security, December, 2012.
1.6 MB

(PDF)

Class #5 -- Image Authentication through embedded thumbnails

Reading: Digital Image Authentication from Thumbnails. Kee, E., Farid, H. Symposium on Electronic Imaging, pp. 1-10, 2010.
4.8 MB

(PDF)

Class #6 -- An Extreme Value Theory Approach to Visual Attributes. Prof. Walter J. Scheirer (Harvard University)

Readings:
  • Describable Visual Attributes for Face Verification and Image Search. N. Kumar, A. Berg, P. Belhumeur, and S. Nayar. IEEE Trans. on Pattern Analysis and Machine Intelligence (T.PAMI), 2011.
  • Multi-Attribute Spaces: Calibration for Attribute Fusion and Similarity Search. W. Scheirer, N. Kumar, P. Belhumeur, and T. Boult. IEEE Intl. Conference on Computer Vision and Pattern Recognition (CVPR), 2012.
8.2 MB

(PDF)

Up

Class #7 and #8-- Multimedia Phylogeny

Readings:
  • Image Phylogeny by Minimal Spanning Trees. Z. Dias, and A. Rocha and S. Goldenstein. IEEE Transactions of Information Forensics and Security (T.IFS), 2012.
  • Video Phylogeny: Recovering Near- Duplicate Video Relationships. Z Dias, A Rocha, and S Goldenstein. IEEE Intl. Workshop on Information Forensics and Security (WIFS), 2011.
16.2 MB

(PDF)

Class #9-- Crimes and their investigation - Prof. Vera Kerr, University of Mackenzie, Campinas.

16.2 MB

(PDF)

Class #10 and #11-- Sensitive Media Detection (e.g., Pornography, Violence, etc.).

Reading: Content-Based Filtering for Video Sharing Social Networks (PDF)
15.2 MB

(PDF)

Up

Class #12 -- Spoofing Creation and Detection (e.g., Fingerprints, Faces and Irises.).

Reading: Spoof detection schemes (PDF)
3.3 MB

(PDF)

Class #12 -- Method's Detailing for Face Spoofing Detection.

Reading: Video-Based Face Spoofing Detection through Visual Rhythm Analysis (PDF)
6.4 MB

(PDF)

Up

Class #13 and #14-- Information Hiding: Steganography and Steganalysis (Part I)

Reading: Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? (PDF)
5.7 MB

(PDF)

Up

Class #13 and #14-- Information Hiding: Steganography and Steganalysis (Part II)

Reading: Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? (PDF)
6.4 MB

(PDF)

Class #14 and #15-- Forensics Attribution (Cameras, Scanners, Printers)

Reading I: Printer and Scanner Attribution by Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Sungjoo Suh and Jan P. Allebach and George T. C. Chiu and Edward J. Delp.

Reading II: Determining Image Origin and Integrity Using Sensor Noise by Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukas.
5.4 MB

(PDF)

Class #16 -- Cloning Detection

Reading I: Ewerton Silva's master dissertation (PDF)

6.5 MB

(PDF)

Up

Class #17 -- Eye specular highlights telltales for digital forensics

Reading I: Eye specular highlights telltales for digital forensics by P. Saboia, T. Carvalho and Anderson Rocha, ICIP, 2011.

4.0 MB

(PDF)

Class #18 -- Forgery detection through inconsistencies in illumination maps

Reading I: Exposing Digital Image Forgeries by Illumination Color Classification by T. Carvalho et al. IEEE T.IFS, 2013).

28.9 MB

(PDF)

Class #19 -- Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts

Reading I: Image Forgery Localization via Fine-Grained Analysis of CFA Artifacts by P. Ferrara, T. Bianchi, A. De Rosa, and A. Piva (IEEE T.IFS, 2013)

2.3 MB

(PDF)

Up

Seminar #1 -- Measurement and Analysis of Child Pornography Trafficking on P2P Networks



755 KB

(PDF)

Seminar #2 -- Exposing Photo Manipulation with Inconsistent Shadows



16.8 MB

(PPT)

Seminar #3 -- A perceptual metric for photo retouching



7.5 MB

(PPTX)

Up

Seminar #4 -- Digital Image Authentication from JPEG Headers



730 KB

(PDF)

Seminar #5 -- Cloud Forensics



576 KB

(PDF)

Seminar #6 -- Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints



12.7 KB

(PPTX)

Up

Support Materials

Presentation Templates.

Up

Practical Assignments

Practical Assignments. Use this model for preparing the article/report related to the practical assignments.

Up