LISTEN TO THE Keynote Speaker

Dr. Sandeep Joshi
Manipal University Jaipur, India
Image security through authentication using Watermark
The rapid advancement of hardware, software, and internet services has led to the widespread production, exchange, and use of digital images across various application domains. While fields like telemedicine demand precise extraction of medical information from images, social media platforms prioritize visual appeal through contrast and sharpness. Regardless of the application, image authentication is crucial, as any unauthorized modification can alter decision-making processes. The accessibility of image editing tools has further increased the risk of malicious tampering, making robust security measures essential.
With the increasing demand for digital information exchange, digital watermarking has become an essential tool for content creators to assert ownership in cases of copyright disputes. This work focuses on establishing authorship of color images using watermarking as a means to ensure unambiguous ownership.
Effective digital image watermarking requires the embedded watermark to remain intact and retrievable even after undergoing various image processing operations, whether intentional or unintentional. Therefore, an embedding strategy that balances two conflicting objectives: maintaining imperceptibility to the human eye while ensuring robustness against attacks. Given that an attacker is assumed to have knowledge of the algorithm, the security and effectiveness of the approach rely on both the algorithm itself and the cryptographic keys used. Attackers are expected to exploit any weaknesses to attempt watermark removal or forgery.
LISTEN TO THE Keynote Speaker

Dr. Prof. Igor Kotenko
St. Petersburg Federal Research Center of the Russian Academy of Sciences, and ITMO University, St. Petersburg, Russia
Intelligent Situational Awareness for Cyber Security: Models, Techniques and Applications
Main aspects of intelligent situation awareness in cyber security are considered. The talk concerns different aspects of cyber situation awareness, including situation perception, impact assessment, situation tracking, projecting future possible actions, understanding of adversary and countermeasures selection. Models, techniques and applications for advanced intelligent cyber situation awareness are analyzed. They are based on big data analytics, artificial intelligence, machine learning, user and application behavior analytics and interactive visualization. Examples of research applications and developed intelligent components for intrusion detection, security monitoring and incident management are demonstrated.
HURRY UP! Book your Seat
SUBSCRIBE TO NEWSLETTER
Want Something Extra?