|
BILI7190 | Forensic Investiga.Met.on The Dig.Ima | 3+0+0 | ECTS:7.5 | Year / Semester | Fall Semester | Level of Course | Third Cycle | Status | Elective | Department | DEPARTMENT of COMPUTER ENGINEERING | Prerequisites and co-requisites | None | Mode of Delivery | Face to face | Contact Hours | 14 weeks - 3 hours of lectures per week | Lecturer | -- | Co-Lecturer | none | Language of instruction | | Professional practise ( internship ) | None | | The aim of the course: | Investigation of the different methods to be used in the image forgery detection and analysis of the theoretical backgrounds of these methods |
Programme Outcomes | CTPO | TOA | Upon successful completion of the course, the students will be able to : | | | PO - 1 : | can propose new techniques to detect the forgery on the images | 1,3,7,10 | 1,3 | PO - 2 : | can propose techniques to detect the model of camera, scanner and printer | 1,3,7,10 | 1,3,6 | PO - 3 : | can detect the forgery on the videos | 1,3,7,10 | 1,3,6 | PO - 4 : | can propose new algorithms to detect the forged regions on the image | 1,2,3,7,10 | 1,2,6 | CTPO : Contribution to programme outcomes, TOA :Type of assessment (1: written exam, 2: Oral exam, 3: Homework assignment, 4: Laboratory exercise/exam, 5: Seminar / presentation, 6: Term paper), PO : Learning Outcome | |
History of photo tampering, Active and Passive Image Authentication Techniques, Exposing digital forgeries using JPEG format, Exposing digital forgeries using physical features of cameras, Digital image forensic using sensor noise, Exposing digital forgeries using chromatic aberration, Exposing digital forgeries in color filter array interpolated images, Digital Image authentication from thumbnails, Detection of Resampling from recompressed images, Detection of duplicated regions using image feature matching, Exposing digital forgeries by detecting traces of resampling, Discrimination of Computer generated and photographic faces for forensic investigation, Exposing digital forgeries in complex lighting environments, Exposing digital forgeries in Ballistic Motion, Detection of copy move forgery for forensic investigation, Printer detection techniques for forensics. |
|
Course Syllabus | Week | Subject | Related Notes / Files | Week 1 | History of tampering | | Week 2 | Camera based forensics | | Week 3 | Pixel based forensics | | Week 4 | Statistical based forensics | | Week 5 | Geometric based forensics | | Week 6 | Physics based forensics | | Week 7 | Video Forensics | | Week 8 | Copy Move Forgery Detection Techniques | | Week 9 | MidTerm | | Week 10 | Image splicing detection techniques | | Week 11 | Printer Forensics | | Week 12 | Scanner Forensics | | Week 13 | Netwrok Forensics | | Week 14 | Detection of camera model from forged images | | Week 15 | Detection of cell phone model from forged images | | Week 16 | Final Term | | |
1 | Digital Image Forensics, Hany Farid, http://cs.dartmouth.edu/farid/ | | |
1 | Digital Image Forensics: There is More to a Picture than Meets the Eye, Husrev Taha Sencar, Nasir Memon, Springer | | 2 | Understanding Forensic Digital Imaging, 1st Edition, Blitzer, Stein-Ferguson, Huang, 2008, Academic Press | | |
Method of Assessment | Type of assessment | Week No | Date | Duration (hours) | Weight (%) | Mid-term exam | 8 | | 2 | 30 | Project | 14 | | 2 | 20 | End-of-term exam | 16 | | 2 | 50 | |
Student Work Load and its Distribution | Type of work | Duration (hours pw) | No of weeks / Number of activity | Hours in total per term | Yüz yüze eğitim | 3 | 14 | 42 | Sınıf dışı çalışma | 6 | 14 | 84 | Arasınav için hazırlık | 20 | 1 | 20 | Dönem sonu sınavı için hazırlık | 30 | 1 | 30 | Dönem sonu sınavı | 2 | 1 | 2 | Diğer 1 | 10 | 1 | 10 | Diğer 2 | 10 | 1 | 10 | Total work load | | | 198 |
|