CURRICULUM VITAE TOMÁŠ FILLER.

Similar documents
CURRICULUM VITAE TOMÁŠ FILLER.

EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

PROFESSIONAL RESEARCH EXPERIENCE

Application of Histogram Examination for Image Steganography

Camera identification from sensor fingerprints: why noise matters

Break Our Steganographic System : The Ins and Outs of Organizing BOSS


STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Tomáš Denemark, Student Member, IEEE, and Jessica Fridrich, Fellow, IEEE

Steganalysis in resized images

Locating Steganographic Payload via WS Residuals

An Implementation of LSB Steganography Using DWT Technique

Improved Detection of LSB Steganography in Grayscale Images

Hiding Image in Image by Five Modulus Method for Image Steganography

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Fragile Sensor Fingerprint Camera Identification

Igor Trajkovski, M.Sc. Dom podiplomcev Ljubljana, N o 323 Gosarjeva 9, 1000 Ljubljana, Slovenia

Mohammad Jaber Borran

A New Steganographic Method for Palette-Based Images

Timothy H. Chung EDUCATION RESEARCH

Retrieval of Large Scale Images and Camera Identification via Random Projections

Resampling and the Detection of LSB Matching in Colour Bitmaps

An SVD Approach for Data Compression in Emitter Location Systems

Steganography is the art of secret communication.

Changjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing.

Dr. Joshua Evan Auerbach, B.Sc., Ph.D.

Natural Steganography in JPEG Compressed Images

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Dr. Shan Du. Curriculum Vitae, Shan Du EDUCATION

MICROCHIP PATTERN RECOGNITION BASED ON OPTICAL CORRELATOR

C URRICULUM V I T A E

Address: 9110 Judicial Dr., Apt. 8308, San Diego, CA Phone: (240) URL:

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis

QEETHARA KADHIM AL-SHAYEA P.O.BOX 130 AMMAN 11733, JORDAN Cell (079)

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Feature Reduction and Payload Location with WAM Steganalysis

- Bachelor of Science, Electrical and Electronics Engineering (Sep Jun. 2009) Bilkent University, Ankara, Turkey

Shahin Shahrampour CONTACT INFORMATION

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Source Camera Model Identification Using Features from contaminated Sensor Noise

Introduction to Video Forgery Detection: Part I

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

Research Interests. Education

Research Interests. Education

Dynamic Collage Steganography on Images

arxiv: v1 [cs.mm] 16 Nov 2015

University of Technology. Control and Systems Eng. Dept. Curriculum Vitae (C.V.)

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

Digital Watermarking Using Homogeneity in Image

4-206 CST Voice: (315) (o), (315) (m) Department of EECS Fax: (315)

Content Based Image Retrieval Using Color Histogram

Asma Al-Tamimi. Experience Hashimite university Zarqa, Jordan Department Chair, Mechatronic Engineering Department

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

Malaviya National Institute of Technology Jaipur

1218 St. Matthew Way Los Altos, CA kipnisal

ZHAOXIAN ZHOU. Curriculum Vitae. Updated: May 28, 2007

Calculation and Comparison of Turbulence Attenuation by Different Methods

Camera identification by grouping images from database, based on shared noise patterns

Convolutional Neural Network-based Steganalysis on Spatial Domain

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Haodong Yang, Ph.D. Candidate

HACETTEPE ÜNİVERSİTESİ COMPUTER ENGINEERING DEPARTMENT BACHELOR S DEGREE INFORMATION OF DEGREE PROGRAM 2012

Dr. Mohammed Bani Younis

Tesca Fitzgerald. Graduate Research Assistant Aug

Curriculum Vitae. Education. Distinctions. Personal info

Exposing Image Forgery with Blind Noise Estimation

AN AUDIO SEPARATION SYSTEM BASED ON THE NEURAL ICA METHOD

Lecture Notes in Computer Science 6958

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

ZHIHUI ZHU. Johns Hopkins University Phone: (720) N Charles St., Baltimore MD 21218, USA Web: mines.edu/ zzhu

I was born in April 8, 1988, in Arzignano, Italy. Now I live in Geneva, Switzerland.

