The program includes the following topics:
* Image acquisition and representation
* Spatial Domain Processing
* Numerical transforms
* JPEG and MPEG Standards
* Cryptography and image encryption
* Data hiding techniques
* Image forensic techniques
In addition to the slides, the following books are suggested:
* R. Gonzalez, R. Woods, "Digital Image Processing", Prentice Hall.
* R. Gonzalez, R. Woods, S. Eddins , "Digital Image Processing Using
MATLAB", Prentice Hall, 2004
* W. Stallings, Crittografia e Sicurezza delle Reti, Mc Graw Hill
* Ingemar Cox, et al, "Digital Watermarking: Principles and Practice",
Morgan Kaufmann
* M. Barni, F. Bartolini, “Watermarking Systems Engineering - Enabling
Digital Assets Security and Other Applications”, Dekker
The slides are available at: http://e-l.unifi.it/login/index.php, after registration to the course ELABORAZIONE e PROTEZIONE delle IMMAGINI.
Learning Objectives
The main aim of this course is to give the basic knowledge about the
main image processing techniques and about the main methods available
to grant the security requirements like image authentication and image
confidentiality.
Prerequisites
Signal Theory
Teaching Methods
The course is structured in set of taught classes and practical exercices in
Matlab language.
Moreover, some seminars on specific topics will be organized.
The exam consists of an oral examination, where the student is asked to
answer to some questions on the topics included in the coursework.
Alternatively, the student may arrange with the teacher conducting an elaborate.
Course program
In the following the topics studied in the course are listed.
Introduction
* What is Digital Image Processing
* Digital Image Fundamentals
Intensity Transformations and Spatial Filtering
* Basic Spatial Domain Processing
* Point Processing
* Histogram processing
* Spatial Enhancement Methods
Digital Transforms
* Fourier Transform
* Discrete Cosine Transform
* Wavelet Transform
* Filtering in the Frequency Domain
Compression standards: JPEG and MPEG
* JPEG Compression Standard
* Video compression
* Audio compression
Cryptography
* Framework and Basic Terminology
* Symmetric Cryptography
* Asymmetric Cryptography
* Authentication through cryptography, Digital Signatures, PRNG
Data Hiding Techniques
* Foundations of Data Hiding
* Spatial domain techniques
* Transformed domain techniques
* Informed Data Hiding
* Fragile Data Hiding
Image Forensics
* Image Forensics and its applications
* Basic Idea & General procedure
* Digital Camera Model
* Tools for Image Forensics