Before the course |
|
(W34M00) DVM anti-forensics and counter-anti-forensics - introduction |
FREE |
00:00:00 |
Module 1 |
|
(W34M00) Module 1 Overview |
FREE |
00:00:00 |
Chapter 1 |
|
(W34M01) Forensic Applications of Visual Evidence |
|
00:00:00 |
|
(W34M02) Admissibility of Digital Images and Videos: Rules of Evidence |
|
00:00:00 |
|
(W34M03) Visual Evidence and the Fallacy of Infallibility |
|
00:00:00 |
|
(W34M04) Forensic Analysis of Visual Evidence |
|
00:00:00 |
|
(W34M05) Content Authentication: The Concept of Identifying Traces |
|
00:00:00 |
|
(W34M06) Tamper Detection: The Challenge and its Significance |
|
00:00:00 |
|
(W34M07) Summary & References |
|
00:00:00 |
Chapter 2 |
|
(W34M08) Image and Video Forgeries |
|
00:00:00 |
Chapter 3 |
|
(W34M09) Digital Visual Media Forgery Detection: An Introduction |
|
00:00:00 |
|
(W34M10) Methods of Digital Visual Media Tamper Detection |
|
00:00:00 |
|
(W34M11) Passive–Blind Forgery Detection Techniques - Part 1 |
FREE |
00:00:00 |
|
(W34M12) Passive–Blind Forgery Detection Techniques - Part 2 |
|
00:00:00 |
|
(W34M13) Content Authentication via Tamper Detection: Concluding Remarks on the Current State of Affairs |
|
00:00:00 |
|
(W34M14) Summary & References |
|
00:00:00 |
Module 1 Video Tutorials |
|
(W34M15) Video tutorial I |
|
00:00:00 |
|
(W34M16) Video Tutorial II |
|
00:00:00 |
Appendices |
|
(W34M17) Appendix A - Forensic Analysis of Photographic and Video Evidence |
|
00:00:00 |
|
(W34M18) Appendix B - Source Authentication |
|
00:00:00 |
|
(W34M19) Appendix C - Integrity Verification Measures |
|
00:00:00 |
|
(W34M20) Appendix D - Active Non–Blind Tamper Detection Solutions |
|
00:00:00 |
Module 1 Assignments |
|
(W34Q01) Module 1 Quiz |
|
00:06:00 |
|
(W34Q02) Crossword Puzzle |
|
00:11:00 |
|
(W34A01) Rules of Evidence Exercise |
30, 00:00 |
|
(W34A02) Mini Case Study |
30, 00:00 |
|
(W34A03) Reverse Multiple Choice Question |
30, 00:00 |
Module 2 |
|
(W34M22) Module 2 Introduction |
|
00:00:00 |
Chapter 1 |
|
(W34M23) Deepfakes: Genesis |
|
00:00:00 |
|
(W34M24) Kate McKinnon as Hillary Clinton |
|
00:00:00 |
|
(W34M25) Nicholas Cage as Jean-Luc Picard in Star Trek |
|
00:00:00 |
|
(W34M26) An Introduction to Deepfakes and Fake Videos |
|
00:00:00 |
|
(W34M27) History of Deepfakes |
|
00:00:00 |
|
(W34M28) Here are some examples of the uncanny valley in action, mostly from video games. |
|
00:00:00 |
|
(W34M29) Deepfake Detection: Current State of Affairs |
|
00:00:00 |
|
(W34M30) Summary & References |
|
00:00:00 |
Chapter 2 |
|
(W34M31) O, what a goodly outside falsehood hath! |
|
00:00:00 |
|
(W34M32) Miss Ping (Tumba Ping Pong Show) by Slightly Mad Max & DJ Coolman starring Miss Ping |
|
00:00:00 |
|
(W34M33) Superhuman Tape Measure Skills by spmconstructionmn |
|
00:00:00 |
|
(W34M34) The Mirror Ball Illusion [known as ‘Magically throwing a ball through a mirror (OPTICAL ILLUSION)’ on YouTube] by Kevin Perry |
|
00:00:00 |
|
(W34M35) Rush Hour by Fernando Livschitz (Posted by Myles Scott for Some Reason) |
|
00:00:00 |
|
(W34M36) Summary & References |
|
00:00:00 |
Module 2 Assignments |
|
(W34A04) Exercise - Digital Faces |
30, 00:00 |
|
(W34A05) Exercise: Movie Magic |
30, 00:00 |
|
(W34A06) Exercise: Fake Video Detection |
30, 00:00 |
Module 3 |
|
(W34M38) Module 3 Introduction |
|
00:00:00 |
Chapter 1 |
|
(W34M39) Anti–Forensics and Counter Anti–Forensics: Fundamentals |
|
00:00:00 |
|
(W34M40) Visual Media Anti–Forensics |
|
00:00:00 |
|
(W34M41) Classification of Anti–Forensic Strategies |
|
00:00:00 |
|
(W34M42) Targeted vs. Universal |
|
00:00:00 |
|
(W34M43) Counter Anti–Forensics |
|
00:00:00 |
|
(W34M44) Summary & References |
|
00:00:00 |
Chapter 2 |
|
(W34M45) Source Identification Anti–Forensics |
|
00:00:00 |
|
(W34M46) Fingerprint Removal and Copy Attacks (aka Signature Removal and Substitution Attacks) |
|
00:00:00 |
|
(W34M47) Manipulation of Quantization Tables |
|
00:00:00 |
|
(W34M48) Source Identification Counter Anti–Forensics |
|
00:00:00 |
|
(W34M49) Summary & References |
|
00:00:00 |
Chapter 3 |
|
(W34M50) Tamper Detection: Anti–Forensics and Counter Anti–Forensics |
|
00:00:00 |
|
(W34M51) Anti-Forensic Properties of Compression and Effect of Compression on Resampling Detection |
|
00:00:00 |
|
(W34M52) Effect of Compression on Copy–Paste Detection |
|
00:00:00 |
|
(W34M53) Anti–Forensic Properties of Noise and Hiding Traces of JPEG Compression |
|
00:00:00 |
|
(W34M54) Hiding Traces of Resampling |
|
00:00:00 |
|
(W34M55) Other Anti–Forensic Strategies |
|
00:00:00 |
|
(W34M56) Tamper Detection Counter Anti–Forensics |
|
00:00:00 |
|
(W34M57) Targeted Counter Anti–Forensics |
|
00:00:00 |
|
(W34M58) Smarter Forensics |
|
00:00:00 |
|
(W34M59) Final Thoughts |
|
00:00:00 |
Module 3 Video Tutorial |
|
(W34M60) Module 3 Video Tutorial |
|
00:00:00 |
Module 3 Assignments |
|
(W34A07) Module 3 Exercises |
30, 00:00 |
|
(W34Q03) Final Quiz |
|
00:12:00 |