Course Info


F


Lecturer
: Thomas Breuel (tmb@cs.uni-kl.de, secretary@iupr.com)
Hours: 2+1
Textbook: readings from the literature
Course Language: English (lectures), English or German (exams, exercises)
Exercises: Python, C
Lectures: Wednesday, 10:00 - 11:30 am, 48-462
Exercises: Wednesday, 11:30-12:30, 48-462
Start: 28.10.2009
Prerequisites: previous courses in Image Processing, Pattern Recognition, and/or Artificial Intelligence are useful but not required
NEW: Examination: oral, date 1: February 24 and  April 13 2010, register with "Prüfungsamt", date 2 July 20, 2010.

For exam times, please see here: Examinations
There will be a review on February 22 at 10:00

Schedule a Meeting with Thomas Breuel

The course covers methods for computational analysis of digital data and physical evidence.  An emphasis is on the use of statistical, pattern recognition, and machine learning techniques.  We will be examining how personal information and identity can be leaked and what techniques there are for protecting personal information.

Lecture Topics


  1. Introduction
  2. Face Recognition
  3. Face Recognition (2)
  4. Biometrics, Risk, Lost, Training and Testing
  5. Fingerprint Recognition
  6. Behavioral Biometrics (Speaker and Writer Recognition)
  7. CAPTCHAs
  8. Image Steganography and Watermarking
  9. Detecting Camera Models, Instances, and Image Manipulation
  10. Stylometry
  11. Computer Forensics
  12. Privacy on the Web

News Items

Here are some interesting links and recent news items related to the course.  You can find more on del.icio.us.

Privacy & Forensic-Related News Items




Possible in a future course:
  • Imaging for Transportation: Surveillance, X-Ray Inspection
  • License Plate Reading and Applications
  • Voice, Image, Video Mining and Surveillance
  • Real Time Filtering: Spam, Censorship, Copyright Enforcement
  • Text Mining and Intelligence Analysis
  • Data Mining, "Rasterfahndung", "Lauschangriff"
  • Social Network Analysis
  • Phishing and User Interfaces
  • Behavioral Network Security and Intrusion Detection
  • Information Leaking, TEMPEST, Packet Timing
  • Forensic Practice, Hard Disk Forensics
  • Optical Document Security