Homepage for the Discipline MO447 and MC919 |
|
|
|
|
|
|
|
Class Materials |
Support Material |
Presentations |
Practical Assignments
|
|
|
|
|
Presentation |
|
|
|
Professor: Anderson Rocha
| Class |
Day |
Time |
Room |
| A |
Wednesdays |
19-20:40 |
CB14 |
|
Fridays |
21-22:40 |
CB03 |
Extra Class Office Policy: Schedule by e-mails.
Avisos:
|
|
| 20/09/2013 |
Presentation templates are already available |
| 01/08/2013 |
Class description, rules and syllabus are already available |
|
|
|
|
|
|
|
|
|
|
|
| Class #0 - Presentation of the Discipline.
Syllabus. |
|
151 KB |
(PDF) |
|
Class #1 and #2 -- Introduction to Digital Forensics
Reading: Surveys #1, #3, #4 and #5 on digital forensics mentioned in class and in the document above |
|
29.3 MB |
(PDF) |
|
Class #3 and #4-- File Carving and Smart File Carving
Reading: The evolution of file carving -- the benefits and problems of forensics recovery. Anandabrata Pal and Nasir Memon. IEEE Signal Processing Magazine, 26(2):59-71, March 2009. |
|
3.6 MB |
(PDF) |
|
|
|
|
Up |
Class #4 -- Are EXIF telltales really non-reliable?
Reading: Forensic Analysis of Ordered Data Structures on the Example of JPEG Files. Thomas Gloe. 2012 IEEE International Workshop on Information Forensics and Security, December, 2012. |
|
1.6 MB |
(PDF) |
|
Class #5 -- Image Authentication through embedded thumbnails
Reading: Digital Image Authentication from Thumbnails. Kee, E., Farid, H. Symposium on Electronic Imaging, pp. 1-10, 2010. |
|
4.8 MB |
(PDF) |
|
Class #6 -- An Extreme Value Theory Approach to Visual Attributes. Prof. Walter J. Scheirer (Harvard University)
Readings:
-
Describable Visual Attributes for Face Verification and Image Search. N. Kumar, A. Berg, P. Belhumeur, and S. Nayar. IEEE Trans. on Pattern Analysis and Machine Intelligence (T.PAMI), 2011.
-
Multi-Attribute Spaces: Calibration for Attribute Fusion and Similarity Search. W. Scheirer, N. Kumar, P. Belhumeur, and T. Boult. IEEE Intl. Conference on Computer Vision and Pattern Recognition (CVPR), 2012.
|
|
8.2 MB |
(PDF) |
|
|
|
|
Up |
Class #7 and #8-- Multimedia Phylogeny
Readings:
-
Image Phylogeny by Minimal Spanning Trees. Z. Dias, and A. Rocha and S. Goldenstein. IEEE Transactions of Information Forensics and Security (T.IFS), 2012.
-
Video Phylogeny: Recovering Near- Duplicate Video Relationships. Z Dias, A Rocha, and S Goldenstein. IEEE Intl. Workshop on Information Forensics and Security (WIFS), 2011.
|
|
16.2 MB |
(PDF) |
|
Class #9-- Crimes and their investigation - Prof. Vera Kerr, University of Mackenzie, Campinas.
|
|
16.2 MB |
(PDF) |
|
Class #10 and #11-- Sensitive Media Detection (e.g., Pornography, Violence, etc.).
Reading: Content-Based Filtering for Video Sharing Social Networks (PDF) |
|
15.2 MB |
(PDF) |
|
|
|
|
Up |
Class #12 -- Spoofing Creation and Detection (e.g., Fingerprints, Faces and Irises.).
Reading: Spoof detection schemes (PDF) |
|
3.3 MB |
(PDF) |
|
Class #12 -- Method's Detailing for Face Spoofing Detection.
Reading: Video-Based Face Spoofing Detection through Visual Rhythm Analysis (PDF) |
|
6.4 MB |
(PDF) |
|
|
|
|
Up |
Class #13 and #14-- Information Hiding: Steganography and Steganalysis (Part I)
Reading: Steganography and Steganalysis in Digital Multimedia:
Hype or Hallelujah? (PDF) |
|
5.7 MB |
(PDF) |
|
| | | Up |
Class #13 and #14-- Information Hiding: Steganography and Steganalysis (Part II)
Reading: Steganography and Steganalysis in Digital Multimedia:
Hype or Hallelujah? (PDF) |
|
6.4 MB |
(PDF) |
|
Class #14 and #15-- Forensics Attribution (Cameras, Scanners, Printers)
Reading I: Printer and Scanner Attribution by Pei-Ju Chiang and Nitin Khanna and Aravind
K. Mikkilineni and Maria V. Ortiz Segovia and Sungjoo Suh and Jan P. Allebach and George T. C. Chiu and Edward J. Delp.
Reading II: Determining Image Origin and Integrity Using Sensor Noise by Mo Chen and Jessica Fridrich
and Miroslav Goljan and Jan Lukas. |
|
5.4 MB |
(PDF) |
|
Class #16 -- Cloning Detection
Reading I: Ewerton Silva's master dissertation (PDF)
|
|
6.5 MB |
(PDF) |
|
| | | Up |
Class #17 -- Eye specular highlights telltales for digital forensics
Reading I: Eye specular highlights telltales for digital forensics by P. Saboia, T. Carvalho and Anderson Rocha, ICIP, 2011.
|
|
4.0 MB |
(PDF) |
|
Class #18 -- Forgery detection through inconsistencies in illumination maps
Reading I: Exposing Digital Image Forgeries by Illumination Color Classification by T. Carvalho et al. IEEE T.IFS, 2013).
|
|
28.9 MB |
(PDF) |
|
Class #19 -- Image Forgery Localization via
Fine-Grained Analysis of CFA Artifacts
Reading I: Image Forgery Localization via Fine-Grained Analysis of CFA
Artifacts by P. Ferrara, T. Bianchi, A. De Rosa, and A. Piva (IEEE T.IFS, 2013)
|
|
2.3 MB |
(PDF) |
|
| | | Up |
Seminar #1 -- Measurement and Analysis of Child Pornography Trafficking on P2P Networks
|
|
755 KB |
(PDF) |
|
Seminar #2 -- Exposing Photo Manipulation with Inconsistent Shadows
|
|
16.8 MB |
(PPT) |
|
Seminar #3 -- A perceptual metric for photo retouching
|
|
7.5 MB |
(PPTX) |
|
| | | Up |
Seminar #4 -- Digital Image Authentication from JPEG Headers
|
|
730 KB |
(PDF) |
|
Seminar #5 -- Cloud Forensics
|
|
576 KB |
(PDF) |
|
Seminar #6 -- Forensic Detection of Image Manipulation Using Statistical Intrinsic Fingerprints
|
|
12.7 KB |
(PPTX) |
|
| | | Up |
|
|
|
|
|
|
|
|
Up |
|
|
|
|
| Practical Assignments.
Use this model for preparing the article/report related to the practical assignments. |
|
|
|
|
|
|
|
Up |
|
|
|
|