REVVIND REVerse engineering of audio VIsual content Data

Size: px
Start display at page:

Download "REVVIND REVerse engineering of audio VIsual content Data"

Transcription

1 REVVIND REVerse engineering of Newsletter Issue n.3, November 2013 REWIND Page 1 of 12

2 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within the ICT area of the Seventh Framework Program (FP7). The project is devoted to the analysis of multimedia content in order to trace back its processing history with potential impact in several areas ranging from forensics and law enforcement to quality assessment. The project started on May and will end on April This newsletter is addressed to subjects that might be potentially interested in the outcomes of the project, including companies, public and private research institutions or individual researchers working in this field. This is the third issue of the REWIND newsletter. The first and second issues can be downloaded at The REWIND activities are following the established plans On May 2013 REWIND entered its third year of life. As established at the beginning of the project, during the first two years the activities have been oriented toward the mathematical modeling of footprints left by specific operators on digital content and on the development of detectors able to identify a single operator applied to the considered data. In particular acquisition/coding/editing based footprint detectors have been developed and tested. At the same time, datasets have been created to verify the efficiency and the effectiveness of the proposed tools. A framework for the automatic test of footprint detectors has been also realized. All the obtained results are documented in scientific papers published on international journals and conferences. All these papers can be downloaded from the project website ( At this moment about fifty papers are available on the website. A series of tools and datasets are also downloadable for research purposes. In the third year the project activities will focus on the analysis of complex processing chains and on the creation of phylogenies associated to a set of contents, for example available on the web, and associated to the same event. The phylogeny describes how contents are obtained one from the others through editing, mixing, re coding, and so on. November 5, 2013 Page 2 of 12

3 1.3 Dissemination of the project results Dissemination is a key issue for the REWIND project. It is pursued through the publication of the research results on well reputed journals and conferences, but also through demos and special sessions organized at important conferences. Here is a list of demos and special sessions to which REWIND participated in the last months: Demo WIAMIS 2013 (Paris, July 3 5, 2013), telecom.fr/ Demo MMSP 2013 (Pula, Sardinia, Sept. 30 Oct. 2, 2013), Special MMSP 2013 on Video Forensics REWIND has also sponsored the best paper award at MMSP 2013 and it is one of the sponsors of the challenge on image tampering detection/localization organized by the IEEE Technical Committee on Information Security and Forensics (see the project website for further details). REWIND will participate to the ICT Event 2013 organized in Vilnius on November 6 8 by the European Commission ( agenda/en/ict 2013). REWIND will be present at ICT Event 2013 with a booth (booth id 5A1). The booth visitors will have the opportunity to interact with applications that show how tampering with digital content is today an extremely simple yet powerful operation. On the other hand they will see how REWIND technologies can November 5, 2013 Page 3 of 12

4 be used to build completely automatic systems able to detect multimedia content tampering. Visitors are also invited to use an interactive system in order to become a "forensics analyst", thus identifying which part of the considered digital content has been modified. On November 12 REWIND will organize, in Milan, a workshop on Digital Doctoring: How to tell the real from the fake. The workshop will take place from 10 A.M to 5 P.M. at the premises of the Università degli Studi di Milano, Sala Napoleonica di Palazzo Greppi, Via Sant'Antonio 12, Milano with the following program: Opening Prof. Stefano Tubaro, Politecnico di Milano, Coordinator of the REWIND Project Introduction to Multimedia Forensics technologies Prof. Mauro Barni, Università di Siena Investigative strategies for multimedia data: the law enforcement viewpoint Dott.sa Elvira D Amato, Mail and Computer Fraud Police Service, Italian Ministry of the Interior, Roma Magg. Claudio Ciampini, Scientific Investigation Group, Arm of Carabineers, Roma A software product for forensic investigations Martino Jerian, AMPED, Trieste Investigative strategies for multimedia data: the judicial viewpoint Dott. Francesco Caiani, Deputy Public Prosecutor of the Milano Court, Computer Crime Team Lunch & Demo Session results of the REWIND project are showcased through some demos User generated multimedia content as a witnessing tool for human rights violation Prof. Giovanni Ziccardi, Università di Milano Multimedia Forensics techniques: how discover the history of a digital content excerpt Prof. Pier Luigi Dragotti, Imperial College, UK Round Table on Participative Journalism Moderator Giorgio Mennella, AgoraVox Partcipants will be defined shortly Closing Prof. Stefano Tubaro, Politecnico di Milano, Coordinator of the REWIND Project Further information is available at: November 5, 2013 Page 4 of 12

