Image forensics includes two major challenges:
Even if image forensics is quite a new topic, some commercial products already exist. Nonetheless, several open problems still exist:
In this work, the Ph.D student will mainly focus on the automatic detection of image manipulations, according to the following three axes:
Prospective applicants are encouraged to read the following reference for more information about the exact topic : Digital image forensics: a booklet for beginners, JA Redi, W Taktak, J.-L. Dugelay, J. Multimedia Tools and Applications 51 (1), 133-162
Education Level / Degree: Computer Engineering or Master Degree (with honors); English is mandatory, French is just a plus.
The application must include:
• I-Short Curriculum Vitae
• III-Names and contacts of two references
Applications should be submitted by e-mail to email@example.com
EURECOM is a French graduate school and a research center in communication systems based in the international science park of Sophia Antipolis within the new Campus SophiaTech, which brings together renowned universities such as TELECOM ParisTech and other European Universities such as the Polytechnic University of Turin, Aalto University (formerly Helsinki University of Technology), Munich University of Technology and the Norwegian University of Science and Technology.
EURECOM benefits from a strong interaction with the industry through its specific administrative structure: Economic Interest Group (consortium type of structure), which brings together international companies such as: Orange, ST Microelectronics, BMW Group Research & Technology, Symantec, Monaco Telecom, SAP, IABG. The Principality of Monaco is an institutional member which joined the consortium at the beginning of 2013.
More about EURECOM at http://www.eurecom.fr
The department of Digital Security focuses on security and privacy requirements raised by emerging areas in communication and computer systems and tries to come up with solutions by designing new security mechanisms and privacy-preserving techniques to meet these requirements. While the main activity in this department consists of the detection, capture and analysis of malicious behavior as part of system and application software and embedded systems, there is a significant counterpart focusing on the design of new countermeasures for distributed software applications, communication systems, and digital media using applied cryptography, security protocols and signal processing.
(c) GdR 720 ISIS - CNRS - 2011-2015.