In addition to the slides, the following books are suggested:
* R. Gonzalez, R. Woods, "Digital Image Processing", Prentice Hall.
* R. Gonzalez, R. Woods, S. Eddins , "Digital Image Processing Using MATLAB", Prentice Hall, 2004
* W. Stallings, Crittografia e Sicurezza delle Reti, Mc Graw Hill
* Ingemar Cox, et al, "Digital Watermarking: Principles and Practice", Morgan Kaufmann
* M. Barni, F. Bartolini, “Watermarking Systems Engineering - Enabling Digital Assets Security and Other Applications”, Dekker
Learning Objectives
The main aim of this course is to give the basic knowledge about the main image processing techniques and about the main methods available to grant the security requirements like image authentication and image confidentiality.
Prerequisites
Signal theory
Teaching Methods
The course is structured in set of taught classes and practical exercices in Matlab language.
Moreover, some seminars on specific topics will be organized.
The exam consists of an oral examination, where the student is asked to answer to some questions on the topics included in the coursework.
Course program
In the following the topics studied in the course are listed.
Titles marked with TLC are included in the program with 9 credits, the ones marked with INF compose the program with 6 credits.
Introduction (TLC + INF)
* What is a Digital Image?
* What is Digital Image Processing?
* Examples of fields using Digital Image Processing
* Key Stages in Digital Image Processing
* Components of an Image Processing System
Digital Image Fundamentals (TLC + INF)
* Human Visual System
* Brightness Adaptation & Discrimination
* Light And Electromagnetic Spectrum
* Image Sensing
* Image Sampling And Quantisation
* Digital image representation
* Spatial Resolution
* Intensity Level Resolution
Intensity Transformations and Spatial Filtering (TLC)
* Basic Spatial Domain Processing
* Point Processing
* Thresholding
* Basic Grey Level Transformations
* Negative/Identity
* Logarithmic Transformations
* Power law Transformations
* Contrast stretching & thresholding
* Intensity Level Slicing
* Histogram processing
* Histogram equalization
* Linear Spatial Filtering Process
* Smoothing Linear Filters
* Order-statistic Filters
* Sharpening Spatial Filters
* 1st and 2nd Derivative
* Combining Spatial Enhancement Methods
Digital Transforms (TLC + INF)
* Fourier Transform 1D
* Sampling theorem and aliasing
* Interpolation in image processing
* Discrete Fourier Transform (1D)
* 2D Fourier Transform
* 2D sampling and aliasing
* 2D-Discrete Fourier Transform (2D-DFT)
* 2D-DFT properties
* Strange effects of 2D-DFT
* interpolation in image processing
* 2D-DFT drawbacks
* From 2D-DFT to 2D-DCT
* 2D-DCT advantages
* Haar Transform
* Wavelet Transform
Foundations of Cryptography (TLC + INF)
* Requirements for Image protection
* Framework and Basic Terminology
* Symmetric Cryptography
* Asymmetric Cryptography
* Symmetric vs. Asymmetric
* Brute Force Search
* Cryptanalytic Attacks
Symmetric Cryptography (TLC + INF)
* Block ciphers
* Block Cipher Principles
* Shannon and SP Ciphers
* Confusion and Diffusion
* Feistel Cipher Structure
* Data Encryption Standard (DES)
* Modes of Operation
* Stream Ciphers
* Vernam Cipher
* One-Time Pad
* RC4 cipher
* Key Distribution in symmetric schemes
Authentication through cryptography, Digital Signatures, PRNG (TLC + INF)
* authentication mechanism
* Message Encryption
* Message Authentication Code
* Hash Function
* MD5
* Digital Signatures
* Random Numbers and Noise
* Linear Congruential Generator
* Blum Blum Shub Generator
Foundations of Data Hiding (TLC + INF)
* Digital Watermark
* Steganography
* Electronic watermarking
* Applications
* Models for Data Hiding
* Geometric Model
* Communication Model
* Example of Data Hiding System
* Information coding
* Watermark embedding
* Concealment
* Watermark impairments
* Recovery of hidden information
* Classification of techniques
* Requirements
* Embedding domain
* Embedding rule
Robust Data Hiding in Frequency Domain (TLC + INF)
* Transformed domain techniques
* Frequency Based Spread Spectrum Watermarking
* Cox’s technique
* UNIFI’s technique in DCT domain
* UNIFI’s technique in DFT domain
Informed Data Hiding (TLC + INF)
* Blind vs. informed embedding
* Binning Schemes
* Data Hiding Binning Schemes
* Scalar-Quantizer Index Modulation
* ST-DM watermarking
Fragile Data Hiding (TLC + INF)
* Principles of fragile watermarks
* Algorithm Yeung-Mintzer
* Embedding check-sums in LSB
* Embedding hash+logo in LSB (Wong)
* Embedding hash+logo in LSB (Fridrich)
Foundations of Image Forensics (TLC + INF)
* Problem & Motivation
* Tools for Image Authentication
* Multimedia Forensics
* Image Forensics and its applications
* Basic Idea & General procedure
* Digital traces
* Digital Camera Model
Compression standards: JPEG and MPEG (TLC)
* JPEG Compression Standard
* Operation Modes
* JPEG Baseline System
* JPEG Encoding Overview
* Other JPEG Models
* Video compression
* Motion estimation and compensation
* MPEG-1 structure
Image Segmentation (TLC)
* Basic concepts of Segmentation
* Discontinuities
* Isolated Points Detection
* Line Detection
* Basic Edge Detection
* Marr-Hildreth edge detector
* Canny edge detector
* Image segmentation through thresholding
* Basic Global Thresholding
* Optimum Global Thresholding Using Otsu's Method
* Using edges to improve global thresholding
* Multiple Thresholds
* Variable Thresholding
* Region Based Segmentation
* Region growing
* Region Splitting and Merging
Filtering in the Frequency Domain (TLC)
* Basic properties of frequency domain
* Basics of filtering in frequency domain
* Need for Padding
* Some Basic Frequency Domain Filters
* Smoothing Frequency Domain Filters
* Ideal, Butterworth and Gaussian Low Pass Filters
* Sharpening in the Frequency Domain
* Ideal, Butterworth and Gaussian High Pass Filters