CURRICULUM VITAE TOMÁŠ FILLER.

Similar documents
CURRICULUM VITAE TOMÁŠ FILLER.

EFFECT OF SATURATED PIXELS ON SECURITY OF STEGANOGRAPHIC SCHEMES FOR DIGITAL IMAGES. Vahid Sedighi and Jessica Fridrich

PROFESSIONAL RESEARCH EXPERIENCE

Application of Histogram Examination for Image Steganography

Camera identification from sensor fingerprints: why noise matters

Break Our Steganographic System : The Ins and Outs of Organizing BOSS


STEGANOGRAPHY WITH TWO JPEGS OF THE SAME SCENE. Tomáš Denemark, Student Member, IEEE, and Jessica Fridrich, Fellow, IEEE

Steganalysis in resized images

Locating Steganographic Payload via WS Residuals

An Implementation of LSB Steganography Using DWT Technique

Improved Detection of LSB Steganography in Grayscale Images

Timothy H. Chung EDUCATION RESEARCH

IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION

Hiding Image in Image by Five Modulus Method for Image Steganography

2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge

Fragile Sensor Fingerprint Camera Identification

Mohammad Jaber Borran

A New Steganographic Method for Palette-Based Images

Igor Trajkovski, M.Sc. Dom podiplomcev Ljubljana, N o 323 Gosarjeva 9, 1000 Ljubljana, Slovenia

Changjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing.

Retrieval of Large Scale Images and Camera Identification via Random Projections

Resampling and the Detection of LSB Matching in Colour Bitmaps

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Steganography is the art of secret communication.

An SVD Approach for Data Compression in Emitter Location Systems

Dr. Joshua Evan Auerbach, B.Sc., Ph.D.

Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis

Dr. Shan Du. Curriculum Vitae, Shan Du EDUCATION

Natural Steganography in JPEG Compressed Images

MICROCHIP PATTERN RECOGNITION BASED ON OPTICAL CORRELATOR

C URRICULUM V I T A E

Address: 9110 Judicial Dr., Apt. 8308, San Diego, CA Phone: (240) URL:

arxiv: v1 [cs.mm] 16 Nov 2015

- Bachelor of Science, Electrical and Electronics Engineering (Sep Jun. 2009) Bilkent University, Ankara, Turkey

QEETHARA KADHIM AL-SHAYEA P.O.BOX 130 AMMAN 11733, JORDAN Cell (079)

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Convolutional Neural Network-based Steganalysis on Spatial Domain

Dynamic Collage Steganography on Images

Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Content Based Image Retrieval Using Color Histogram

Feature Reduction and Payload Location with WAM Steganalysis

Malaviya National Institute of Technology Jaipur

Shahin Shahrampour CONTACT INFORMATION

Source Camera Model Identification Using Features from contaminated Sensor Noise

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Introduction to Video Forgery Detection: Part I

Stochastic Approach to Secret Message Length Estimation in ±k Embedding Steganography

Shervin Rahimzadeh Arashloo

Research Interests. Education

Research Interests. Education

HACETTEPE ÜNİVERSİTESİ COMPUTER ENGINEERING DEPARTMENT BACHELOR S DEGREE INFORMATION OF DEGREE PROGRAM 2012

University of Technology. Control and Systems Eng. Dept. Curriculum Vitae (C.V.)

A Novel Multi-size Block Benford s Law Scheme for Printer Identification

Digital Watermarking Using Homogeneity in Image

4-206 CST Voice: (315) (o), (315) (m) Department of EECS Fax: (315)

Dr. Mohammed Bani Younis

Asma Al-Tamimi. Experience Hashimite university Zarqa, Jordan Department Chair, Mechatronic Engineering Department

Detecting Resized Double JPEG Compressed Images Using Support Vector Machine

1218 St. Matthew Way Los Altos, CA kipnisal

COMPUTER SCIENCE AND ENGINEERING

ZHAOXIAN ZHOU. Curriculum Vitae. Updated: May 28, 2007

2.6.1: Program Outcomes

Calculation and Comparison of Turbulence Attenuation by Different Methods

Holographic Augmented Reality: Towards Near-to-Eye Electroholography

Camera identification by grouping images from database, based on shared noise patterns

Resume of Yuanxin Wu

Haodong Yang, Ph.D. Candidate

Tesca Fitzgerald. Graduate Research Assistant Aug

Curriculum Vitae. Education. Distinctions. Personal info

Exposing Image Forgery with Blind Noise Estimation

PRIOR IMAGE JPEG-COMPRESSION DETECTION

AN AUDIO SEPARATION SYSTEM BASED ON THE NEURAL ICA METHOD

SRII SRII Management Team

Camera Model Identification Framework Using An Ensemble of Demosaicing Features

I was born in April 8, 1988, in Arzignano, Italy. Now I live in Geneva, Switzerland.

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

ZHIHUI ZHU. Johns Hopkins University Phone: (720) N Charles St., Baltimore MD 21218, USA Web: mines.edu/ zzhu

Rm 211, Department of Mathematics & Statistics Phone: (806) Texas Tech University, Lubbock, TX Fax: (806)

Revisiting Weighted Stego-Image Steganalysis

Sven Schmitz. Assistant Professor

Multimedia Forensics

COMPUTER. 1. PURPOSE OF THE COURSE Refer to each sub-course.

Mohammad A. Gharaibeh Curriculum Vitae October 2018

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

DSM-Based Methods to Represent Specialization Relationships in a Concept Framework

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Oswaldo Aguirre Ortega Computational Science Program The University of Texas at El Paso (UTEP) El Paso, TX

Raviv Murciano-Goroff

Laser Printer Source Forensics for Arbitrary Chinese Characters

Curriculum Vitae. Min Wang

IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION

SIMULATION-BASED MODEL CONTROL USING STATIC HAND GESTURES IN MATLAB

This list supersedes the one published in the November 2002 issue of CR.

University of Massachusetts Amherst Department of Civil and Environmental Engineering. Newton, MA Transportation Engineer Nov Aug 2007

COLOR IMAGE STEGANANALYSIS USING CORRELATIONS BETWEEN RGB CHANNELS. 1 Nîmes University, Place Gabriel Péri, F Nîmes Cedex 1, France.

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Changyin Zhou. Ph.D, Computer Science, Columbia University Oct 2012

Transcription:

CURRICULUM VITAE TOMÁŠ FILLER CONTACT INFORMATION DIGIMARC 9405 SW Gemini Drive Beaverton OR 97008 USA E-mail: tomas.filler@gmail.com WWW: http://dde.binghamton.edu/filler/ Phone: +1-607-232-9597 RESEARCH INTERESTS Information assurance steganography, steganalysis in digital images, information theory, watermarking, coding theory. EDUCATION present May 2007 Ph.D. in Electrical and Computer Engineering Dep. of Electrical and Computer Engineering, State University of New York at Binghamton Specialization in Information Assurance. Expected graduation: May 2011 Advisor: Jessica Fridrich Dipl.-Ing. (equivalent to M.Sc.) in Computer Science School of Nuclear Science and Physical Engineering, Czech Technical University Honors: Award by Czech Technical University for Academic Excellence Best Master Thesis in Computer Science (Czech Republic) Thesis: Minimizing Embedding Impact in Steganography using Low Density Codes Advisor: Jessica Fridrich AWARDS, and SCHOLARSHIPS April 2011 January 2011 March 2010 January 2010 April 2009 Outstanding PhD Researcher 2010 2011, Binghamton University Best Paper Award (1st price) for paper Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization coauthored with J. Fridrich and J. Judas. Award given by Digital Watermarking Alliance. Graduate Student Award for Excellence in Research, Binghamton University. Best Paper Award (1st price) for paper The Square Root Law of Steganographic Capacity for Markov Covers coauthored with J. Fridrich and A. D. Ker. Award given by Digital Watermarking Alliance. Outstanding PhD Researcher 2008 2009, Binghamton University Sept 2007 Winner of the Best Master Thesis in Computer Science in Czech Republic Awarded of $5000 given by private IT company Profinit (www.profinit.eu). May 2007 Award for Academic Excellence by Czech Technical University 2005 2006 Merit scholarship for academic excellence from Czech Technical University 2002 2004 Merit scholarship for academic excellence from Czech Technical University

EXPERIENCE Research experience 2011 - present Research Engineer at Digimarc 2007-2011 Research Assistant at SUNY Binghamton Interest in steganography and digital forensics. Steganography Designed and implemented a framework for constructing new steganographic schemes by minimizing arbitrary distortion function. Described connection between data embedding in steganography and statistical physics which lead to new algorithms for data hiding. Practical part of the framework is based on new syndrome codes called Syndrome-Trellis Codes which present very flexible and close-to-capacity solution for data hiding. All current embedding methods and many new ones can benefit from this framework. Published in 2 journal and 3 conference papers. Pioneered the concept of capacity of imperfect stegosystems. Used Markov Chains to model cover objects and show that the secure capacity scales as the square root of the number of cover elements (secure capacity is not linear) if the embedding is probabilistic mapping applied independently. Gave the first formal proof (spanning 30 pages) of this phenomenon which was called the Square Root Law. This analysis resulted in several other papers and reports including the description of all perfectly secure cover distributions based on ergodic classes of the embedding operation. This work has been awarded by the Best Paper Award given by Digital Watermarking Alliance. Proposed to measure secure capacity based on Fisher information rather than based on KL divergence. Coined a new term for this the root-rate. This presents the correct way of measuring secure capacity, i. e. with respect to square root of the number of elements. Based on the Markov model of images, I showed that ±1 embedding is asymptotically the best method for spatial domain steganography. Digital Forensics Created a methodology for classifying the camera model based on its fingerprint estimate. Machine learning approach based on SVM and proposed feature set was used to distinguish camera models without knowing the EXIF header. Obtained 1TB image database from Flickr.com by using Python scripts and MySQL database. Processing were done on Linux cluster by using Matlab and Python scripts. Further improved this database for large scale testing of camera identification. June September 2010 Research Internship at Digimarc Corp. I worked on various topics in digital watermarking for print-and-scan (PS) environment. My main focus was on comparing side-informed techniques such as QIM, Dirty Paper codes and new modifications of Rational Dither Modulation with classical spread-spectrum approach for digital watermarking in PS environment. I was also involved in research and development of watermarking methods for mobile applications. 2006-2007 Visiting Research Scholar at SUNY Binghamton Proposed to use Low Density Generator Matrix codes for minimizing embedding impact in steganography. Such codes leaded to near-optimal practical embedding schemes with Survey Propagation based binary quantizer. Developed new algorithm for LDGM based binary quantization based on pure Belief Propagation. This algorithm was shown to have the same performance but much faster implementation than the approach based on Survey Propagation. These codes are used to

obtain practical schemes for minimizing embedding impact in steganography able to achieve the best embedding efficiency to date (April 2009). Teaching assistant (Czech Technical University) Sep 2005 Dec 2005 Sep 2005 Dec 2005 Jan 2005 Jun 2005 Programmer Jun 2000 Dec 2005 Calculus B2 Introduction to programming, Prof. Miroslav Virius Algorithm design, Prof. Miroslav Virius Software developer and analyst, Baud, Prague, Czech Republic (www.baud.cz) Developed and designed several custom business solutions for major Czech banks and organizations. Main goal was to integrate company data flows by using MS Exchange and MS SQL servers along with MS Office. Lead small teams of programmers or worked independently for the customer. Worked as Visual Basic consultant for OMV (www.omv.cz). Sep 2005 Jun 2006 team leader - Software project at Czech Technical University Lead team of 4 students to developed application for study of airplane models when exposed to wind. Application is used as a teaching aid by university students to study the airplane design. Whole project written in C++ consisted of numerical simulations (Lapack), user interface (Fox Toolkit) and results presentation (OpenGL). SPECIAL TECHNICAL SKILLS Programming languages C++ (6 years experience) Experience with application development under Windows (MFC) or Linux (Fox toolkit, GTK), numerical libraries (Lapack, Intel s MKL and IPP) and optimization using SSE..NET (C#) (4 years experience) Developed several web sites (ASP.NET 2.0) and client applications. Presented a talk on disassembling.net applications with.net Reflector at Czech Technical Python University. (3 years experience) Used as scripting language for Linux cluster, numerical computing (SciPy) and image retrieval. Used for obtaining 1TB image database of images from Flickr.com for research purposes. Assembler (4 years experience) Used at high school for 2 years and used to develop simple operating system for educational purposes for I386 architecture. Later used with C++ to optimize numerical algorithms needed for my research. Matlab Latex (5 years experience) Used for running scientific simulations. Combined with C++ code (MEX files) for more intensive algorithms. Used as programming language for all university courses. (6 years experience) Consultant for book Steganography in Digital Media: Principles, Algorithms, and Applications to be published by Cambridge University Press. Used for typesetting all research papers, presentations (Beamer) and figures (PGF). I am interested in using graphic cards for general purpose computing (GPGPU) and wrote tutorial (in Czech) for students at Czech Technical University. I used Cg and GLSL languages to program NVIDIA GPUs to speed up some computational intensive tasks. Operating systems Linux (advanced level) I am using several variants of Linux OS for my research. Windows (advanced level) I have been developing windows application for 5 years. Languages: Czech (native), English (fluent, GRE), German (passive).

PUBLICATIONS Journal and fully refereed papers 1. T. Filler and J. Fridrich, Fisher Information Determines Capacity of -secure Steganography, 11 th Information Hiding Workshop, Darmstadt, Germany, June 7 10, LNCS, Springer-Verlag, 2009. 2. T. Pevny, T. Filler and P. Bas, Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, 12th Information Hiding, Calgary, Alberta, Canada, June 28-30, 2010. 3. T. Filler and J. Fridrich, Gibbs Construction in Steganography, IEEE Transactions on Information Forensics and Security, December 2010. 4. T. Filler, J. Judas and J. Fridrich, Minimizing Additive Distortion in Steganography using Syndrome- Trellis Codes, accepted to IEEE Transactions on Information Forensics and Security. Conference papers 5. T. Filler, and J. Fridrich, Design of Adaptive Steganographic Schemes for Digital Images, SPIE, Electronic Imaging, Media Forensics and Security XIII, San Jose, CA, January, 2011. 6. T. Filler and J. Fridrich, Minimizing Additive Distortion Functions With Non-Binary Embedding Operation in Steganography, 2nd IEEE Workshop on Information Forensics and Security, December 2010. 7. T. Filler and J. Fridrich, Steganography Using Gibbs Random Fields, 12th ACM Workshop on Multimedia and Security, Rome, Italy. September 9-10 2010. 8. T. Filler, J. Judas and J. Fridrich, Minimizing Embedding Impact in Steganography using Trellis- Coded Quantization, SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17 21, 2010. 9. M. Goljan, J. Fridrich and T. Filler, Managing a Large Database of Camera Fingerprints, accepted SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, January 17 21, 2010. 10. T. Filler and J. Fridrich, Wet ZZW Construction for Steganography, First IEEE International Workshop on Information Forensics and Security, December 6-9, 2009, London, UK. 11. T. Filler and J. Fridrich, The Square Root Law of Steganographic Capacity, IEEE Summer School of Information Theory, Evanston, IL, August 10-13, 2009. 12. T. Filler and J. Fridrich, Complete Characterization of Perfectly Secure Stego-systems with Mutually Independent Embedding Operation, accepted to IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei, Taiwan, April 19-24, 2009. 13. M. Goljan, T. Filler, and J. Fridrich, Camera Identification Large Scale Test, Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA, January 18 22, pp. 0I 1 0I 12, 2009. 14. T. Filler, J. Fridrich, and A. D. Ker, The Square Root Law of Steganographic Capacity for Markov Covers, Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA, January 18 22, pp. 08 1 08 11, 2009. 15. T. Filler and J. Fridrich, Using Sensor Pattern Noise for Camera Model Identification, Proc. ICIP 08, San Diego, California, October 12 15, 2008. 16. T. Filler and J. Fridrich, Binary Quantization using Belief Propagation with Decimation over Factor Graphs of LDGM Codes, Proc. 45th Allerton Conference on Coding, Communication, and Control, September 26 28, 2007. 17. J. Fridrich and T. Filler, Practical methods for Minimizing Embedding Impact in Steganography, Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, San Jose, CA, January 28 February 2, pp. 02 03, 2007. Thesis T. Filler, Imperfect Stegosystems: Asymtotic Laws and Optimal Near-Optimal Constructions, Dissertation, SUNY Binghamton, April 2011. T. Filler, Minimizing Embedding Impact in Steganography using Low Density Codes, Master Thesis, Czech Technical University in Prague, June 2007.

Further information about my list of publications is available at http://dde.binghamton.edu/filler/publications.php. PROFESSIONAL ACTIVITIES AND MEMBERSHIPS Program chair and co-organizor of 13 th Information Hiding in Prague 2011 (www.ihconference.org). Reviewer for IEEE Transactions on Information Forensic and Security IEEE Transactions on Image Processing IEEE Transactions on Circuits and Systems for Video Technology IEEE Journal on Selected Areas in Communications IEEE Signal Processing Letters IEEE Communications Letters Journal of Electronic Imaging ETRI Journal (http://etrij.etri.re.kr) IET Information Security Journal I am a member of IEEE. Organizer of the public steganographic contest BOSS Break Our Stegosystem. TEACHING EXPERIENCE I developed and taught a graduate-level course ECE 580B Modern Coding Theory. I supervised one master student in the field of coding theory and steganography. During my master studies I lead several labs (similar to teaching assistant) for groups of first and second year students in programming, algorithm design and calculus. REFERENCES Prof. Jessica Fridrich SUNY Binghamton Department of Electrical and Computer Engineering T. J. Watson School of Applied Science and Engineering Binghamton, NY 13902-6000 E-mail: fridrich@binghamton.edu Phone: +1-607-777-6177 Fax: +1-607-777-4464 http://www.ws.binghamton.edu/fridrich Dr. Andrew Ker Royal Society University Research Fellow Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD, UK E-mail: adk@comlab.ox.ac.uk http://www.comlab.ox.ac.uk/people/andrew.ker/

Dr. Scott Craver SUNY Binghamton Department of Electrical and Computer Engineering T. J. Watson School of Applied Science and Engineering Binghamton, NY 13902-6000 E-mail: scraver@binghamton.edu Phone: +1-607-777-1889 Prof. Edita Pelantová Czech Technical University Department of Mathematics School of Nuclear Science and Physical Engineering Trojanova 13, 120 00 Praha 2, Czech Republic E-mail: pelantova@km1.fjfi.cvut.cz Phone: +420224358544 Fax: +420224918643 Last update: 4/1/2011