Seminars

Prof. Rainer Böhme and Prof. Giulia Boato will give guest lectures in Trento and Innsbruck, respectively.
The seminars are open to any interested bachelor and master students, PhD students, research fellows, faculties.

Steganography and Steganalysis
Speaker: Prof. Rainer Böhme.
Date: 28th Nov 2017.
Time: 9 am.
Location: Trento, DISI, Polo Ferrari, A108.

Steganography is the art and science of hiding information in inconspicuous cover data such that the mere existence of a secret message is kept confidential. Steganalysis refers to the task of detecting secret messages in covers. This lecture introduces security notions and design principles of steganographic systems. It sets out with a discussion on the relation between subfields of multimedia security. The lecture then presents several iterations of the cat-and-mouse game between defenders and attackers for the case of (grayscale) images as covers. Special emphasis is set on the problem of selecting embedding positions with the help of coding theory.

 

 

Discriminate real and artificial human faces in digital media
Speaker: Prof. Giulia Boato.
Date: 21st Mar 2018.
Time: 12.15 am.
Location: Innsbruck, Institut für Informatik, Room HS 10.

Modern computer graphics technologies brought realism in computer-generated characters, making them achieve truly natural appearance. Besides traditional virtual reality applications such as avatars, games, or cinema, these synthetic characters may be used to generate realistic fakes, which may lead to improper use of technology. This fact raises the demand for advanced tools able to discriminate real and artificial human faces in digital media. In this seminar, the state of the art on discrimination between computer generated and natural faces will be revised, discussing also recent approaches which propose solutions based on advanced computer vision technologies allowing the  extraction of physiological measurements from video sequences. The analysis of such physiological signals and/or facial dynamic information can also be exploited to tackle the strictly connected problem of face anti-spoofing.