Seminar Title Possible Subtitle Author 1 Author 2... Author N.

Slides:



Advertisements
Similar presentations
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Advertisements

Company Presentation. Slide subtitle Heading Conclusion Title […] ‒ […] ― […] 2.
Presentation Title Subtitle Author TM Capitol College 2003 PKI Enabled Smart Card Value Chain Presented by: Jose R. Paloschavez.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Median Filtering Detection Using Edge Based Prediction Matrix The 10th IWDW, Atlantic City, New Jersey, USA 23~26 October 2011 School of Information Science.
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
Mesh Watermarking based on 2D Transferred Domain Jongyun Jun Tae-Joon Kim CS548 Term Project Presentation 2010/05/13.
Mel-Cepstrum Based Steganalysis for VoIP-Steganography Christian Kraetzer and Jana Dittmann Electronic Imaging International Society for Optics and.
Crime Scene Investigation Forensic Science. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
1 Professional Communications Introduction to Slide Presentations Copyright © Texas Education Agency, All rights reserved. Images and other multimedia.
Title Authors Introduction Text, text, text, text, text, text Background Information Text, text, text, text, text, text Observations Text, text, text,
Digital Image Forensics CS 365 By:- - Abhijit Sarang - Pankaj Jindal.
Title EECS Capstone Project Presentation Authors.
Sample Title Panel (2 line option) Sample Subtitle Panel (Multiple line option)
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Test Title Test Content.
Contents 1 Introduction 2 Strategy 3 Challenges Forward 4 Conclusion.
YOUR TITLE Your Name (Dr. Your Sponsor, Sponsor)
Presentation Title Here
Title of the presentation
Title can be added here by Prof. Somchai Doe
Example 13 Wendy Balmer Indiana U
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
PowerPoint Template.
إعداد د/زينب عبد الحافظ أستاذ مساعد بقسم الاقتصاد المنزلي
PowerPoint Template
PowerPoint Template.
PowerPoint Template.
PowerPoint Template
First Name SURNAME, First Name SURNAME
مناهــــج البحث العلمي
PowerPoint Template.
Poster Presentations – Paper number ID 000
Title EECS Mid-Semester Presentation
Author, Company and/or Logo Information
[Author’s Name and Affiliation]
Author, Company and/or Logo Information
Title of the presentation
Logos of the authors’ institutions
PowerPoint Template
Presentation Title.
Title title title title title title title title title title title title title title title title title title title title title title title Author Supervisor(s)
Affiliations – Calibri, 18 pt
Author, Company and/or Logo Information
Paper Presentation - Ultra Portable Devices
Presenter’s Name (if case)
Research Article Title
Digital Watermarking for Image Authentication with Localization

Title Introduction: Discussion & Conclusion: Methods & Results:
Type your title here Type author Names here *Affiliation 1
TITLE OF THE PRESENTATION
Author, Author, Author, Author and Author Institute Name
Poster Presentations – Paper number ID 000
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Title of The Study Authors & Affiliations
Author, Author, and Author Address(es)
A. Author1, B. Author2 and C. Author3
PRESENTER GOES HERE SERVICE LINE GOES HERE (BOTH IN ALL CAPS)
PowerPoint Template.
PowerPoint Template.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
TİTLE SUBTİTLE.
Presentation transcript:

Seminar Title Possible Subtitle Author 1 Author 2... Author N

Lab Seminar Series MO447 - Digital Forensics Prof. Dr. Anderson Rocha

Outline

2014 Seminar Series – Digital Forensics (MO447/MC919) 4 Outline ‣ Contents

Introduction

2014 Seminar Series – Digital Forensics (MO447/MC919) 6 Slide title ‣ Content

2014 Seminar Series – Digital Forensics (MO447/MC919) 7 Slide title ‣ Image example with mandatory Copyright © Someone (

2014 Seminar Series – Digital Forensics (MO447/MC919) 8 How to cite (example ‣ Post-Processing Analysis [Gloe et al. 2007b] ‣ Mosaic/Demosaic Artifacts [Gou et al. 2007; Someone and Someone 2010]

(...)

2014 Seminar Series – Digital Forensics (MO447/MC919) 10 Slide Title ‣ Content

Conclusions

2014 Seminar Series – Digital Forensics (MO447/MC919) 12 Slide Title ‣ Content

References

2014 Seminar Series – Digital Forensics (MO447/MC919) 14 References 1. [Gou et al. 2007] Gou, H., Swaminathan, A. e Wu, M. (2007). Robust scanner identification based on noises features. In SPIE Security, Steganography, and Watermarking of Multimedia Contents (SSWMC), San Jose, USA. 2. [Someone & Someone 2010] Someone, S. and Someone, S (2010). A title for this paper (AJOURNAL), V(N):PP01-PPN 3. [Gloe et al. 2007b] Gloe, T., Kirchner, M., Winkler, A. e Bohme, R. (2007b). Can we trust digital image forensics?

Thank You! Obrigado!