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

COMPUTER SCIENCE AND ENGINEERING

Revisiting Weighted Stego-Image Steganalysis

Sven Schmitz. Assistant Professor

Mohammad A. Gharaibeh Curriculum Vitae October 2018

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

DSM-Based Methods to Represent Specialization Relationships in a Concept Framework

Holographic Augmented Reality: Towards Near-to-Eye Electroholography

Laser Printer Source Forensics for Arbitrary Chinese Characters

Shervin Rahimzadeh Arashloo

Resume of Yuanxin Wu

Curriculum Vitae. Min Wang

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

2.6.1: Program Outcomes

SRII SRII Management Team

University of Massachusetts Amherst Department of Civil and Environmental Engineering. Newton, MA Transportation Engineer Nov Aug 2007

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

Rm 211, Department of Mathematics & Statistics Phone: (806) Texas Tech University, Lubbock, TX Fax: (806)

Abhishek Gupta CONTACT INFORMATION. 360 Coordinated Science Laboratory

Steganalysis of Overlapping Images

Curriculum Vitae. Saeed Karimimehr

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Scale estimation in two-band filter attacks on QIM watermarks

Image Forgery Detection Using Svm Classifier

Image Forgery Identification Using JPEG Intrinsic Fingerprints

Transcription:

CURRICULUM VITAE TOMÁŠ FILLER CONTACT INFORMATION DIGIMARC 9405 SW Gemini Drive Beaverton OR 97008 USA E-mail: tomas.filler@digimarc.com WWW: http://www.digimarc.com Phone: +1-503-469-4705 RESEARCH INTERESTS Information assurance steganography, steganalysis in digital images, information theory, watermarking, coding theory. EDUCATION April 2011 May 2007 Ph.D. in Electrical and Computer Engineering Dep. of Electrical and Computer Engineering, State University of New York at Binghamton Specialization in Information Assurance. Thesis: Imperfect Stegosystems - Asymptotic Laws and Near-optimal Practical Constructions Advisor: Prof. Jessica Fridrich Dipl.-Ing. (equivalent to M.Sc.) in Computer Science School of Nuclear Science and Physical Engineering, Czech Technical University Honors: Award by Czech Technical University for Academic Excellence Best Master Thesis in Computer Science (Czech Republic) Thesis: Minimizing Embedding Impact in Steganography using Low Density Codes Advisor: Prof. Jessica Fridrich AWARDS, and SCHOLARSHIPS April 2011 January 2011 March 2010 January 2010 April 2009 Outstanding PhD Researcher 2010 2011, Binghamton University Best Paper Award (1st price) for paper Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization coauthored with J. Fridrich and J. Judas. Award given by Digital Watermarking Alliance. Graduate Student Award for Excellence in Research, Binghamton University. Best Paper Award (1st price) for paper The Square Root Law of Steganographic Capacity for Markov Covers coauthored with J. Fridrich and A. D. Ker. Award given by Digital Watermarking Alliance. Outstanding PhD Researcher 2008 2009, Binghamton University Sept 2007 Winner of the Best Master Thesis in Computer Science in Czech Republic Awarded of $5000 given by private IT company Profinit (www.profinit.eu). May 2007 Award for Academic Excellence by Czech Technical University 2005 2006 Merit scholarship for academic excellence from Czech Technical University 2002 2004 Merit scholarship for academic excellence from Czech Technical University

EXPERIENCE Research experience 2011 - present Research Engineer at Digimarc 2007-2011 Research Assistant at SUNY Binghamton Interest in steganography and digital forensics. Steganography Designed and implemented a framework for constructing new steganographic schemes by minimizing arbitrary distortion function. Described connection between data embedding in steganography and statistical physics which lead to new algorithms for data hiding. Practical part of the framework is based on new syndrome codes called Syndrome-Trellis Codes which present very flexible and close-to-capacity solution for data hiding. All current embedding methods and many new ones can benefit from this framework. Published in 2 journal and 3 conference papers. Pioneered the concept of capacity of imperfect stegosystems. Used Markov Chains to model cover objects and show that the secure capacity scales as the square root of the number of cover elements (secure capacity is not linear) if the embedding is probabilistic mapping applied independently. Gave the first formal proof (spanning 30 pages) of this phenomenon which was called the Square Root Law. This analysis resulted in several other papers and reports including the description of all perfectly secure cover distributions based on ergodic classes of the embedding operation. This work has been awarded by the Best Paper Award given by Digital Watermarking Alliance. Proposed to measure secure capacity based on Fisher information rather than based on KL divergence. Coined a new term for this the root-rate. This presents the correct way of measuring secure capacity, i. e. with respect to square root of the number of elements. Based on the Markov model of images, I showed that ±1 embedding is asymptotically the best method for spatial domain steganography. Digital Forensics Created a methodology for classifying the camera model based on its fingerprint estimate. Machine learning approach based on SVM and proposed feature set was used to distinguish camera models without knowing the EXIF header. Obtained 1TB image database from Flickr.com by using Python scripts and MySQL database. Processing were done on Linux cluster by using Matlab and Python scripts. Further improved this database for large scale testing of camera identification. June September 2010 Research Internship at Digimarc Corp. I worked on various topics in digital watermarking for print-and-scan (PS) environment. My main focus was on comparing side-informed techniques such as QIM, Dirty Paper codes and new modifications of Rational Dither Modulation with classical spread-spectrum approach for digital watermarking in PS environment. I was also involved in research and development of watermarking methods for mobile applications. 2006-2007 Visiting Research Scholar at SUNY Binghamton Proposed to use Low Density Generator Matrix codes for minimizing embedding impact in steganography. Such codes leaded to near-optimal practical embedding schemes with Survey Propagation based binary quantizer. Developed new algorithm for LDGM based binary quantization based on pure Belief Propagation. This algorithm was shown to have the same performance but much faster implementation than the approach based on Survey Propagation. These codes are used to

