BC4017 Steganography and Digital Watermarking Syllabus:

BC4017 Steganography and Digital Watermarking Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To provide the importance of digital watermarking and Steganography
 To discuss the properties of watermarking and steganography systems
 To discuss the different models of watermarking and steganography
 To understand the various evaluation metrics
 To examine various applications of watermarking and steganography

UNIT I INTRODUCTION

Information Hiding, Steganography, and Watermarking. History of Watermarking. History of Steganography, Importance of Digital Watermarking. Importance of Steganography

UNIT II STEGANOGRAPHY

Steganographic Communication, The Channel, The Building Blocks, Notation and Terminology, Information – Theoretic Foundations of Steganography, Cachin’s Definition of Steganographic Security, Practical Steganographic Methods, Statistics Preserving Steganography, Model-Based Steganography, Steganalysis Scenarios, Detection, Forensic Steganalysis, The Influence of the Cover Work on Steganalysis, Some Significant Steganalysis Algorithms, LSB Embedding and the Histogram Attack.

UNIT III WATERMARKING

Evaluating watermarking systems. Notation – Communications – Communication based models – Geometric models – Mapping messages into message vectors – Error correction coding – Detecting multi-symbol watermarks – Attacks

UNIT IV MODELS OF WATERMARKING

Notation, Communications, Components of Communications Systems, Classes of Transmission Channels, Secure Transmission, Communication-Based Models of Watermarking, Basic Model, Watermarking as Communications with Side Information at the Transmitter, Watermarking as Multiplexed Communications, Geometric Models of Watermarking, Distributions and Regions in Media Space, Marking Spaces, Modeling Watermark Detection by Correlation, Linear Correlation, Normalized Correlation, Correlation Coefficient, Summary

UNIT V APPLICATIONS

Applications of Watermarking, Broadcast Monitoring, Copyrights, Proof of Ownership, Transaction Tracking, Content Authentication, Copy Control, Device Control, Legacy Enhancement. Applications of Steganography, Steganography for Dissidents, Steganography for Criminals

TOTAL: 45 PERIODS

PRACTICALS:

1. Implementation of secure/Secret Communication of data
2. Experiment on claiming ownership of digital entity
3. Implementation of tracing the digital theft in cyberspace
4. Implementation of application in Block Codes
5. Implementation of universal steganalysis
6. Experiment on target steganalysis
7. Experiment on data hiding in different image types
8. Implementation of statistical steg analysis
9. Implementation of reversible data hiding
10. Implementation of Steganography in transform domain and Steganography in encrypted images

COURSE OUTCOMES:

After the completion of this course, student will be able to
CO1: Design cryptographic algorithms and carry out their implementation.
CO2: Carry out cryptanalysis on cipher.
CO3: Design and implement security protocols.
CO4: Carry out system security for various threat environments.
CO5: Explain the importance of firewall security for networks.

TOTAL: 30 PERIODS

TOTAL: 45+30=75 PERIODS

REFERENCES

1. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, Jesica Fridrich, Ton Kalker, “Digital Watermarking and Steganography”, Morgan Kaufmann Publishers, New York, 2008.
2. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, “Digital Watermarking”, Morgan Kaufmann Publishers, New York, 2003
3. Ingemar Cox, Mathew Miller, Jefrey Blom, Jesica Fridrich and Ton Kalker, “Digital Watermarking and Steganography”, Morgan Kaufmann Publishers, Nov 2007.
4. Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York, 2005.
5. Jesica Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”, Cambridge University press, 2010.
6. Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications of Digital Watermarking and Content Protection”, Artech House, London, 2003.
7. Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography & Watermarking”, Morgan Kaufmann Publishers, New York, 2002.
8. Stefan Katzenbelser and Fabien A. P. Peticolas, “Information hiding techniques for Steganography and Digital Watermarking”, ARTECH House Publishers, January 2004.
9. Steganography, Ab as Chedad, Vdm Verlag and Dr. Muller, “Digital Image” Aktiengesellschaft & Co. Kg, Dec 2009.