Login to filter by course Login to filter by course Reset
Fragile Camera FingerprintsDiscusses Fragile Camera Fingerprints, their security, implementation, and testing for digital image forensics.
JPEG 2000: Image CompressionExplores image compression principles, focusing on JPEG 2000, covering transform-based coding, quantization, entropy coding, region of interest, error resilience, and software implementations.
Media Security StandardsExplores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Media Integrity VerificationExplores media integrity verification, digital signatures, image integrity, watermarking, and forensic analysis.
The JPEG Compression AlgorithmExplains the key ingredients and processes of the JPEG compression algorithm, including block-level compression, smart quantization, and entropy coding.
Conditional Access IExplores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Digital Image CorrelationCovers digital image correlation, similarity criteria, iterative approaches, and practical applications in 2D and 3D correlation.
Image Processing TechniquesCovers image processing techniques including noise addition, filtering, and image enhancement using various filters and tools.
System Modeling LanguagesExplores the significance of System Modeling Languages like OPM, SysML, and Modelica in modern Systems Engineering.