MULTIMEDIA FORENSICS: OVERVIEW AND PERSPECTIVE

The widespread adoption of over traditional film rise to a number of new Digital can be altered, and with relative ease by This has important consequences for and on digital information. The pipeline which leads to ascertain whether an image has undergone to some kind of forgery leads through the following steps: determine whether the image is and, in the case where the previous step has given negative results, try to understand the past history of the image. Although the field of information forensics is still young, many forensic techniques have been developed to detect forgeries, identify the origin, and trace the processing history of digital multimedia content.

The widespread adoption of digital content over traditional physical media such as film has given rise to a number of new information security challenges. Digital content can be altered, falsified, and redistributed with relative ease by adversaries. This has important consequences for governmental, commercial, and social institutions that rely on digital information. The pipeline which leads to ascertain whether an image has undergone to some kind of forgery leads through the following steps: determine whether the image is "original" and, in the case where the previous step has given negative results, try to understand the past history of the image. Although the field of information forensics is still young, many forensic techniques have been developed to detect forgeries, identify the origin, and trace the processing history of digital multimedia content. During this course, we will discuss about the overview of information forensics research and related applications. Also, we examine the device-specific fingerprints left by digital image and video cameras along with forensic techniques used to identify the source of digital multimedia files. Topics like database mismatch, lack of training data, supervised and unsupervised methodologies, vulnerability assessment against attacks, tampering detection in the presence of unknown post-processing, deepfakes detection and so on, would all be themes of interests. Finally, an overview of the recent trends and evolution, just considering the updated literature in the field will be provided. Lectures will be supported with discussion sessions based on different problems associated with multimedia forensics. In this program, efforts will be made to introduce various tools used in multimedia forensic system for commercial and scientific imaging applications such as forgery detection using active and passive methods, video forensic, social media forensic, adversarial forensics, etc. Furthermore, this program will also have sufficient practical sessions to support the lectures. It is expected that participants will attain sufficient knowledge in this area after attending this program.

Objectives
The main objective of this course is to explain the basic and advanced concepts of forensic systems for commercial and scientific imaging system. This also explains how imaging data are processed and how proceed to detect forgeries. Another prime objective is also to list the specifications and requirements to select a specific algorithm for your imaging application in the forensics context and learns to recognize performance differences among imaging pipeline technologies. After successful completion of the program, participants will familiar with current and future multimedia forensics technologies and applications.
1. Introduction of data science: motivation, problems to address, limitations and challenges, and applications 2. Multimedia forensics 3. Camera identification 4. Forgery detection through active methods 5. Forgery detection through passive methods 6. Double quantization 7. Video forensics 8. Social media forensics 9. Deep fake methods for generation and detection 10. Adversarial forensics 11. Case study analysis 12. Research status and current challenges * Practical Sessions on (a) image and video authentication, (b) deepfake and (c) case study analysis.

Dates
September 19-23, 2022 (Number of participants for the course will be limited to fifty)

You Should Attend If…
 Students at all levels (B.Tech./M.Sc./M.Tech./Ph.D.) and aspiring researcher within the broad domain of signal, image, video processing, data science, machine learning, artificial intelligence.
 Practicing engineers, computer scientists, physics, mathematicians, information technologists and data-processing specialists working in diverse areas such as telecommunications, seismic and geophysical, medical, and hospital information systems may find the course useful in their quest to learn advanced techniques for multimedia forensic.
 Executives, researchers from artificial intelligence, image/video processing, and computer vision industry, service and government organization including R&D laboratories.
 Faculty members from academic and technical institutions.

Fees
The participation fee per person for taking the course is as follows: INR 2360/-Students have to submit a letter from their institution/Valid Identity card as proof of full-time student enrollment. The above fees include all instructional materials, computer use for practical sessions, internet facility. The course fee is inclusive of 18% GST as per institute norm. Registration fee should be paid through VNIT Payment gateway https://pay.vnit.ac.in/home. For the complete process, you may visit https://ece.vnit.ac.in/people/deepgupta/gian/mf/ Boarding, lodging, and meal charges are not included in the fees. The participants will be provided single/shared accommodation in the Institute Guest house/Guest Rooms/ student hostel on payment basis.

To Apply
For participants both within and outside VNIT Nagpur, a one-time fee of Rs. 500/-will be charged for registration at the GIAN portal for all future courses in subsequent years. Login and Apply at https://gian.iitkgp.ac.in/GREGN/index . For more details, Please follow the link https://ece.vnit.ac.in/people/deepgupta/gian/mf/