5 1.4 Short descriptions of the REWIND demos and tools presented at the ICT Event Video tampering detection Nowadays, manipulating videos has become a relatively easy task thanks to the increasing number of dedicated user friendly tools. These software solutions allow people to easily edit a video sequence in a way that is realistic, hence believable. Although creating a doctored video is more time consuming than forging an image, there is an urgent necessity for forgery detection algorithms that can automatically prove or disprove the authenticity of a video. One of the most common video tampering operations is object insertion or removal. However, this kind of attack can be operated in many different ways (e.g., pasting the image representing the inserted object over a set of consecutive frames, using inpanting algorithms to fill the hole left by a removed object, covering an object with background regions taken from other frames belonging to the same sequence, etc.). This demo based on the work in [1] allows a user to detect and localize object insertion or removal operated on a video according to two possible strategies: i) image copy paste; ii) video copy move. The first attack consists in replacing a spatial region of a frame with a still image (e.g., an object to insert), and repeating such forgery in time. The second attack consists in copying a space time region from a video (e.g., representing the background), and pasting it onto another space time region in the same video (e.g., an object to hide). In order to detect such kind of forgeries, the demo interface allows a user to load a video, and run a test on either a preselected region or on the full sequence. If a forgery is detected, the user is warned and the tampered area is shown. Figure 1 shows a preview of the demo s interface. Figure 1. Interface of the video tampering detection demo. [1] P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro, Local tampering detection in video sequences, IEEE International Workshop on Multimedia Signal Processing (MMSP), Pula, Italy, 2013 November 5, 2013 Page 5 of 12

6 1.4.2 Video Recapture Detection With the increasing availability of small, inexpensive video recording devices, casual movie making is now within everyone's reach. This represents a great leap forward for budding directors; however it poses a significant threat in terms of copyrighted video material that can be covertly recorded and distributed. Moreover, illegitimate video material circulating on the net may not be limited to the case of recaptured copyrighted footage; another possibility is to recapture a fraudulent or otherwise doctored video in order to conceal traces of forgery, claiming its authenticity. In this demo, we present two techniques for automatic recapture detection. The first uses scene jitter as a cue for classification [2]. During recapture, jitter is introduced due to either physiological hand tremor, or environmental factors. When recapturing planar surfaces approximately parallel to the imaging plane (such as a cinema screen captured by a handheld camera), any added motion due to jitter will result in approximately uniform high frequency 2D motion fields. The second tool improves on the original formulation by considering the scenario where a video is displayed on a Liquid Crystal Display (LCD) monitor and recaptured by a camcorder perfectly aligned with the monitor and kept fixed on a tripod, with little or no jitter [3]. The main idea is to detect whether a sequence has been recaptured, exploiting a characteristic ghosting artifact that is generated as a consequence of the lack of synchronization between the camera and the monitor. It is important to stress that there is no easy way to control the synchronization between camera and monitor, making ghosting artifacts a robust footprint for recapture detection. Figure 2. Screenshots from the video recapture tools. [2] M. Visentini Scarzanella, P. L. Dragotti, Video Jitter Analysis for Automatic Bootleg Detection, IEEE International Workshop on Multimedia Signal Processing (MMSP), Banff, Canada, [3] P. Bestagini, M. Visentini Scarzanella, M. Tagliasacchi, P. L. Dragotti, S. Tubaro Video Recapture Detection Based on Ghosting Artifact Analysis, IEEE International Conference on Image Processing (ICIP), Melbourne, Australia, Sept November 5, 2013 Page 6 of 12

7 1.4.3 IPTV Source Identification The spectacular growth of Internet Protocol (IP) networks in the last decade has changed our way of watching TV. Both for Video on Demand (where the user asks for the content to be delivered) and for multicast (where the content is scheduled for delivering, and the user applies for being included in the destination list) scenarios, IPTV has shown to be a powerful distribution tool for both time shifted playing and live streaming distribution. These new video distribution models have advantages from the point of view of the user (e.g., huge selection of contents; pause, play, rewind and forward features; paying just for those contents which are really consumed, unlike most of the previously used cable/satellite systems) and the content distributor (e.g., almost unlimited potential market; cheap infrastructures, well known distribution technology). Nevertheless, the streaming of contents by providers that do not own the corresponding rights causes huge losses to the legitimate content right owners, who indeed are interested in tracing back the distribution channel undergone by the content for arriving to the server of the unauthorized provider. This demo illustrates the possibility of classifying the origin of one streamed program between terrestrial and satellital, both for time shifted and live streaming. Figure 3 contains a screenshot of the developed application; the current interface allows the user to watch on real time the video in the considered stream, as well as the instant rate variability. Figure 3. A screenshot of the IPTV source identification demonstrator. [4] Masciopinto, M.; Comesaña, P.;, "ITPV streaming source classification," IEEE International Workshop on Information Forensics and Security (WIFS), pp , December November 5, 2013 Page 7 of 12

