[学术报告]2007年大阳城国际娱乐官网信息技术研究院系列学术报告7

2007年大阳城国际娱乐官网信息技术研究院系列学术报告7

Title: Digital Forensics

Speaker: Prof. Yun Qing Shi

Department of Electrical and Computer Engineering, New Jersey Institute of Technology (NJIT), US

Time: July 6, 2007, 15:30PM

Place: 1-415, FIT Building

Organizer: Research Institute of Information Technology (RIIT), Tsinghua University

Yun Qing Shi has joined NJIT since 1987. He obtained his B.S. degree and M.S. degree from the Shanghai Jiao Tong University, China; his M.S. and Ph.D. degrees from University of Pittsburgh, US. His research interests include visual signal processing and communications, multimedia data hiding and security, and their applications to industrial automation and biomedical engineering. Some of his research projects have been supported by several federal and New Jersey State funding agencies, and industrial companies. He is an author/coauthor of 200 papers, one book and four book chapters in his research areas. He holds two US patents and has 20 US patents pending (among which 11 technologies have been licensed to another party by NJIT). He has been actively involved in IEEE and other professional activities. He was an IEEE Distinguished Lecturer, an Associate Editor of two IEEE Transactions (SP and CASII), and is the founding Editor-In-Chief of LNCS Transactions on Data Hiding and Multimedia Security (Springer), an editorial board member of two international journals, the chair of Technical Program Committee of IEEE International Conference on Multimedia and Expo 2007 (ICME07), the co-chair of Technical Program Committee of International Workshop on Digital Watermarking 2007 (IWDW07), and a fellow of IEEE.

In this talk, firstly, the concept and application of digital forensics is introduced. It is shown that information assurance has become an urgent and critical issue faced by the digital world. Although still in its infancy stage, digital forensics has started to attract increasing attention from the multimedia-security research community. Secondly, the blind and passive image tampering detection is addressed. The state-of-the-art technologies are presented. The existing problems and future research subjects are discussed. Thirdly, the issue of detection of JPEG compression history for bmp images is addressed. It is shown that the generalized Benford law, also known as the first digit law, can play an important role in this forensics task. Finally, other present works and some future research issues in digital forensics are briefly discussed.