obtain practical schemes for minimizing embedding impact in steganography able to achieve the best embedding efficiency to date (April 2009). Teaching assistant (Czech Technical University) Sep 2005 Dec 2005 Sep 2005 Dec 2005 Jan 2005 Jun 2005 Software Developer Jun 2000 Dec 2005 Calculus B2 Introduction to programming, Prof. Miroslav Virius Algorithm design, Prof. Miroslav Virius Software developer and analyst, Baud, Prague, Czech Republic (www.baud.cz) Developed and designed several custom business solutions for major Czech banks and organizations. Main goal was to integrate company data flows by using MS Exchange and MS SQL servers along with MS Office. Lead small teams of programmers or worked independently for the customer. Worked as Visual Basic consultant for OMV (www.omv.cz). Sep 2005 Jun 2006 team leader - Software project at Czech Technical University Lead team of 4 students to developed application for study of airplane models when exposed to wind. Application is used as a teaching aid by university students to study the airplane design. Whole project written in C++ consisted of numerical simulations (Lapack), user interface (Fox Toolkit) and results presentation (OpenGL). SPECIAL TECHNICAL SKILLS Programming languages C++ (6 years experience) Experience with application development under Windows (MFC) or Linux (Fox toolkit, GTK), numerical libraries (Lapack, Intel s MKL and IPP) and optimization using SSE..NET (C#) (4 years experience) Developed several web sites (ASP.NET 2.0) and client applications. Presented a talk on disassembling.net applications with.net Reflector at Czech Technical Python University. (3 years experience) Used as scripting language for Linux cluster, numerical computing (SciPy) and image retrieval. Used for obtaining 1TB image database of images from Flickr.com for research purposes. Assembler (4 years experience) Used at high school for 2 years and used to develop simple operating system for educational purposes for I386 architecture. Later used with C++ to optimize numerical algorithms needed for my research. Matlab Latex Operating systems (5 years experience) Used for running scientific simulations. Combined with C++ code (MEX files) for more intensive algorithms. Used as programming language for all university courses. (6 years experience) Consultant for book Steganography in Digital Media: Principles, Algorithms, and Applications to be published by Cambridge University Press. Used for typesetting all research papers, presentations (Beamer) and figures (PGF). Linux (advanced level) I am using several variants of Linux OS for my research. Windows (advanced level) I have been developing windows application for 5 years. Languages: Czech (native), English (fluent, GRE), German (passive).

