Back to main page Research Interests Teaching Publications Contact me Search the site

Homepage for the Discipline MO447 and MC919


Class Materials | Support Material | Presentations | Practical Assignments


Presentation

Professor: Anderson Rocha

Class Day Time Room
A Wednesdays 19-20:40 PB11
Fridays 21-22:40 PB11


Extra Class Office Policy: Schedule by e-mails.

Avisos:

03/09/2014 Class description, rules and syllabus are already available


Class Materials

Class #0 - Presentation of the Discipline. Syllabus. 148 KB

(PDF)

Class #1 and #2 -- Introduction to Digital Forensics

Reading: Surveys #1, #3, #4 and #5 on digital forensics mentioned in class and in the document above
31.8 MB

(PDF)

Class #3 -- File Carving and Smart File Carving

Reading: The evolution of file carving -- the benefits and problems of forensics recovery. Anandabrata Pal and Nasir Memon. IEEE Signal Processing Magazine, 26(2):59-71, March 2009.
3.5 MB

(PDF)

Up

Class #4 -- Cloning Detection

Reading I: Ewerton Silva's master dissertation (PDF)

7.0 MB

(PDF)

Class #05 and #06-- Camera, Scanner, and CGI Forensics Attribution

Reading: Determining Image Origin and Integrity Using Sensor Noise by Mo Chen and Jessica Fridrich and Miroslav Goljan and Jan Lukas.
3.9 MB

(PDF)

Class #07-- Printer Attribution

Reading: Printer and Scanner Forensics by Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Sungjoo Suh and Jan P. Allebach and George T. C. Chiu and Edward J. Delp.
3.9 MB

(PDF)

Up

Class #08-- Searching for Suspects using Visual Attributes

Reading: Visual words dictionaries and fusion techniques for searching people through textual and visual attributes by Junior Fabian, Ramon Pires, and Anderson Rocha
4.4 MB

(PDF)

Class #09 -- Spoofing Creation and Detection (e.g., Fingerprints, Faces and Irises.).

Reading: Spoof detection schemes (PDF)
3.3 MB

(PDF)

Class #10 -- Method's Detailing for Face Spoofing Detection.

Reading: Video-Based Face Spoofing Detection through Visual Rhythm Analysis (PDF)
6.4 MB

(PDF)

Up

Class #11 and #12-- Multimedia Phylogeny

Readings:
  • Image Phylogeny by Minimal Spanning Trees. Z. Dias, and A. Rocha and S. Goldenstein. IEEE Transactions of Information Forensics and Security (T.IFS), 2012.
  • Video Phylogeny: Recovering Near- Duplicate Video Relationships. Z Dias, A Rocha, and S Goldenstein. IEEE Intl. Workshop on Information Forensics and Security (WIFS), 2011.
27.4 MB

(PDF)

Class #13 -- Eye specular highlights telltales for digital forensics

Reading I: Eye specular highlights telltales for digital forensics by P. Saboia, T. Carvalho and Anderson Rocha, ICIP, 2011.

4.0 MB

(PDF)

Class #14 -- Forgery detection through inconsistencies in illumination maps

Reading I: Exposing Digital Image Forgeries by Illumination Color Classification by T. Carvalho et al. IEEE T.IFS, 2013).

28.9 MB

(PDF)

Up

Class #15 -- Detection of Computer-Generated Images (Fake or Real?)

Reading I: Eric Tokuda, Hélio Pedrini, Anderson Rocha: Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach. J. Visual Communication and Image Representation 24(8): 1276-1292 (2013)

1.0 MB

(PDF)

Class #16(a) -- Forensic Analysis of Ordered Data Structures on the Example of JPEG Files

Reading I: Thomas Gloe: Forensic Analysis of Ordered Data Structures on the Example of JPEG Files. IEEE WIFS 2012.

500 KB

(PDF)

Class #16(b) -- Image Authentication through embedded thumbnails

Reading: Digital Image Authentication from Thumbnails. Kee, E., Farid, H. Symposium on Electronic Imaging, pp. 1-10, 2010.
3.4 MB

(PDF)

Class #17 -- Photographs vs. Computer-Generated Images

Reading: . Keiji, E.; Pedrini, H.; and Rocha, Anderson. Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach, Volume 24, Issue 8, November 2013, Pages 1276–1292.
1.2 MB

(PDF)

Up

Class #18 -- Information Hiding: Steganography and Steganalysis (Part I)

Reading: Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? (PDF)
5.7 MB

(PDF)

Up

Class #19 and #20 -- Information Hiding: Steganography and Steganalysis (Part II)

Reading: Steganography and Steganalysis in Digital Multimedia: Hype or Hallelujah? (PDF)
6.4 MB

(PDF)

Up

Seminar #1 -- Gait Recognition



990 KB

(PPTX)

Seminar #2 -- Art Authentication



6.8 MB

(PPTX)

Seminar #3 -- Tampering Detection



3.6 MB

(PPTX)

Seminar #4 -- Voice Authentication



5.4 MB

(PPT)

Up

Class #25 -- Sensitive Media Detection (e.g., Pornography, Violence, etc.).

Reading: Content-Based Filtering for Video Sharing Social Networks (PDF)
15.2 MB

(PDF)

Class #25 (2) -- Extra material about Sensitive Media Detection (e.g., Pornography, Violence, etc.).

Reading: Content-Based Filtering for Video Sharing Social Networks (PDF)
15.2 MB

(PDF)

Class #26 -- Cloud Forensics



576 KB

(PDF)

Class #27 -- Exposing Photo Manipulation with Inconsistent Shadows



16.8 MB

(PPT)

Up

Up

Support Materials

Presentation Templates.

Up

Practical Assignments

Practical Assignments. Use this model for preparing the article/report related to the practical assignments.

Up