Introduction |
|
(W00) Course Instructions |
|
00:00:00 |
|
(W51M00) Instructor Introduction |
|
00:00:00 |
|
(W51M00) Prologue |
FREE |
00:00:00 |
Module 1 |
|
(W51M00) Module 1 Introduction |
|
00:00:00 |
Chapter 1 |
|
(W51M01) Photographs as Legal Evidence: Current Scenario |
|
00:00:00 |
|
(W51M02) Admissibility |
|
00:00:00 |
|
(W51M03) Standards for Admissibility of Experimental and Scientific Evidence |
|
00:00:00 |
|
(W51M04) Summary and references |
|
00:00:00 |
Chapter 2 |
|
(W51M05) Digital Image Forensics: Basic Methodology |
|
00:00:00 |
|
(W51M06) Digital Image Forensics |
|
00:00:00 |
|
(W51M07) Forensic Enhancement of Evidence |
|
00:00:00 |
|
(W51M08) Evidence Authentication |
|
00:00:00 |
|
(W51M09) Identification and Interpretation |
|
00:00:00 |
|
(W51M10) Preparation of Forensic Report and Serving as Expert Witness |
|
00:00:00 |
|
(W51M11) Summary and References |
|
00:00:00 |
Assignments |
|
(W51Q01) Module 1 Quiz |
|
00:05:00 |
|
(W51A01) Module 1 Assignments |
UNLIMITED |
Module 2 |
Chapter 1 |
|
(W51M12) Module 2 Introduction |
|
00:00:00 |
|
(W51M13) Principles of Digital Image Authentication |
|
00:00:00 |
|
(W51M14) Image Source and Content Authentication: Basic Principle |
|
00:00:00 |
|
(W51M15) Image Authentication: The Concept of Identifying Traces |
|
00:00:00 |
|
(W51M16) Variants of Digital Image Forensics |
|
00:00:00 |
|
(W51M17) Modes of Forensic Authentication |
|
00:00:00 |
|
(W51M18) Summary and References |
|
00:00:00 |
Chapter 2 |
|
(W51M19) Image Source Identification and Authentication |
|
00:00:00 |
|
(W51M20) Source Camera Identification |
|
00:00:00 |
|
(W51M21) Classes of Source Camera Identification |
|
00:00:00 |
|
(W51M22) Experiment 1: Visual Appearance of Noise Patterns |
|
00:00:00 |
|
(W51M23) Experiment 1 - Demonstration (Tutorial 1) |
|
00:00:00 |
|
(W51M24) Experiment 2: Verification of the Unique Nature of PRNU Patterns |
|
00:00:00 |
|
(W51M25) Experiment 2 - Demonstration (Tutorial 2) |
|
00:00:00 |
|
(W51M26) Classes of Source Camera Identification - cont. |
|
00:00:00 |
|
(W51M27) Blind Source Camera Identification |
|
00:00:00 |
|
(W51M28) Summary and References |
|
00:00:00 |
|
(W51M29) MATLAB Codes & Instructions |
|
00:00:00 |
Chapter 3 |
|
(W51M30) Basic Image Content Authentication: Active Non-Blind Methods |
|
00:00:00 |
|
(W51M31) Overlaid Timestamp Analysis |
|
00:00:00 |
|
(W51M32) Digital Signature–Based Authentication |
|
00:00:00 |
|
(W51M33) Watermark Analysis–Based Authentication |
|
00:00:00 |
|
(W51M34) Exigency of Passive–Blind Methods of Content Authentication |
|
00:00:00 |
|
(W51M35) Summary and References |
|
00:00:00 |
Chapter 4 |
|
(W51M36) Basic Content Integrity Verification |
|
00:00:00 |
|
(W51M37) Hash Value Analysis |
|
00:00:00 |
|
(W51M38) Metadata Analysis |
|
00:00:00 |
|
(W51M39) Hex Editor Analysis |
|
00:00:00 |
|
(W51M40) Summary and References |
|
00:00:00 |
Module 2 Assignments |
|
(W51A02) Module 2 Quiz |
|
00:05:00 |
|
(W51A02) Module 2 Assignments |
UNLIMITED |
Module 3 - June 8th |
|
(W51M41) Module 3 Introduction |
|
00:00:00 |
Chapter 1 |
|
(W51M42) Types of Image Forgeries |
|
00:00:00 |
Chapter 2 |
|
(W51M43) Error Level Analysis |
|
00:00:00 |
|
(W51M44) Experiment I - ELA for the Detection of Resaved (Re–compressed) Images |
|
00:00:00 |
|
(W51M45) Experiment II - ELA for the Detection of Copy-Paste Forgeries |
|
00:00:00 |
|
(W51M46) Experiment III - ELA for the Detection of Retouching |
|
00:00:00 |
|
(W51M47) Caveats of Error Level Analysis |
|
00:00:00 |
|
(W51M48) Passive–Blind Image Forgery Detection Techniques - Recompression Detection, JPEG Quantization |
|
00:00:00 |
|
(W51M49) Passive–Blind Image Forgery Detection Techniques - Copy-paste and Resampling |
|
00:00:00 |
|
(W51M00) Demonstration I (Tutorial 3) |
|
00:00:00 |
|
(W51M00) Demonstration II (Tutorial 4) |
|
00:00:00 |
|
(W51M00) Demonstration III (Tutorial 5) |
|
00:00:00 |
|
(W51M00) Demonstration IV (Tutorial 6) |
|
00:00:00 |
|
(W51M00) Demonstration V (Tutorial 7) |
|
00:00:00 |
|
(W51M50) Summary and References |
|
00:00:00 |
Chapter 3 |
|
(W51M51) Unrealistic Assumptions and Conjectures |
|
00:00:00 |
|
(W51M52) Intrusive Nature of Compression and Noise |
|
00:00:00 |
|
(W51M53) Lack of Multifaceted Forensic Tools & Inadequate Experimentation on Realistically Doctored Images |
|
00:00:00 |
|
(W51M54) Insufficient Counter Anti–Forensic Strategies |
|
00:00:00 |
|
(W51M54) Summary and References |
|
00:00:00 |
Module 3 Assignments |
|
(W51Q03) Module 3 Quiz |
|
Unlimited |
|
(W51A03) Module 3 Assignments |
UNLIMITED |
Module 4 |
|
(W51M55) Module Introduction |
|
00:00:00 |
Chapter 1 |
|
(W51M56) Introduction to Deepakes |
|
00:00:00 |
|
(W51M57) History of Deepfakes |
|
00:00:00 |
|
(W51M58) Deep learning-based fake content creation |
|
00:00:00 |
|
(W51M59) Summary and References |
|
00:00:00 |
Chapter 2 |
|
(W51M60) Deepfake Detection: Current State of Affairs |
|
00:00:00 |
|
(W51M61) Deepfake Detection: Additional Notes |
|
00:00:00 |
|
(W51M62) Practical Demo I (Tutorial 8) |
|
00:00:00 |
|
(W51M63) Practical Demo II (Tutorial 9) |
|
00:00:00 |
|
(W51M64) Summary and References |
|
00:00:00 |
Module 4 Assignments |
|
(W51A04) Module 4 Assignments |
UNLIMITED |
Course complete! |