MU4252 Media Security Syllabus:

MU4252 Media Security Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand the cryptanalysis on standard algorithms meant for confidentiality, integrity and authenticity.
 To know about Digital rights management.
 To know about the concepts of Digital Watermarking techniques.
 To understand the concept of Steganography
 To learn the privacy preserving techniques on Multimedia data.

UNIT I CRYPTANALYSIS AND DIGITAL RIGHTS MANAGEMENT

Cryptanalysis Techniques – Encryption Evaluation metrics – Histogram Deviation – Introduction to DRM – DRM Products –DRM Laws
Suggested Activities:
1. External learning – cryptanalysis for algorithms such as AES, RSA.
2. Analysis for DRM products.
Suggested Evaluation Methods:
1. Group discussion on linear and differential cryptanalysis of cryptographic algorithms.
2. Tutorial on DRM products.

UNIT II DIGITAL WATERMARKING BASICS

Introduction – Basics Models of Watermarking – Basic Message Coding – Error Correction coding – Mutual Information and Channel Capacity – Designing a Good Digital Watermark – Information Theoretical Analysis of Digital Watermarking.
Suggested Activities:
1. Problems on Error Correction Coding.
2. Designing a good watermark.
Suggested Evaluation Methods:
1. Assignment on ECC.
2. Tutorial on DRM products.

UNIT III DIGITAL WATERMARKING SCHEMES AND PROTOCOLS

Spread Spectrum Watermarking – Block DCT-domain Watermarking – Watermarking with Side Information – Dirty-paper Coding – Quantization Watermarking – buyer Seller Watermarking Protocol – Media Specific Digital Watermarking: Image WM, Video WM , Audio WM– Watermarking for CG-Models: Watermarking for Binary Images and 3D Contents – Data Hiding Through Watermarking Techniques.
Suggested Activities:
1. Implementation of buyer seller watermarking protocol.
2. Analyzing the performance of different media specific WM and WM for CG models.
Suggested Evaluation Methods:
1. Tutorial – Media specific watermarking techniques.
2. Group discussion on the performance evaluation of watermarking techniques.

UNIT IV STEGANOGRAPHY AND STEGANALYSIS

Stenographic Communication – Notation and Terminology – Information –Theoretic Foundations of Steganography – Cachin’s Definition of Steganographic Security – Statistics Preserving Steganography – Model-Based Steganography – Masking Embedding as Natural Processing – Minimizing the Embedding Impact – Matrix Embedding –Nonshared Selection Rule – Steganalysis Algorithms: LSB Embedding and the Histogram Attack – Sample Pairs Analysis.
Suggested Activities:
1. An application to be developed using Steganography.
Suggested Evaluation Methods:
 Can be done by hiding capacity, Distortion measure and Security
 Project.

UNIT V MULTIMEDIA ENCRYPTION

Multimedia Processing in the Encryption Domain – Information Processing – Data Sanitization – Finger Printing – Digital Forensics: Intrusive and Non- Intrusive –Forgeries Detection– Privacy Preserving – Surveillance.
Suggested Activities:
1. Case study on forensic data.
2. Case study on forgery detection.
Suggested Evaluation Methods:
1. Group discussion on case studies.

COURSE OUTCOMES:

CO1:Identify the security challenges and issues that may arise in any system.
CO2:Implement the concepts of steganography, digital watermarking techniques.
CO3:Design secure applications using steganography and watermarking schemes
CO4:Apply concepts on digital rights management while developing secure systems
CO5:Design a secure multimedia system using encryption and privacy preservation techniques.

TOTAL: 45 PERIODS

REFERENCES

1. Frank Shih, “Digital Watermarking and Steganography: Fundamentals and Techniques”, CRC Press,Second Edition 2017.
2. Fathi E. Abd El-Samie, HossamEldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili , “Image Encryption: A Communication Perspective”, CRC Press, First Edition 2013.
3. Douglas R. Stinson, “Cryptography Theory and Practice”, Fourth Edition, Chapman & Hall/CRC,2006
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
5. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and TonKalker, “Digital Watermarking and Steganography”, Second Edition, Elsevier, 2007.