Course Curriculum

Introduction
(W00) Course Instructions 00:00:00
(W51M00) Instructor Introduction 00:00:00
(W51M00) Prologue FREE 00:00:00
Module 1
(W51M00) Module 1 Introduction 00:00:00
Chapter 1
(W51M01) Photographs as Legal Evidence: Current Scenario 00:00:00
(W51M02) Admissibility 00:00:00
(W51M03) Standards for Admissibility of Experimental and Scientific Evidence 00:00:00
(W51M04) Summary and references 00:00:00
Chapter 2
(W51M05) Digital Image Forensics: Basic Methodology 00:00:00
(W51M06) Digital Image Forensics 00:00:00
(W51M07) Forensic Enhancement of Evidence 00:00:00
(W51M08) Evidence Authentication   00:00:00
(W51M09) Identification and Interpretation 00:00:00
(W51M10) Preparation of Forensic Report and Serving as Expert Witness  00:00:00
(W51M11) Summary and References 00:00:00
Assignments
(W51Q01) Module 1 Quiz 00:05:00
(W51A01) Module 1 Assignments UNLIMITED
Module 2
Chapter 1
(W51M12) Module 2 Introduction 00:00:00
(W51M13) Principles of Digital Image Authentication 00:00:00
(W51M14) Image Source and Content Authentication: Basic Principle  00:00:00
(W51M15) Image Authentication: The Concept of Identifying Traces  00:00:00
(W51M16) Variants of Digital Image Forensics 00:00:00
(W51M17) Modes of Forensic Authentication 00:00:00
(W51M18) Summary and References 00:00:00
Chapter 2
(W51M19) Image Source Identification and Authentication 00:00:00
(W51M20) Source Camera Identification  00:00:00
(W51M21) Classes of Source Camera Identification  00:00:00
(W51M22) Experiment 1: Visual Appearance of Noise Patterns 00:00:00
(W51M23) Experiment 1 - Demonstration (Tutorial 1) 00:00:00
(W51M24) Experiment 2: Verification of the Unique Nature of PRNU Patterns 00:00:00
(W51M25) Experiment 2 - Demonstration (Tutorial 2) 00:00:00
(W51M26) Classes of Source Camera Identification  - cont. 00:00:00
(W51M27) Blind Source Camera Identification 00:00:00
(W51M28) Summary and References 00:00:00
(W51M29) MATLAB Codes & Instructions 00:00:00
Chapter 3
(W51M30) Basic Image Content Authentication: Active Non-Blind Methods 00:00:00
(W51M31) Overlaid Timestamp Analysis  00:00:00
(W51M32) Digital Signature–Based Authentication 00:00:00
(W51M33) Watermark Analysis–Based Authentication 00:00:00
(W51M34) Exigency of Passive–Blind Methods of Content Authentication 00:00:00
(W51M35) Summary and References 00:00:00
Chapter 4
(W51M36) Basic Content Integrity Verification 00:00:00
(W51M37) Hash Value Analysis 00:00:00
(W51M38) Metadata Analysis 00:00:00
(W51M39) Hex Editor Analysis 00:00:00
(W51M40) Summary and References 00:00:00
Module 2 Assignments
(W51A02) Module 2 Quiz 00:05:00
(W51A02) Module 2 Assignments UNLIMITED
Module 3 - June 8th
(W51M41) Module 3 Introduction 00:00:00
Chapter 1
(W51M42) Types of Image Forgeries 00:00:00
Chapter 2
(W51M43) Error Level Analysis 00:00:00
(W51M44) Experiment I - ELA for the Detection of Resaved (Re–compressed) Images 00:00:00
(W51M45) Experiment II - ELA for the Detection of Copy-Paste Forgeries 00:00:00
(W51M46) Experiment III - ELA for the Detection of Retouching 00:00:00
(W51M47) Caveats of Error Level Analysis 00:00:00
(W51M48) Passive–Blind Image Forgery Detection Techniques - Recompression Detection, JPEG Quantization 00:00:00
(W51M49) Passive–Blind Image Forgery Detection Techniques - Copy-paste and Resampling 00:00:00
(W51M00) Demonstration I (Tutorial 3) 00:00:00
(W51M00) Demonstration II (Tutorial 4) 00:00:00
(W51M00) Demonstration III (Tutorial 5) 00:00:00
(W51M00) Demonstration IV (Tutorial 6) 00:00:00
(W51M00) Demonstration V (Tutorial 7) 00:00:00
(W51M50) Summary and References 00:00:00
Chapter 3
(W51M51) Unrealistic Assumptions and Conjectures 00:00:00
(W51M52) Intrusive Nature of Compression and Noise 00:00:00
(W51M53) Lack of Multifaceted Forensic Tools & Inadequate Experimentation on Realistically Doctored Images 00:00:00
(W51M54) Insufficient Counter Anti–Forensic Strategies 00:00:00
(W51M54) Summary and References 00:00:00
Module 3 Assignments
(W51Q03) Module 3 Quiz Unlimited
(W51A03) Module 3 Assignments UNLIMITED
Module 4
(W51M55) Module Introduction 00:00:00
Chapter 1
(W51M56) Introduction to Deepakes 00:00:00
(W51M57) History of Deepfakes 00:00:00
(W51M58) Deep learning-based fake content creation 00:00:00
(W51M59) Summary and References 00:00:00
Chapter 2
(W51M60) Deepfake Detection: Current State of Affairs 00:00:00
(W51M61) Deepfake Detection: Additional Notes 00:00:00
(W51M62) Practical Demo I (Tutorial 8) 00:00:00
(W51M63) Practical Demo II (Tutorial 9) 00:00:00
(W51M64) Summary and References 00:00:00
Module 4 Assignments
(W51A04) Module 4 Assignments UNLIMITED
Course complete!
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023