8 1.4.4 Multi clue image tampering detection The advent of technologies easily enables modification and manipulation of digital images, so that we are no longer confident that what we are seeing in a photo is a true representation of what really happened: the value of photography as a record of events must be carefully evaluated. This interactive demonstrator turns the user into a Forensic Analyst (FA), and allows him to analyze the integrity of images. This is done exploiting some of the state of the art results obtained in the Image Forensic research field [5 7]. The demo provides a friendly graphical interface (Figure 4) that helps the FA in viewing the image and its metadata (EXIF), selecting arbitrarily shaped suspect regions or performing fullyautomatic forgery localization, and viewing the output of forensic tools in a friendly way. In particular, the demo embeds a decision fusion framework tailored to the Image Forensic scenario (published in IEEE TIFS [8]), which allows the user to have a unique final decision (as fusion of different algorithm outputs) on the integrity of the analysed image region. Figure 4. A screenshot of the proposed demonstrator, during the selection of suspect regions. [5] Bianchi, T.; Piva, A.;, "Detection of non aligned double JPEG compression with estimation of primary compression parameters," IEEE International Conference on Image Processing (ICIP), 2011, pp , 2011 [6] Bianchi, T.; De Rosa, A.; Piva, A.;, "Improved DCT coefficient analysis for forgery localization in JPEG images," IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp , 2011 [7] Farid, H.;, "Exposing Digital Forgeries From JPEG Ghosts," Information Forensics and Security, IEEE Transactions on, vol.4, no.1, pp , 2009 [8] Fontani, M.; Bianchi, T.; De Rosa, A.; Piva, A.; Barni, M.;, "A Framework for Decision Fusion in Image Forensics Based on Dempster Shafer Theory of Evidence," IEEE Transactions on Information Forensics and Security (TIFS), vol.8, no.4, pp.593,607, April 2013 November 5, 2013 Page 8 of 12

9 1.4.5 Music Plagiarism Analyzer Music plagiarism, i.e., the use of another work while presenting it as one's own original music, has always been a topic of public interest. Typically, if music plagiarism cases are brought to court, independent music experts, often musicologists, are asked to analyze the similarities between two songs, and the judges rely on their opinion. In order to provide technical support for such difficult cases, the Music Plagiarism Analyzer software facilitates the retrieval of samples of one song which are contained in another song, thus helping to prove or disprove suspected music plagiarism. It enables the user to select an excerpt of a song, which is then located and removed from the suspected plagiarism content, retaining other music elements. It can thereby also deal with the fact that the original sample may have undergone manipulations such as timestretching and pitch shifting. Further details of the approach are described in [9]. The software has been successfully applied to disprove alleged music plagiarism in case of the German entry to the 2013 Eurovision Song Contest and was covered in related press articles. Figure 5. Outline of the GUI for the music plagiarism analyzer. [9] C. Dittmar et al. Audio Forensics meets Music Information Retrieval A Toolbox for Inspection of Music Plagiarism Proceedings of the 20th European Signal Processing Conference (EUSIPCO), Bucharest, Romania, 2012 November 5, 2013 Page 9 of 12

10 1.4.6 Audio Tampering Detection based on ENF analysis Thanks to lowered cost and increased availability of devices and global networks, it is now easier than ever to record and distribute, but also to manipulate audio visual material. Considering the growing importance of such material for news coverage, investigations, and many other domains, it is crucial to be able to assess whether content is authentic or not. ENF (Electrical Network Frequency) represents one interesting approach for audio tampering detection: It fluctuates slightly and randomly over time around a defined frequency (typically 50 Hz in Europe), and it does so across the entire electrical network, typically spanning huge geographic areas. Via electromagnetic induction, many digital recordings pick up the ENF, which leads to an extra low frequency component in the recorded audio signal. The demonstrated software allows the user to visualize the ENF and to extract it from the audio file (see Figure 6). Once extracted, it can be used for further analysis, including the following (see also [10]): 1. ENF temporal pattern matching: It is possible to compare the ENF signature of an audio file against a reference database, in order to determine the time of the recording of the audio file. 2. Tampering detection based on ENF phase analysis: ENF fluctuations are continuous oscillations. If the ENF and its phase extracted from an audio file are both continuous, it can be assumed that the recording has not been modified. In contrast, if the ENF or its phase shows discontinuities, this can indicate possible editing of the original recording. Figure 6. Screenshots from the ENF Analysis Tool [10] S. Mann, L. Cuccovillo, P. Aichroth, and C. Dittmar, Combining ENF Phase Discontinuity Checking and Temporal Pattern Matching for Audio Tampering Detection, Workshop for applied signal processing (WASP), Koblenz, Germany, September 2013 November 5, 2013 Page 10 of 12

11 1.4.7 Automatic testing framework and inverse audio decoder Evaluation activities within REWIND included the development of a proof of concept framework for storage of content and annotations, and for automatic testing, using existing partner background components. The goal of this activity was to support the R&D process within REWIND, to support dataset sharing, and for more objective and unified evaluation of components. More specifically, the framework includes: XML schemas for the fine grain annotations (describing operations and content as results of the operations), chains, detector interfaces, and test cases A Web service (SOAP + REST) to store, browse, visualize and retrieve datasets (content and associated fine grain XML annotations); to semantically link annotations to detectors and use case evaluation definitions, and to perform automatic testing based on this A client application to perform the testing process in a decentralized manner, i.e., the evaluated components can stay within the developer s domain. The demo will show the functionality of this proof of concept, calling the inverse decoder detector implementation as an evaluation example, which has also been developed within REWIND. The inverse decoder builds on previous work by Fraunhofer IIS ( home of MP3 ) and is able to recognize traces of previous audio compression in decompressed audio data, by detecting the framing grid and bitrate that had been used to encode the material. The inverse decoder is implemented as a command line tool that analyses uncompressed audio files, detecting various audio codecs (MP3, MP3PRO, AAC, HE AAC) and respective encoding parameters in various content segments. It can e.g. be used to detect bitrate fraud or audio tampering detection, based on framing grid discontinuities and codec changes within a content item. Figure 6. Testing process overview and screenshots from the Testing Service November 5, 2013 Page 11 of 12

12 For further information Project Public WebSite Project Contact Point Prof. Stefano Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano Piazza Leonardo da Vinci Milano Italy Tel/Fax: / stefano.tubaro@polimi.it November 5, 2013 Page 12 of 12

REVVIND. FP7-ICT-2007-C GA No REVerse engineering of audio-visual content Data. D6.4 REWIND project workshop

REVVIND. FP7-ICT-2007-C GA No REVerse engineering of audio-visual content Data. D6.4 REWIND project workshop FP7-ICT-2007-C GA No. 268478 D6.4 REWIND project workshop LAST MODIFICATION: 5.12.2013 REPORTING ORGANIZATION: POLITECNICO DI MILANO AUTHORS: MARCO TAGLIASACCHI, STEFANO TUBARO (POLITECNICO DI MILANO)

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data REVVIND REVerse engineering of Newsletter Issue n.1, October 2012 REWIND Page 1 of 12 1.1 The REWIND is a FET (Future and Emerging Technology) research project funded by the European Commission within

More information

Deliverable D6.3 Release of publicly available datasets and software tools

Deliverable D6.3 Release of publicly available datasets and software tools Grant Agreement No. 268478 Deliverable D6.3 Release of publicly available datasets and software tools Lead partner for this deliverable: PoliMI Version: 1.0 Dissemination level: Public April 29, 2013 Contents

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 footprint detectors LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS: LUCA CUCCOVILLO, PATRICK AICHROTH, DANIEL

More information

Local tampering detection in video sequences

Local tampering detection in video sequences Local tampering detection in video sequences Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano piazza Leonardo

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge WIFS 13 The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa*, Carmela Troncoso*, Mauro Barni # # University of Siena (IT) * GRADIANT:

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 D5.5-2 Final report on content sets and flows, m36 Update LAST MODIFICATION: 30.04.2014 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) AUTHORS:

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Detection and classification of double compressed MP3 audio tracks Original Citation: Tiziano Bianchi;Alessia De Rosa;Marco Fontani;Giovanni

More information

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro

VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY. P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro VIDEO CODEC IDENTIFICATION EXTENDING THE IDEMPOTENCY PROPERTY P. Bestagini, S. Milani, M. Tagliasacchi, S. Tubaro Dipartimento di Elettronica ed Informazione, Politecnico di Milano piazza Leonardo da Vinci

More information

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract

(JBE Vol. 23, No. 6, November 2018) Detection of Frame Deletion Using Convolutional Neural Network. Abstract (JBE Vol. 23, No. 6, November 2018) (Regular Paper) 23 6, 2018 11 (JBE Vol. 23, No. 6, November 2018) https://doi.org/10.5909/jbe.2018.23.6.886 ISSN 2287-9137 (Online) ISSN 1226-7953 (Print) CNN a), a),

More information

REVVIND REVerse engineering of audio-visual content Data

REVVIND REVerse engineering of audio-visual content Data FP7-ICT-2007-C GA No. 268478 D5.4 Initial report on evaluation of footprint detectors LAST MODIFICATION: 30.04.2013 REPORTING ORGANIZATION: FRAUNHOFER (INSTITUTE FOR DIGITAL MEDIA TECHNOLOGY) GERMANY AUTHORS:

More information

IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION

IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION IMAGE PHYLOGENY THROUGH DISSIMILARITY METRICS FUSION A. Melloni, P. Bestagini, S. Milani, M. Tagliasacchi, A. Rocha, S. Tubaro Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano,

More information

Detecting malicious tampering in digital images

Detecting malicious tampering in digital images Detecting malicious tampering in digital images Markos Zampoglou - markzampoglou@iti.gr Information Technologies Institute (ITI) Centre for Research and Technology Hellas (CERTH) Workshop on Tools for

More information

Modelling Radial Distortion Chains for Video Recapture Detection

Modelling Radial Distortion Chains for Video Recapture Detection Modelling Radial Distortion Chains for Video Recapture Detection Marco Visentini-Scarzanella 1, Pier Luigi Dragotti 2 Communications and Signal Processing Group Department of Electrical and Electronic

More information

Multi-Clue Image Tampering Localization

Multi-Clue Image Tampering Localization Multi-Clue Image Tampering Localization Lorenzo Gaborini, Paolo Bestagini, Simone Milani, Marco Tagliasacchi, Stefano Tubaro Dipartimento di Matematica Francesco Brioschi Dipartimento di Elettronica, Informazione

More information

AN OVERVIEW ON VIDEO FORENSICS

AN OVERVIEW ON VIDEO FORENSICS AN OVERVIEW ON VIDEO FORENSICS P. Bestagini,M. Fontani,, S. Milani, M. Barni,, A.Piva,,M. Tagliasacchi, S.Tubaro Politecnico di Milano, Dipartimento di Elettronica e Informazione, Milano, Italy University

More information

Practical methods for digital video forensic authentication

Practical methods for digital video forensic authentication Practical methods for digital video forensic authentication Jinhua Zeng, * Shaopei Shi, Yan Li, Qimeng Lu, Xiulian Qiu Institute of Forensic Science, Ministry of Justice, Shanghai 200063, China *Corresponding

More information

A Forensic Tool for Investigating Image Forgeries

A Forensic Tool for Investigating Image Forgeries A Forensic Tool for Investigating Image Forgeries Marco Fontani, University of Siena, Via Roma 56, 53100, Siena, Italy Tiziano Bianchi, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129, Torino,

More information

An overview on video forensics

An overview on video forensics An overview on video forensics 1 S. Milani 1, M. Fontani 2,4, P. Bestagini 1, M. Barni 2,4, A. Piva 3,4, M. Tagliasacchi 1, S. Tubaro 1 1 Politecnico di Milano, Dipartimento di Elettronica e Informazione,

More information

Detection and localization of double compression in MP3 audio tracks

Detection and localization of double compression in MP3 audio tracks Bianchi et al. EURASIP Journal on Information Security 214, 214:1 http://jis.eurasipjournals.com/content/214/1/1 RESEARCH Detection and localization of double compression in MP3 audio tracks Tiziano Bianchi

More information

VoIP Forgery Detection

VoIP Forgery Detection VoIP Forgery Detection Satish Tummala, Yanxin Liu and Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX, USA Emails: sct137@shsu.edu; yanxin@shsu.edu; liu@shsu.edu

More information

Multimedia Security: So What s the Big Deal?

Multimedia Security: So What s the Big Deal? Multimedia Security: So What s the Big Deal? Edward J. Delp Purdue University School of Electrical and Computer Engineering Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email:

More information

Forensic analysis of JPEG image compression

Forensic analysis of JPEG image compression Forensic analysis of JPEG image compression Visual Information Privacy and Protection (VIPP Group) Course on Multimedia Security 2015/2016 Introduction Summary Introduction The JPEG (Joint Photographic

More information

SOLUTION BRIEF. Video Changes the Future of Policing

SOLUTION BRIEF. Video Changes the Future of Policing SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to

More information

Detecting Digital Image Forgeries By Multi-illuminant Estimators

Detecting Digital Image Forgeries By Multi-illuminant Estimators Research Paper Volume 2 Issue 8 April 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Detecting Digital Image Forgeries By Multi-illuminant Estimators Paper ID

More information

IST MPEG-4 Video Compliant Framework

IST MPEG-4 Video Compliant Framework IST MPEG-4 Video Compliant Framework João Valentim, Paulo Nunes, Fernando Pereira Instituto de Telecomunicações, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisboa, Portugal Abstract This paper

More information

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge

The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge The Watchful Forensic Analyst: Multi-Clue Information Fusion with Background Knowledge Marco Fontani #, Enrique Argones-Rúa 2, Carmela Troncoso 3, Mauro Barni #4 # Dept. of Information Engineering and

More information

Countering Anti-Forensics by Means of Data Fusion

Countering Anti-Forensics by Means of Data Fusion Countering Anti-Forensics by Means of Data Fusion Marco Fontani a, Alessandro Bonchi b, Alessandro Piva b and Mauro Barni c a CNIT, University of Siena, 53100 Siena, Italy; b University of Florence, 50139

More information

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images

JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University

More information

Organization of Scientific Area Committees for Forensic Science (OSAC)

Organization of Scientific Area Committees for Forensic Science (OSAC) Stetson University College of Law Essentials in Forensic Science and the Law Webinar Series Organization of Scientific Area Committees for Forensic Science (OSAC) Mark D. Stolorow Director for OSAC Affairs

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

PROJECT RESULTS Summary

PROJECT RESULTS Summary Project funded by the European Union Operational Programme Technical Assistance for Institutional Building - TAIB 2012 www.fighting-occ.mk Strengthening the National Capacities for the Fight Against Organised

More information

FRAGILE WATERMARKING USING SUBBAND CODING

FRAGILE WATERMARKING USING SUBBAND CODING ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING

More information

IRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1

IRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1 IRMOS Newsletter Issue N 5 / January 2011 In this issue... Editorial Editorial p.1 Highlights p.2 Special topic: The IRMOS Repository p.5 Recent project outcomes p.6 Keep in touch with IRMOS p.8 Dear Reader,

More information

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline

More information

Attacking image classification based on Bag-of-Visual-Words

Attacking image classification based on Bag-of-Visual-Words Attacking image classification based on Bag-of-Visual-Words A. Melloni #1, P. Bestagini #2, A. Costanzo 3, M. Barni 4, M. Tagliasacchi #5, S. Tubaro #6 # Dipartimento di Elettronica, Informazione e Bioingegneria,

More information

Semantically Enhanced Hypermedia: A First Step

Semantically Enhanced Hypermedia: A First Step Semantically Enhanced Hypermedia: A First Step I. Alfaro, M. Zancanaro, A. Cappelletti, M. Nardon, A. Guerzoni ITC-irst Via Sommarive 18, Povo TN 38050, Italy {alfaro, zancana, cappelle, nardon, annaguer}@itc.it

More information

Reverse engineering of double compressed images in the presence of contrast enhancement

Reverse engineering of double compressed images in the presence of contrast enhancement Reverse engineering of double compressed images in the presence of contrast enhancement P. Ferrara #, T. Bianchi, A. De Rosa, A. Piva # National Institute of Optics (INO), Firenze, Italy pasquale.ferrara@ino.it

More information

JPEG 2000 Archive Profiles

JPEG 2000 Archive Profiles JPEG 2000 Archive Profiles Fraunhofer Digital Cinema Joachim Keinert, Siegfried Fößel 1st Int. Workshop on Standards and Technologies in Multimedia Archives and Records (STAR) Lausanne, 2010-04-26/27 joachim.keinert@iis.fraunhofer.de

More information

An Infrastructure for MultiMedia Metadata Management

An Infrastructure for MultiMedia Metadata Management An Infrastructure for MultiMedia Metadata Management Patrizia Asirelli, Massimo Martinelli, Ovidio Salvetti Istituto di Scienza e Tecnologie dell Informazione, CNR, 56124 Pisa, Italy {Patrizia.Asirelli,

More information

Visual support for work assignment in YAWL

Visual support for work assignment in YAWL Visual support for work assignment in YAWL Citation for published version (APA): Cardi, F., Leoni, de, M., Adams, M., Hofstede, ter, A. H. M., & Aalst, van der, W. M. P. (2009). Visual support for work

More information

CHAPTER 1: INTRODUCTION

CHAPTER 1: INTRODUCTION CHAPTER 1: INTRODUCTION In the modern age, digital images and videos have become the main information carriers to disseminate knowledge and establish the bridge among several sources. Visual information

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

COUNTER-TERRORISM. Future-oriented policing projects

COUNTER-TERRORISM. Future-oriented policing projects COUNTER-TERRORISM Future-oriented policing projects In keeping with its consistent support of international organisations to strengthen the global community, the United Arab Emirates through the Interpol

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Assistant Secretary-General Michèle Coninsx Executive Director, CTED High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations

More information

Improved LBP and K-Nearest Neighbors Algorithm

Improved LBP and K-Nearest Neighbors Algorithm Image-Splicing Forgery Detection Based On Improved LBP and K-Nearest Neighbors Algorithm Fahime Hakimi, Department of Electrical and Computer engineering. Zanjan branch, Islamic Azad University. Zanjan,

More information

15412/16 RR/dk 1 DGD 1C

15412/16 RR/dk 1 DGD 1C Council of the European Union Brussels, 12 December 2016 (OR. en) 15412/16 ENFOPOL 484 ENV 791 ENFOCUSTOM 235 OUTCOME OF PROCEEDINGS From: General Secretariat of the Council On: 8 December 2016 To: Delegations

More information

Identifying Compression History of Wave Audio and Its Applications

Identifying Compression History of Wave Audio and Its Applications Identifying Compression History of Wave Audio and Its Applications DA LUO, WEIQI LUO, RUI YANG, Sun Yat-sen University JIWU HUANG, Shenzhen University Audio signal is sometimes stored and/or processed

More information

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to

- To aid in the investigation by identifying. - To identify the proper ISP, webhosting. - To use in search warrant affidavits for to User Story: User Type Data Elements Purpose Specification 1 As a [Insert User I use the following data For the purpose of [specify] Type from list] elements: [insert from list, 2 3 4 add anything missing]

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

EXCELLENCE IN AUDIO AND MEDIA ENGINEERING

EXCELLENCE IN AUDIO AND MEDIA ENGINEERING FRAUNHOFER INSTITUTE FOR INTEGRATED CIRCUITS IIS EXCELLENCE IN AUDIO AND MEDIA ENGINEERING Audio and Media Technologies by Fraunhofer IIS THE TRUE AUDIO AND MEDIA EXPERTS Communications We watch HD video

More information

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)] United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second

More information

Phishing Activity Trends Report August, 2006

Phishing Activity Trends Report August, 2006 Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account

More information

Chatham-Kent Police Service

Chatham-Kent Police Service Chatham-Kent Police Service Challenge Boost security at the Chatham-Kent Police Service (CKPS) headquarters and deliver detailed, irrefutable evidence to more effectively meet court disclosure requirements

More information

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements

NEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey

AFCEA Welcome/Opening Keynote Speech. Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey AFCEA Welcome/Opening Keynote Speech Murad Bayar, Undersecretary for Defense Industries, MoND, Turkey A Turkish Perspective on the Challenges of Security in a Network-Enabled Environment I would like to

More information

Compression of Light Field Images using Projective 2-D Warping method and Block matching

Compression of Light Field Images using Projective 2-D Warping method and Block matching Compression of Light Field Images using Projective 2-D Warping method and Block matching A project Report for EE 398A Anand Kamat Tarcar Electrical Engineering Stanford University, CA (anandkt@stanford.edu)

More information

Overview on the Project achievements

Overview on the Project achievements Overview on the Project achievements Closing Conference, Tbilisi, Georgia 14 May 2010 Cristina Schulman Council of Europe Strasbourg, France Tel +33-3-8841-2103 cristina.schulman@coe.int www.coe.int/cybercrime-georgia

More information

International Journal of Scientific Research and Reviews

International Journal of Scientific Research and Reviews Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with

More information

The ToCAI Description Scheme for Indexing and Retrieval of Multimedia Documents 1

The ToCAI Description Scheme for Indexing and Retrieval of Multimedia Documents 1 The ToCAI Description Scheme for Indexing and Retrieval of Multimedia Documents 1 N. Adami, A. Bugatti, A. Corghi, R. Leonardi, P. Migliorati, Lorenzo A. Rossi, C. Saraceno 2 Department of Electronics

More information

D.9.1 Web Portal Creation and Launch

D.9.1 Web Portal Creation and Launch HERMES Cognitive Care and Guidance for Active Aging FP7-ICT 216709 Specific Targeted Research or Innovation Project Start date of project: January 1, 2008 Duration: 36 months D.9.1 Web Portal Creation

More information

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD

IMAGE COMPRESSION USING ANTI-FORENSICS METHOD IMAGE COMPRESSION USING ANTI-FORENSICS METHOD M.S.Sreelakshmi and D. Venkataraman Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India mssreelakshmi@yahoo.com d_venkat@cb.amrita.edu

More information

Dynamo: Dynamic Monitoring of WS-BPEL Processes

Dynamo: Dynamic Monitoring of WS-BPEL Processes Dynamo: Dynamic Monitoring of WS-BPEL Processes Luciano Baresi and Sam Guinea Dipartimento di Elettronica e Informazione - Politecnico di Milano Piazza L. da Vinci 32, I-20133 Milano, Italy baresi guinea@elet.polimi.it

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

Preemptive PREventivE Methodology and Tools to protect utilities

Preemptive PREventivE Methodology and Tools to protect utilities Preemptive PREventivE Methodology and Tools to protect utilities 2014 2017 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 1 Preemptive description Project objectives

More information

Introduction to LAN/WAN. Application Layer 4

Introduction to LAN/WAN. Application Layer 4 Introduction to LAN/WAN Application Layer 4 Multimedia Multimedia: Audio + video Human ear: 20Hz 20kHz, Dogs hear higher freqs DAC converts audio waves to digital E.g PCM uses 8-bit samples 8000 times

More information

USING METADATA TO PROVIDE SCALABLE BROADCAST AND INTERNET CONTENT AND SERVICES

USING METADATA TO PROVIDE SCALABLE BROADCAST AND INTERNET CONTENT AND SERVICES USING METADATA TO PROVIDE SCALABLE BROADCAST AND INTERNET CONTENT AND SERVICES GABRIELLA KAZAI 1,2, MOUNIA LALMAS 1, MARIE-LUCE BOURGUET 1 AND ALAN PEARMAIN 2 Department of Computer Science 1 and Department

More information

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION 15 Data Compression Data compression implies sending or storing a smaller number of bits. Although many methods are used for this purpose, in general these methods can be divided into two broad categories:

More information

Tracing images back to their social network of origin: a CNN-based approach

Tracing images back to their social network of origin: a CNN-based approach Tracing images back to their social network of origin: a CNN-based approach Irene Amerini, Tiberio Uricchio and Roberto Caldelli Media Integration and Communication Center (MICC), University of Florence,

More information

SANS Institute 2003, All Rights Reserved.

SANS Institute 2003, All Rights Reserved. INCIDENT FORM CHECKLIST Form Completed Date Completed Initials 1. Incident Contact List YES NO -Intellectual Property Owner Contacts YES NO -Intellectual Property Owner Local Contacts YES NO -Suspect Local

More information

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala

CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM. Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala CODING METHOD FOR EMBEDDING AUDIO IN VIDEO STREAM Harri Sorokin, Jari Koivusaari, Moncef Gabbouj, and Jarmo Takala Tampere University of Technology Korkeakoulunkatu 1, 720 Tampere, Finland ABSTRACT In

More information

Multiple Classifier Systems for Image Forgery Detection

Multiple Classifier Systems for Image Forgery Detection Multiple Classifier Systems for Image Forgery Detection Davide Cozzolino, Francesco Gargiulo, Carlo Sansone, and Luisa Verdoliva DIETI, University of Naples Federico II {davide.cozzolino,francesco.grg,carlosan,verdoliv}@unina.it

More information

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities

More information

Council of the European Union Brussels, 16 March 2015 (OR. en)

Council of the European Union Brussels, 16 March 2015 (OR. en) Conseil UE Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE PUBLIC JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational

More information

ANNUAL REPORT Visit us at project.eu Supported by. Mission

ANNUAL REPORT Visit us at   project.eu Supported by. Mission Mission ANNUAL REPORT 2011 The Web has proved to be an unprecedented success for facilitating the publication, use and exchange of information, at planetary scale, on virtually every topic, and representing

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

CYBER SECURITY OPERATION CENTER

CYBER SECURITY OPERATION CENTER CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

