MU4252 Media Security Syllabus:
MU4252 Media Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To understand the cryptanalysis on standard algorithms meant for confidentiality, integrity and authenticity.
To know about Digital rights management.
To know about the concepts of Digital Watermarking techniques.
To understand the concept of Steganography
To learn the privacy preserving techniques on Multimedia data.
UNIT I CRYPTANALYSIS AND DIGITAL RIGHTS MANAGEMENT
Cryptanalysis Techniques – Encryption Evaluation metrics – Histogram Deviation – Introduction to DRM – DRM Products –DRM Laws
Suggested Activities:
1. External learning – cryptanalysis for algorithms such as AES, RSA.
2. Analysis for DRM products.
Suggested Evaluation Methods:
1. Group discussion on linear and differential cryptanalysis of cryptographic algorithms.
2. Tutorial on DRM products.
UNIT II DIGITAL WATERMARKING BASICS
Introduction – Basics Models of Watermarking – Basic Message Coding – Error Correction coding – Mutual Information and Channel Capacity – Designing a Good Digital Watermark – Information Theoretical Analysis of Digital Watermarking.
Suggested Activities:
1. Problems on Error Correction Coding.
2. Designing a good watermark.
Suggested Evaluation Methods:
1. Assignment on ECC.
2. Tutorial on DRM products.
UNIT III DIGITAL WATERMARKING SCHEMES AND PROTOCOLS
Spread Spectrum Watermarking – Block DCT-domain Watermarking – Watermarking with Side Information – Dirty-paper Coding – Quantization Watermarking – buyer Seller Watermarking Protocol – Media Specific Digital Watermarking: Image WM, Video WM , Audio WM– Watermarking for CG-Models: Watermarking for Binary Images and 3D Contents – Data Hiding Through Watermarking Techniques.
Suggested Activities:
1. Implementation of buyer seller watermarking protocol.
2. Analyzing the performance of different media specific WM and WM for CG models.
Suggested Evaluation Methods:
1. Tutorial – Media specific watermarking techniques.
2. Group discussion on the performance evaluation of watermarking techniques.
UNIT IV STEGANOGRAPHY AND STEGANALYSIS
Stenographic Communication – Notation and Terminology – Information –Theoretic Foundations of Steganography – Cachin’s Definition of Steganographic Security – Statistics Preserving Steganography – Model-Based Steganography – Masking Embedding as Natural Processing – Minimizing the Embedding Impact – Matrix Embedding –Nonshared Selection Rule – Steganalysis Algorithms: LSB Embedding and the Histogram Attack – Sample Pairs Analysis.
Suggested Activities:
1. An application to be developed using Steganography.
Suggested Evaluation Methods:
Can be done by hiding capacity, Distortion measure and Security
Project.
UNIT V MULTIMEDIA ENCRYPTION
Multimedia Processing in the Encryption Domain – Information Processing – Data Sanitization – Finger Printing – Digital Forensics: Intrusive and Non- Intrusive –Forgeries Detection– Privacy Preserving – Surveillance.
Suggested Activities:
1. Case study on forensic data.
2. Case study on forgery detection.
Suggested Evaluation Methods:
1. Group discussion on case studies.
COURSE OUTCOMES:
CO1:Identify the security challenges and issues that may arise in any system.
CO2:Implement the concepts of steganography, digital watermarking techniques.
CO3:Design secure applications using steganography and watermarking schemes
CO4:Apply concepts on digital rights management while developing secure systems
CO5:Design a secure multimedia system using encryption and privacy preservation techniques.
TOTAL: 45 PERIODS
REFERENCES
1. Frank Shih, “Digital Watermarking and Steganography: Fundamentals and Techniques”, CRC Press,Second Edition 2017.
2. Fathi E. Abd El-Samie, HossamEldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen, Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili , “Image Encryption: A Communication Perspective”, CRC Press, First Edition 2013.
3. Douglas R. Stinson, “Cryptography Theory and Practice”, Fourth Edition, Chapman & Hall/CRC,2006
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
5. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and TonKalker, “Digital Watermarking and Steganography”, Second Edition, Elsevier, 2007.