Homepage for the Discipline MO447 and MC919 |
|
|
|
|
|
|
|
Class Materials |
Support Material |
Presentations |
Practical Assignments
|
|
|
|
|
Presentation |
|
|
|
Professor: Anderson Rocha
| Class |
Day |
Time |
Room |
| A |
Wednesdays |
19-20:40 |
PB11 |
|
Fridays |
21-22:40 |
PB11 |
Extra Class Office Policy: Schedule by e-mails.
Avisos:
|
|
| 03/09/2014 |
Class description, rules and syllabus are already available |
|
|
|
|
|
|
|
|
|
|
|
| Class #0 - Presentation of the Discipline.
Syllabus. |
|
148 KB |
(PDF) |
|
Class #1 and #2 -- Introduction to Digital Forensics
Reading: Surveys #1, #3, #4 and #5 on digital forensics mentioned in class and in the document above |
|
31.8 MB |
(PDF) |
|
Class #3 -- File Carving and Smart File Carving
Reading: The evolution of file carving -- the benefits and problems of forensics recovery. Anandabrata Pal and Nasir Memon. IEEE Signal Processing Magazine, 26(2):59-71, March 2009. |
|
3.5 MB |
(PDF) |
|
|
|
|
Up |
Class #4 -- Cloning Detection
Reading I: Ewerton Silva's master dissertation (PDF)
|
|
7.0 MB |
(PDF) |
|
Class #05 and #06-- Camera, Scanner, and CGI Forensics Attribution
Reading: Determining Image Origin and Integrity Using Sensor Noise by Mo Chen and Jessica Fridrich
and Miroslav Goljan and Jan Lukas. |
|
3.9 MB |
(PDF) |
|
Class #07-- Printer Attribution
Reading: Printer and Scanner Forensics by Pei-Ju Chiang and Nitin Khanna and Aravind K. Mikkilineni and Maria V. Ortiz Segovia and Sungjoo Suh and Jan P. Allebach and George T. C. Chiu and Edward J. Delp. |
|
3.9 MB |
(PDF) |
|
|
|
|
Up |
Class #08-- Searching for Suspects using Visual Attributes
Reading: Visual words dictionaries and fusion techniques for searching people through textual and visual attributes
by Junior Fabian, Ramon Pires, and Anderson Rocha |
|
4.4 MB |
(PDF) |
|
Class #09 -- Spoofing Creation and Detection (e.g., Fingerprints, Faces and Irises.).
Reading: Spoof detection schemes (PDF) |
|
3.3 MB |
(PDF) |
|
Class #10 -- Method's Detailing for Face Spoofing Detection.
Reading: Video-Based Face Spoofing Detection through Visual Rhythm Analysis (PDF) |
|
6.4 MB |
(PDF) |
|
|
|
|
Up |
Class #11 and #12-- Multimedia Phylogeny
Readings:
-
Image Phylogeny by Minimal Spanning Trees. Z. Dias, and A. Rocha and S. Goldenstein. IEEE Transactions of Information Forensics and Security (T.IFS), 2012.
-
Video Phylogeny: Recovering Near- Duplicate Video Relationships. Z Dias, A Rocha, and S Goldenstein. IEEE Intl. Workshop on Information Forensics and Security (WIFS), 2011.
|
|
27.4 MB |
(PDF) |
|
Class #13 -- Eye specular highlights telltales for digital forensics
Reading I: Eye specular highlights telltales for digital forensics by P. Saboia, T. Carvalho and Anderson Rocha, ICIP, 2011.
|
|
4.0 MB |
(PDF) |
|
Class #14 -- Forgery detection through inconsistencies in illumination maps
Reading I: Exposing Digital Image Forgeries by Illumination Color Classification by T. Carvalho et al. IEEE T.IFS, 2013).
|
|
28.9 MB |
(PDF) |
|
|
|
|
Up |
Class #15 -- Detection of Computer-Generated Images (Fake or Real?)
Reading I: Eric Tokuda, Hélio Pedrini, Anderson Rocha: Computer generated images vs. digital photographs:
A synergetic feature and classifier combination approach. J. Visual Communication and Image Representation 24(8): 1276-1292 (2013)
|
|
1.0 MB |
(PDF) |
|
Class #16(a) -- Forensic Analysis of Ordered Data Structures on the Example of JPEG Files
Reading I: Thomas Gloe: Forensic Analysis of Ordered Data Structures on the Example of JPEG Files. IEEE WIFS 2012.
|
|
500 KB |
(PDF) |
|
Class #16(b) -- Image Authentication through embedded thumbnails
Reading: Digital Image Authentication from Thumbnails. Kee, E., Farid, H. Symposium on Electronic Imaging, pp. 1-10, 2010. |
|
3.4 MB |
(PDF) |
|
Class #17 -- Photographs vs. Computer-Generated Images
Reading: . Keiji, E.; Pedrini, H.; and Rocha, Anderson. Computer generated images vs. digital photographs: A synergetic feature and classifier combination approach,
Volume 24, Issue 8, November 2013, Pages 1276–1292. |
|
1.2 MB |
(PDF) |
|
|
|
|
Up |
Class #18 -- Information Hiding: Steganography and Steganalysis (Part I)
Reading: Steganography and Steganalysis in Digital Multimedia:
Hype or Hallelujah? (PDF) |
|
5.7 MB |
(PDF) |
|
| | | Up |
Class #19 and #20 -- Information Hiding: Steganography and Steganalysis (Part II)
Reading: Steganography and Steganalysis in Digital Multimedia:
Hype or Hallelujah? (PDF) |
|
6.4 MB |
(PDF) |
|
|
|
|
Up |
Seminar #1 -- Gait Recognition
|
|
990 KB |
(PPTX) |
|
Seminar #2 -- Art Authentication
|
|
6.8 MB |
(PPTX) |
|
Seminar #3 -- Tampering Detection
|
|
3.6 MB |
(PPTX) |
|
Seminar #4 -- Voice Authentication
|
|
5.4 MB |
(PPT) |
|
|
|
|
Up |
Class #25 -- Sensitive Media Detection (e.g., Pornography, Violence, etc.).
Reading: Content-Based Filtering for Video Sharing Social Networks (PDF) |
|
15.2 MB |
(PDF) |
|
Class #25 (2) -- Extra material about Sensitive Media Detection (e.g., Pornography, Violence, etc.).
Reading: Content-Based Filtering for Video Sharing Social Networks (PDF) |
|
15.2 MB |
(PDF) |
|
Class #26 -- Cloud Forensics
|
|
576 KB |
(PDF) |
|
Class #27 -- Exposing Photo Manipulation with Inconsistent Shadows
|
|
16.8 MB |
(PPT) |
|
|
|
|
Up |
| | | Up |
|
|
|
|
|
|
|
|
Up |
|
|
|
|
| Practical Assignments.
Use this model for preparing the article/report related to the practical assignments. |
|
|
|
|
|
|
|
Up |
|
|
|
|