WSU 2-color logo

Welcome to

CEG7560 - Visualization and Image Processing for Cyber Security

AVIDA

 

Visualization as a research area has impacted an enormous number of engineering disciplines. In particular, it helps users get better insight into their data. In many areas, it is almost impossible to reasonably analyze data without an appropriate visualization due to the overwhelming amount of information present in the data. This is especially true for the area of cyber security in which large and complex data structures have to be explored in order to detect the presence of an intrusion or security issue. Similarly, automatic image analysis and visualization techniques are needed to process the vast amount of imagery collected nowadays. This course will provide you with techniques for generating visualizations of various different data types, including scalar, vector, and graph-type data. Geometric as well as image-based methodologies will be introduced. Advantages and disadvantages of the different methods are discussed to enable students to pick the optimal technique for a given type of data set. Different visualization and image processing environments are illustrated from common desktop environments to high-end virtual environments. Programming techniques for these environments are explained, including rendering techniques and different input paradigms. Programming examples are provided to enable students to immediately experience their own visualization application.


Course syllabus

Assignments

In order to develop the code for the assignments, you can use any computer of your choice. Some sample code is provided to get you started.

Sample code: Mace.cxx CMakeLists.txt

Sample imaging code for converting from OpenCV to VTK: InteractWithImage.zip

The binaries for VTK 9.0.3 compiled as the debug version is available. This was compiled with support for OpenVR so you may need the compiled source for that as well. You may need to point cmake to the OpenVR header and library files in the advanced settings to make this work.

If you need to use an older VTK version, these are also available, such as VTK 6.2, VTK 7.1, VTK 8.2.

The slides used during the lecture can be downloaded here:

Introductary slides

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Midterm Review

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Chapter 14

CORGI video

QCAT video

SEEM video

Visual Filter video

SNAPS video

PERCIVAL video

Key Challenges video


Last modified Thursday June 16, 2022
thomas.wischgoll@wright.edu