PUBLICATIONS Journal and fully refereed papers 1. P. Bas, T. Filler and T. Pevny, "Break Our Steganographic System" - the ins and outs of organizing BOSS, 13th Information Hiding, Prague, Czech Republic, May 18-20, 2011. 2. T. Filler, J. Judas and J. Fridrich, Minimizing Additive Distortion in Steganography using Syndrome- Trellis Codes, IEEE Transactions on Information Forensics and Security, 2011. 3. T. Pevny, T. Filler and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, 12th Information Hiding, Calgary, Alberta, Canada, June 28-30, 2010. 4. T. Filler and J. Fridrich, Gibbs Construction in Steganography, IEEE Transactions on Information Forensics and Security, 2010. 5. T. Filler and J. Fridrich, Fisher Information Determines Capacity of -secure Steganography, 11 th Information Hiding Workshop, Darmstadt, Germany, June 7 10, LNCS, Springer-Verlag, 2009. Conference papers 6. T. Filler, and J. Fridrich, Design of Adaptive Steganographic Schemes for Digital Images, SPIE, Electronic Imaging, Media Forensics and Security XIII, San Jose, CA, January, 2011. 7. T. Filler and J. Fridrich, Minimizing Additive Distortion Functions With Non-Binary Embedding Operation in Steganography, 2nd IEEE Workshop on Information Forensics and Security, December 2010. 8. T. Filler and J. Fridrich, Steganography Using Gibbs Random Fields, 12th ACM Workshop on Multimedia and Security, Rome, Italy. September 9-10 2010. 9. T. Filler, J. Judas and J. Fridrich, Minimizing Embedding Impact in Steganography using Trellis- Coded Quantization, SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17 21, 2010. 10. M. Goljan, J. Fridrich and T. Filler, Managing a Large Database of Camera Fingerprints, accepted SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17 21, 2010. 11. T. Filler and J. Fridrich, Wet ZZW Construction for Steganography, First IEEE International Workshop on Information Forensics and Security, December 6-9, 2009, London, UK. 12. T. Filler and J. Fridrich, The Square Root Law of Steganographic Capacity, IEEE Summer School of Information Theory, Evanston, IL, August 10-13, 2009. 13. T. Filler and J. Fridrich, Complete Characterization of Perfectly Secure Stego-systems with Mutually Independent Embedding Operation, accepted to IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, April 19-24, 2009. 14. M. Goljan, T. Filler, and J. Fridrich, Camera Identification Large Scale Test, Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA, January 18 22, pp. 0I 1 0I 12, 2009. 15. T. Filler, J. Fridrich, and A. D. Ker, The Square Root Law of Steganographic Capacity for Markov Covers, Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA, January 18 22, pp. 08 1 08 11, 2009. 16. T. Filler and J. Fridrich, Using Sensor Pattern Noise for Camera Model Identification, Proc. ICIP 08, San Diego, California, October 12 15, 2008. 17. T. Filler and J. Fridrich, Binary Quantization using Belief Propagation with Decimation over Factor Graphs of LDGM Codes, Proc. 45th Allerton Conference on Coding, Communication, and Control, September 26 28, 2007. 18. J. Fridrich and T. Filler, Practical methods for Minimizing Embedding Impact in Steganography, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28 February 2, pp. 02 03, 2007. Thesis T. Filler, Imperfect Stegosystems: Asymtotic Laws and Optimal Near-Optimal Constructions, Dissertation, SUNY Binghamton, April 2011.

T. Filler, Minimizing Embedding Impact in Steganography using Low Density Codes, Master Thesis, Czech Technical University in Prague, June 2007. Further information about my list of publications is available at http://dde.binghamton.edu/filler/publications.php. PROFESSIONAL ACTIVITIES AND MEMBERSHIPS Program chair and co-organizor of 13 th Information Hiding in Prague 2011 (www.ihconference.org). Reviewer for IEEE Transactions on Information Forensic and Security IEEE Transactions on Image Processing IEEE Transactions on Circuits and Systems for Video Technology IEEE Journal on Selected Areas in Communications IEEE Signal Processing Letters IEEE Communications Letters Journal of Electronic Imaging ETRI Journal (http://etrij.etri.re.kr) IET Information Security Journal I am a member of IEEE. Organizer of the public steganographic contest BOSS Break Our Stegosystem (www.agents.cz/boss). TEACHING EXPERIENCE I developed and taught a graduate-level course ECE 580B Modern Coding Theory. I supervised one master student in the field of coding theory and steganography. During my master studies I lead several labs (similar to teaching assistant) for groups of first and second year students in programming, algorithm design and calculus. REFERENCES Prof. Jessica Fridrich SUNY Binghamton Department of Electrical and Computer Engineering T. J. Watson School of Applied Science and Engineering Binghamton, NY 13902-6000 E-mail: fridrich@binghamton.edu Phone: +1-607-777-6177 Fax: +1-607-777-4464 http://www.ws.binghamton.edu/fridrich Dr. Andrew Ker Royal Society University Research Fellow Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD, UK E-mail: adk@comlab.ox.ac.uk http://www.comlab.ox.ac.uk/people/andrew.ker/

Dr. Scott Craver SUNY Binghamton Department of Electrical and Computer Engineering T. J. Watson School of Applied Science and Engineering Binghamton, NY 13902-6000 E-mail: scraver@binghamton.edu Phone: +1-607-777-1889 Prof. Edita Pelantová Czech Technical University Department of Mathematics School of Nuclear Science and Physical Engineering Trojanova 13, 120 00 Praha 2, Czech Republic E-mail: pelantova@km1.fjfi.cvut.cz Phone: +420224358544 Fax: +420224918643 Last update: 7/18/2012