New Model for Cyber Crime Investigation Procedure

New Model for Cyber Crime Investigation Procedure New Model for Cyber Crime Investigation Procedure * *Dept. of IT & Cyber Police, Youngdong University, Rep. of Korea ydshin@youngdong.ac.kr doi:10.4156/jnit.vol2.issue2.1 Abstract In this paper, we presented

More information

Phishing Activity Trends Report August, 2005

Phishing Activity Trends Report August, 2005 Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Software Architecture Recovery based on Dynamic Analysis

Software Architecture Recovery based on Dynamic Analysis Software Architecture Recovery based on Dynamic Analysis Aline Vasconcelos 1,2, Cláudia Werner 1 1 COPPE/UFRJ System Engineering and Computer Science Program P.O. Box 68511 ZIP 21945-970 Rio de Janeiro

More information

Sign-up Sheet posted outside of my office HFH 1121

Sign-up Sheet posted outside of my office HFH 1121 Lecture 14: Digital Watermarking II Some slides from Prof. M. Wu, UMCP Lab2 Demo Csil Monday: May 24, 1 4pm Optional (9:30 11am) 10 minutes per Group 5 Minutes Presentation 5 Minutes Demo Sign-up Sheet

More information

MPEG-4: Overview. Multimedia Naresuan University

MPEG-4: Overview. Multimedia Naresuan University MPEG-4: Overview Multimedia Naresuan University Sources - Chapters 1 and 2, The MPEG-4 Book, F. Pereira and T. Ebrahimi - Some slides are adapted from NTNU, Odd Inge Hillestad. MPEG-1 and MPEG-2 MPEG-1

More information

MEDIA RELEASE FOR IMMEDIATE RELEASE Singapore, 6 January 2010 Total: 8 pages (including Notes to the Editor)

MEDIA RELEASE FOR IMMEDIATE RELEASE Singapore, 6 January 2010 Total: 8 pages (including Notes to the Editor) MEDIA RELEASE FOR IMMEDIATE RELEASE Singapore, 6 January 2010 Total: 8 pages (including Notes to the Editor) A*STAR s Exploit Technologies and Institute for Infocomm Research launch world s first adaptive

More information

Image and video processing

Image and video processing Image and video processing Digital video Dr. Pengwei Hao Agenda Digital video Video compression Video formats and codecs MPEG Other codecs Web video - 2 - Digital Video Until the arrival of the Pentium

More information

Patent Image Retrieval

Patent Image Retrieval Patent Image Retrieval Stefanos Vrochidis IRF Symposium 2008 Vienna, November 6, 2008 Aristotle University of Thessaloniki Overview 1. Introduction 2. Related Work in Patent Image Retrieval 3. Patent Image

More information

Document Clustering For Forensic Investigation

Document Clustering For Forensic Investigation Document Clustering For Forensic Investigation Yogesh J. Kadam 1, Yogesh R. Chavan 2, Shailesh R. Kharat 3, Pradnya R. Ahire 4 1Student, Computer Department, S.V.I.T. Nasik, Maharashtra, India 2Student,

More information

The SPARKS Project Motivation, Objectives and Results

The SPARKS Project Motivation, Objectives and Results The SPARKS Project Motivation, Objectives and Results Paul Smith paul.smith@ait.ac.at AIT Austrian Institute of Technology SEGRID Project Workshop 14 th November, 2016, Barcelona, Spain The SPARKS Project

More information

Binju Bentex *1, Shandry K. K 2. PG Student, Department of Computer Science, College Of Engineering, Kidangoor, Kottayam, Kerala, India

Binju Bentex *1, Shandry K. K 2. PG Student, Department of Computer Science, College Of Engineering, Kidangoor, Kottayam, Kerala, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Survey on Summarization of Multiple User-Generated

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

BAMBOO: A FAST DESCRIPTOR BASED ON ASYMMETRIC PAIRWISE BOOSTING. Luca Baroffio, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi

BAMBOO: A FAST DESCRIPTOR BASED ON ASYMMETRIC PAIRWISE BOOSTING. Luca Baroffio, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi BAMBOO: A FAST DESCRIPTOR BASED ON ASYMMETRIC PAIRWISE BOOSTING Luca Baroffio, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi Politecnico di Milano Dipartimento di Elettronica e Informazione Piazza

More information

Strategic and operational threat analysis at Europol's EC3

Strategic and operational threat analysis at Europol's EC3 Strategic and operational threat analysis at Europol's EC3 Dr. Philipp Amann, MSc Senior Strategic Analyst Team Leader Strategy & Development ENISA Workshop on EU Threat Landscape Europol Unclassified

More information

D9.2 IMPLEMENTATION OF PROJECT WEBSITE

D9.2 IMPLEMENTATION OF PROJECT WEBSITE Achieving near Zero and Positive Energy Settlements in Europe using Advanced Energy Technology H2020-678407 D9.2 IMPLEMENTATION OF PROJECT WEBSITE Author: Katharina Langosch (TUM), Wen Pan (TUM) Deliverable

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction

Adaptable and Adaptive Web Information Systems. Lecture 1: Introduction Adaptable and Adaptive Web Information Systems School of Computer Science and Information Systems Birkbeck College University of London Lecture 1: Introduction George Magoulas gmagoulas@dcs.bbk.ac.uk October

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information