N. Nikolaidis C. Kotropoulos I. Pitas Artificial Intelligence and Information Analysis (AIIA)...
-
date post
22-Dec-2015 -
Category
Documents
-
view
216 -
download
0
Transcript of N. Nikolaidis C. Kotropoulos I. Pitas Artificial Intelligence and Information Analysis (AIIA)...
N. Nikolaidis C. Kotropoulos I. Pitas N. Nikolaidis C. Kotropoulos I. Pitas
Artificial Intelligence and Information Analysis (AIIA) Artificial Intelligence and Information Analysis (AIIA) LaboratoryLaboratory
Department of InformaticsDepartment of InformaticsAristotle University of Thessaloniki, GreeceAristotle University of Thessaloniki, Greece
Intellectual Property Rights Intellectual Property Rights Protection in Digital Media Protection in Digital Media
Digital Media RevolutionDigital Media Revolution
• Usage of digital media has witnessed a tremendous growth Entertainment, arts, educational multimedia
• Advantages Efficient storageEfficient storage Ease / speed of manipulation and transmissionEase / speed of manipulation and transmission
• Disadvantages Vulnerability to copyright infringement, tampering, Vulnerability to copyright infringement, tampering,
unauthorized distributionunauthorized distribution
Can you tell the difference?Can you tell the difference?
Original ImageOriginal Image Watermarked ImageWatermarked Image
IPR Protection TechniquesIPR Protection Techniques
• GoalsGoals Access / usage controlAccess / usage control Copy managementCopy management Copyright certification, authenticationCopyright certification, authentication
• SolutionsSolutions Encryption : Scrambling of data, allow descrambling to Encryption : Scrambling of data, allow descrambling to
authorized users onlyauthorized users only Watermarking: Imperceptible embedding of Watermarking: Imperceptible embedding of
copyright/access control data in digital mediacopyright/access control data in digital media
• Efficient solutions are yet to be foundEfficient solutions are yet to be found
IPR Protection Research FP4/5IPR Protection Research FP4/5
• Face verification for secure access to multimedia services Face verification for secure access to multimedia services IST-MUHCI (Multimodal Human-Computer Interaction)IST-MUHCI (Multimodal Human-Computer Interaction) ACTS-M2VTS (Multi-modal Verification Techniques for Teleservices and ACTS-M2VTS (Multi-modal Verification Techniques for Teleservices and
Security Applications)Security Applications)
Face verification using elastic graph matchingFace verification using elastic graph matching
•Copyright protection / authentication watermarking of Copyright protection / authentication watermarking of images / video / audioimages / video / audio
IST-CERTIMARK (Certification for watermarking IST-CERTIMARK (Certification for watermarking techniques)techniques)LTR/ESPRIT-INSPECT (Innovative Signal Processing LTR/ESPRIT-INSPECT (Innovative Signal Processing Exploiting Chaotic Dynamics)Exploiting Chaotic Dynamics)RACE-ACCOPI (Access Control and Copyright Protection RACE-ACCOPI (Access Control and Copyright Protection for Images) for Images)
Original ImageOriginal ImageWatermarked ImageWatermarked Image
Tampered regions Tampered regions overlaid on the imageoverlaid on the image
Detected tampered Detected tampered regionsregions
AIIA Lab ProfileAIIA Lab Profile
• Two faculty membersTwo faculty members• Twenty researchers Twenty researchers • Twenty projects (EU, national)Twenty projects (EU, national)• Three hundred publicationsThree hundred publications• Twenty years of researchTwenty years of research
Image / video processing & analysisImage / video processing & analysis Speech processingSpeech processing 3-D Image processing3-D Image processing BiometricsBiometrics