Sorry, you need to enable JavaScript to visit this website.

The terminology "multimedia security" gained a new popularity in the mid-90s with the rapid rise of digital watermarking in an attempt to combat piracy of copyrighted content. This milestone incarnates the mutation of content protection techniques from conventional cryptography to signal processing techniques. Today, multimedia security encompasses a much wider range of techniques such as multimedia encryption, content fingerprinting, anti-camcording, passive forensic analysis.


Low-cost physically unclonable functions (PUFs) can be deployed with consumer products to deter counterfeiting. An intrinsic physical property - unique textures of paper or other surface - has received strong interest. Extrinsically introduced features, such as randomly positioned bubbles and fiber segments, have also been deployed in the industry to facilitate authentication. This paper carries out a study to gain a better understanding in the factors affecting the authentication performance, with a consideration of the friendliness under mobile imaging.


Cryptography and traitor-tracing watermarking are routinely used today to combat piracy of entertainment content. In this talk, we will explore how passive multimedia forensic analysis, recently proposed for content authentication, could be incorporated in the anti-piracy arsenal. After reviewing the piracy ecosystem, the talk will detail forensic techniques (i) to detect the type of piracy, (ii) to compensate for the effects of the piracy path e.g. prior to traitor tracing watermark detection, and (iii) to infer intrinsic parameters of the devices used to produce pirate samples.


This talk will be organized in three main parts. To begin with, I will review the ecosystem of the Entertainment industry, survey the different tools available to combat piracy and introduce the multimedia forensics workflow typically in use today. Next, I will focus on digital watermarking, a technology used to introduce imperceptible machine-readable markers in multimedia content. After briefly going through fundamentals, I will describe in more details the 2-step watermarking strategy adopted by Technicolor and discuss its pros and cons e.g.


This is an overview poster on recent research of using power frequency signatures to determine/verify the time, location and integrity of audio-visual recordings and other sensing data.

For more info, please check out our recent publications: