Professor Thuong Le-Tien
Department of Electrical Electronics Engineering, Hochiminh CIty University of Technology, Vietnam
Le-Tien (IEEEM'96) is a full Professor at the HoChiMinh City University
of Technology (HCMUT). He received the Bachelor's and Master's Degrees
in Electronics Engineering from the HCMUT, and the Ph.D.Degree in
Electronics-Telecommunications from the University of Tasmania, UTAS,
Professor Le-Tien has been a Faculty Member with the Electrical Electronics Engineering Faculty, HCMUT since 1981 todate. He was a Visiting Scholar with the Ruhr University Bochum, Germany, from 1989 to 1992. He has been the Associate Researcher at the UTAS from 2000 until 2006, thenVisiting Professor for teaching, seminars, research collaboration at MannheimUniversity of Applied Science (since 2009), University Paris-13 (since 2001) todate. He served as the Deputy Department, Head for many years then Telecommunications Department Head from1998-2002. He was also appointed as theDirector of the Center for Overseas Studies at the HCMUT from 1998 until 2009. He has authored over 160 research articlesand many teaching textbooks for university students related to Electronics 1& 2, Antenna and Wave Propagation, Digital Signal Processing and Wavelets,and Communication Systems. His currentresearches interest including to Image & Biomedical Signal Processing, Digital Communication Systems and Electronics Circuits.
Professor Le-Tien has honored the title as a National Distinguished Lecturer and various Certificatesfor his Engineering Education Contribution from the Academic State Council , the chairman of National and the President of the National University of HoChiMinh City. He was also listed in theWho's Who In The World- Millennium 2000, Marquis, USA.
Abstract: Currently, a digital image can be visually changed with ease by using certain editing computer software. It is assumed that although digital authentication may leave no visual evidences indicating the tampering, they may have been altered the statistical properties of pixel values in the detected image. For authentication of images, the methods are often classified into two classes: the active authentication and the passive authentication. The classification is normally based on the fact whether the original image is available or not. In Active Authentication Techniques known as the watermarking techniques, the prior information about the image is indispensable to the process of authentication. To take the initiative in protecting a digital image for copyright authentication, a watermarking or a signature is embedded into the image but the visual quality of image is still maintained sufficiently. If the image contents are modified, the embedded data or the watermarks, which is considered as a secret message attached to the image, will be changed. The image authenticity is done by checking whether the true signature kept by the owner corresponds to the signature retrieved from the suspicious image. In contrast, in terms of digital forensics, the Passive Approach (or blind detection), the given image usually comes with the absence of any prior information. The goal is to find out whether the image has been tampered or not, whether it is a real scene taken from a particular camera (photography), or whether it is totally created by a computer software. The assumption that although high quality forgeries may leave no visual evidences indicating the tampering, they may have altered the statistical properties of the image at pixel scales, which are the only remained traces. These characteristics of statistics can be further analyzed and extracted to form distinguishing features with the ability of recognizing the modifications in the suspicious image. This note is a literature review on digital image authentication and focusing on both active and passive approaches, from the beginning works in 2003 to the recent ones in the first half of 2018. Most of the proposed methods are well classified into categories and analyzed with comments and citations. This also indicates the vital challenges and criteria of performance evaluation to the detection of forgery images, which are considered as the basis of comparison between different methods.
Professor Nicolas H. Younan
Mississippi State University, USA
Nicolas H. Younan is currently the Department Head and James Worth Bagley Chair of Electrical and Computer Engineering at Mississippi State University. He received the B.S. and M.S. degrees from Mississippi State University, in 1982 and 1984, respectively, and the Ph.D. degree from Ohio University in 1988. Dr. Younan's research interests include signal processing and pattern recognition. He has been involved in the development of advanced signal processing and pattern recognition algorithms for data mining, data fusion, feature extraction and classification, and automatic target recognition/identification. He has published over 250 papers in refereed journals and conference proceedings, and book chapters. He served as the General Chair and Editor for the 4th IASTED International Conference on Signal and Image Processing, Co-Editor for the 3rd International Workshop on the Analysis of Multi-Temporal Remote Sensing Images, Guest Editor - Pattern Recognition Letters and JSTARS, and Co-Chair - Workshop on Pattern Recognition for Remote sensing (2008-2010).
Professor Jiankun Hu
School of Engineering and Information Technology, UNSW Canberra (Australian Defence Force Academy), Australia
Dr. Jiankun Hu is a full professor at the School of Engineering and IT, University of New South Wales (UNSW) Canberra (also named UNSW at the Australian Defence Force Academy (UNSW@ADFA), Canberra, Australia. He is the invited expert of Australia Attorney-Generals Office. Prof. Hu has served at the Panel of Mathematics, Information and Computing Sciences (MIC), ARC ERA (The Excellence in Research for Australia) Evaluation Committee 2014. Prof. Hu's research interest is in the field of cyber security covering intrusion detection, sensor key management, and biometrics authentication. He has many publications in top venues including IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems (TPDS), IEEE Transactions on Information Forensics & Security (TIFS), Pattern Recognition, and IEEE Transactions on Industrial Informatics. He is currently the Editor of the following international journals: (1) IEEE Transactions on Information Forensics and Security, (2) Journal of Security and Communication Networks, John Wiley; (3) Security and Privacy, Wiley. (4) IET Cyber-Physical Systems: theory & applications. (5) Area Editor for KSII Transactions on Internet and Information Systems.
Abstract: Energy big data analytics has attracted strong attention from industry, government and academic researchers. Many real-life success stories in gaining great financial and social benefits have been reported. Energy big data is normally referred to as data generated by the emerging smart grid (SG) technology which has been heralded as a technological paradigm shift that can effectively address the issue of limited fossil fuel reserve in earth and also can reduce carbon emissions. Different from other general big data analytics such as medical big data analytics and social network big data analytics, energy big data analytics involves unique research challenges on how to cope with realtime tight cyber-physical couplings, and security/safety of the SG system which has an enormous impact to the national critical infrastructure and social life. Unfortunately energy big data analytics from a cybersecurity perspective have been less explored. There is an urgent need for such research as modern cyber interconnected and computerized energy infrastructure has become the most targeted national critical infrastructure for cyberattacks. A recent high-profile cyberattack on the Ukraine power grid has compromised three power control centres, taking down 30 substations and leaving over 225,000 Ukrainians without power. Other high-profile attacks include penetrations over two US nuclear plants and the Struxnet attack over Iranian nuclear plant. Recently a new type of cyberattack called the false-data-injection attack has been discovered which can evade the widely deployed bad data detection method in the emerging smart grid (SG). In the talk, I'll provide state-of-art research developments in the energy big data analytics from cyber security aspect. Open research questions will be discussed.