Multimedia Security, 2016

多媒體安全, 2016

Multimedia Security, 2016
External Links
Benchmarking
Lecture 0
- Syllabus
  • Syllabus
Lecture 1
- Digital Watermarking
  • Introduction to Digital Watermarking
Lecture 2
- Digital Rights Management (DRM)
  • Introduction to Digital Rights Management (DRM)
Lecture 3
- Digital Watermarking: Basics (I)
  • Models of Watermarking
Lecture 4
- Digital Watermarking: Basics (II)
  • Basic Message Coding
  • Error Correction Coding
Lecture 5
- Digital Watermarking: Theoretic Aspects
  • Mutual Information and Channel Capacity
  • How to Design a Good Digital Watermark
  • Information Theoretical Analysis of Digital Watermarking
Lecture 6
- Digital Watermarking Schemes (I)
  • Spread Spectrum Watermarking
  • Watermarking with Side Information
Lecture 7
- Digital Watermarking Schemes (II)
  • DCT-Domain Watermarking
Lecture 8
- Digital Watermarking: Protocol
  • A Buyer-Seller Watermarking Protocol
  • An Efficient and Anonymous Buyer-Seller Watermarking Protocol
  • Secure buyer–seller watermarking protocol
SPED
- Encrypted Signal Processing for Privacy Protection
  • Encrypted Signal Processing for Privacy Protection
Lecture14
- Introduction to Image Source Identification
  • Introduction to Image Source Identification
  • Detecting Doubly Compressed Images Based on Quantization Noise
  • Introduction to Video Forgery Detection
Lecture11
- Introduction to Searchable encryption
  • Data Hiding in Binary Image for Authentication and Annotation
  • Distance-Reciprocal Distortion Measure for Binary Document Images
  • Introduction to Searchable encryption
  • Watermarking for Image Authentication (Fragile Watermarking)
  • Writing Wet Paper
Lecture12.1
- Privacy Preserving Search on Multimedia
  • Privacy Preserving Search on Multimedia
Lecture7.7
- Video Watermarking
  • Video Watermarking
Lecture13
- On Visible Watermarking Schemes
  • On Visible Watermarking Schemes
  • Digital Invisible Ink Data Hiding
News